网站综合信息 www.hoxt.com
    • 标题:
    • Hoxt.com – Open Source Mirrors 
    • 关键字:
    •  
    • 描述:
    •  
    • 域名信息
    • 域名年龄:21年6个月18天  注册日期:2003年10月28日  到期时间:2021年10月28日
      注册商:GODADDY.COM, LLC 
    • 服务器空间
    • IP:208.115.204.86 同IP网站2个 详情
      地址:美国 德克萨斯州达拉斯Limestone网络公司
    • 备案信息
    • 备案号: 
    网站收录SEO数据
    • 搜索引擎
    • 收录量
    • 反向链接
    • 其他
    • 百度
    • 1  
    • 247  
    • 快照:无首页快照  
    • Google
    • 0  
    • 0  
    • pr:0  
    • 雅虎
    • 0  
    •  
    •  
    • 搜搜
    • 0  
    •  
    •  
    • 搜狗
    • 0  
    •  
    • 评级:1/10  
    • 360搜索
    • 1  
    •  
    •  
    域名流量Alexa排名
    •  
    • 一周平均
    • 一个月平均
    • 三个月平均
    • Alexa全球排名
    • 11,658,893  
    • 平均日IP
    • 日总PV
    • 人均PV(PV/IP比例)
    • 反向链接
    • 27 
    • dmoz目录收录
    • -  
    • 流量走势图
    域名注册Whois信息

    hoxt.com

    域名年龄: 21年6个月18天
    注册时间: 2003-10-28
    到期时间: 2021-10-28
    注 册 商: GODADDY.COM, LLC

    获取时间: 2017年01月01日 09:12:15
    Domain Name: HOXT.COM
    Registrar: GODADDY.COM, LLC
    Sponsoring Registrar IANA ID: 146
    Whois Server: whois.godaddy.com
    Referral URL: http://www.godaddy.com
    Name Server: NS29.DOMAINCONTROL.COM
    Name Server: NS30.DOMAINCONTROL.COM
    Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
    Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
    Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
    Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
    Updated Date: 2012-02-27
    Creation Date: 2003-10-28
    Expiration Date: 2021-10-28

    >>> Last update of whois database: Sun, 2017-Jan-01 01:19:05 GMT <<<

    For more information on Whois status codes, please visit https://icann.org/epp

    Domain Name: HOXT.COM
    Registrar URL: http://www.godaddy.com
    Registrant Name: Registration Private
    Registrant Organization: Domains By Proxy, LLC
    Name Server: NS29.DOMAINCONTROL.COM
    Name Server: NS30.DOMAINCONTROL.COM
    DNSSEC: unsigned

    For complete domain details go to:
    http://who.godaddy.com/whoischeck.aspx?domain=HOXT.COM
    同IP网站(同服务器)
  • 208.115.204.86 共2个网站 (美国 德克萨斯州达拉斯Limestone网络公司)
  • Hoxt.com – Open So
  • Hoxt.com – Open So
  • 其他后缀域名
    • 顶级域名
    • 相关信息
    网站首页快照(纯文字版)
    抓取时间:2016年09月18日 07:52:59
    网址:http://www.hoxt.com/
    标题:Hoxt.com – Open Source Mirrors
    关键字:
    描述:
    主体:
    Hoxt.com – Open Source Mirrors Apache, CPAN, PHP, MySQL, PuTTY, Linux Virtual Server, Linux Documentation Project, ProFTPDSubscribe via RSSHomeAbout17Jul/100Install OSSEC automatically with expectIf you want to script the installation of ossec, this script will use expect/spawn to automatically enter values for prompts:#!/usr/bin/expect -dset timeout -1spawn ossec-hids-2.4.1/install.shexpect "en/br/cn/de"send "en\r"expect "Press ENTER to continue"send "\r"expect "What kind of installation"send "local\r"expect "Choose where to install the OSSEC HIDS"send "\r"expect "Do you want e-mail notification"send "y\r"expect "your e-mail address"send "root@localhost\r"expect "Do you want to use it"send "y\r"expect "Do you want to run the integrity check daemon"send "y\r"expect "Do you want to run the rootkit detection engine"send "y\r"expect "Do you want to enable active response"send "y\r"expect "Do you want to enable the firewall-drop response"send "y\r"expect "Do you want to add more IPs to the white list"send "n\r"expect "Press ENTER to continue"send "\r"expect "Press ENTER to finish"send "\r"expect eofTagged as: puppet, securityNo Comments7Jul/100shell scripting – Bash alias that takes argumentNormally, you would have this shortcut in .bash_profilealias sshwww='ssh john@www.example.com'What about you have 100s of www servers:sshwww() { ssh "john@$1".example.com; }Usage: "sshwww web1", "sshwww web2"Even more, you can su directly to root from john:sshroot() { ssh "john@$1".example.com "su"; }Usage: "sshroot web1", "sshroot web2"Filed under: UncategorizedNo Comments7Jul/100Make an encrypted password for useraddVery simple using php:php -r "echo crypt('myplaintextpassword123');"useradd -m -p "$1$abJez234$fD4Dn4IrG3Hzeas3hBjIb0" -d /home/john -s /bin/bash johnFiled under: UncategorizedNo Comments7Jul/100su – Run a command after entering root passwordFor a better scripting automation and still retain the security of su/non-root login:su -c "mysql -e 'SHOW STATUS;' "This will return the status of mysql. Now you can run this via a regular user, then su, then mysql. You'll be asked for password twice, one for the regular user, one for root.ssh nonroot@server "su -c \"mysql -e 'SHOW STATUS;' \""You'll get "standard in must be a tty" error. Too bad! Nice concept but does not work like this. Now to solve this, I've seen some suggestion to use an expect script but not supplying the root password automatically. The expect script will ask for the password.Update: no need for expect script, with just an ssh option "-t" to force it to ask for a tty (see man page for description). So the solution is this:ssh -t nonroot@server "su -c \"mysql -e 'SHOW STATUS;' \""Security is still there, you'll be asked for two different passwords, but you can now write a script to guide the process flow as you expected and not having to teach/say/request/instruct users to type in a certain command (eg: then type su, then type your xxx command). Love it eh!Filed under: Un

    © 2010 - 2020 网站综合信息查询 同IP网站查询 相关类似网站查询 网站备案查询网站地图 最新查询 最近更新 优秀网站 热门网站 全部网站 同IP查询 备案查询

    2025-05-08 13:23, Process in 0.0066 second.