求高手翻译一下这个16进制的代码,解出来给50分
Advanced RAR Password Recovery statistics: // Advanced RAR 密码找回统计。
Encrypted RAR-file: E:\123.rar // RAR 编码文件名 E:\123.rarTotal passwords: 1,854,098 // 共有 密码 个数1854098Total time: 10h 11m 13s 86ms //总耗时 10小时11分13秒86毫秒Average speed (passwords per second): 50 //平均速度 每秒找回50个Password for this file: BOn<; 本文件密码 BOn<Password in HEX: 42 4f 6e 3c 密码写成16值是 42 4f 6e 3c ---42 4f 6e 3c 翻译回去 是 BOn<; 四个字符。
1.Tokeepcomputerfilessecure,...
不用翻译题目吧?第一题:a.可以重复:(26+10)^6=36^6=2176782336b.不可重复:P(5,36)=36*35*34*33*32*31=1402410240第二题:P(4,16)=16*15*14*13=166530第三题:题目好像有点问题 应该是these 2 positions吧?(一个总编和一个助理总编),或者是还有10个小编一共12个?按照2 positions来做就是P(2,15)=15*14=210第四题:一共6个角色a.P(6,6)=6!=720b.9个试听员听6个角色,只要挑选6个试听员还是可以多个试听员听同一个角色?感觉题目不是很明确.按照可以多个试听员听同一个角色的话会很复杂,如果只是挑选其中6人来试听的话,就是P(6,9)=9*8*7*6*5*4=60480都是最简单的排列题,能看懂题目就很容易了答案我用计算器按的,可能会按错=.=
如何在脚本里面自动输入密码
展开全部 shell脚本在处理自动循环或大的任务方面可节省大量的时间,通过创建一个处理任务的命令清单,使用变量、条件、算术和循环等方法快速创建脚本以完成相应工作,这比在命令行下一个个敲入命令要省时省力得多。
但是有时候我们可能会需要实现和交互程序如ftp,telnet服务器等进行交互的功能,这时候我们需要用到shell的自动交互功能. 最简单的例子就是创建用户,我创建100个用户,初始密码为123,那么要是挨着passwd username ,交互性输入密码,那不得疯掉,但是脚本里应该怎么写呢?将密码123,输入到passwd命令? 本文收集了较常用交互方法,并进行了比较和总结。
自动交互方法一:利用命令的自带参数,将标准输入作为手动输入的内容 自动交互最关键的就是交互信息的自动输入,首先联想到文件重定向,在shell编程中有这样一种用法(参考Linux与UNIX SHELL编程指南 chapt 5.7):"command <<delimiter p="" 从标准输入中读入,直至遇到delimiter分界符。
? 重定向操作符command <<delimiter是一种非常有用的命令,shell将分界符delimiter之后直至下一个同样的分界符之前的所有内容都作为输入,遇到下一个分界符, p="" shell就知道输入结束了。
最常见的delimiter分界符是eof,当然完全可以自定为其他字符。
对于需求1 要求的自动登陆ftp,并作系列操作,则可以用这种方法进行自动交互。
代码如下: [yjwan@test ~]$ ftp -i -n 192.168.21.46 < user dbftp dbftp101 ls EOF 下面是得到的结果: Connected to 192.168.21.46. 220 developerjail FTP server (Version 6.00LS) ready. 331 Password required for dbftp. 230 User dbftp logged in. Remote system type is UNIX. Using binary mode to transfer files. 229 Entering Extended Passive Mode (|||54281|) 150 Opening ASCII mode data connection for '/bin/ls'. total 8847424 -rw-r--r-- 1 dbftp www 9055318991 Aug 28 14:28 ewiz90.sql_2010-08-29 226 Transfer complete. 221 Goodbye. 测试可以发现,如上代码使用帐号名dbftp,密码dbftp101成功登陆了ftp服务器,并进入目录,ls出当前目录的文件。
注意事项: 1 这里一定要加-i ,否则必定失败!! 这里ftp用的-I 参数 结束了交互式输入,因此可以用文本的方式自动地输入用户密码以及操作方式 如果不用-I 参数,那么必定要求你手动输入密码的!!那么就达不到自动登陆的要求了 你可以man ftp找到这个参数 -i 关闭多文件传送中的交互式提示。
请参考 prompt、mget、mput 和 mdelete 子命令,以取得多文件传送中的提示的描述。
-n 防止在起始连接中的自动登录。
否则, ftp 命令会搜索 $HOME/.netrc 登录项,该登录项描述了远程主机的登录和初始化过程。
请参考 user 子命令。
2 举一反三:只要是要求输入密码的命令,一般都带有一个参数,允许你从标准输入,输入用户密码,以及操作。
其他常用的自动登陆命令的参数 1) Passwd命令 Linux下 Passwd有参数 --stdin This option is used to indicate that passwd should read the new password from standard input, which can be a pipe. 所以linux下自动改变用户密码的办法就是 Echo 密码 |passwd –stdin 用户名 Freebsd没有以上参数 注意 他的方法是echo passwd |pw mod user username -h 0 2)smbpasswd -s This option causes smbpasswd to be silent (i.e. not issue prompts) and to read its old and new passwords from standard input, rather than from /dev/tty (like the passwd(1) program does). This option is to aid people writing scripts to drive smbpasswd 3)sudo 在shell脚本中需要用root用的来执行指令: sudo 自动输入密码 echo "password" | sudo -S netstat -tlnp -S The -S (stdin) option causes sudo to read the password from the standard input instead of the terminal device. 3 标准输入还可以用以下两种写法: 可以将下面的内容写入到一个文本 然后ftp -I –n ip <文本 或者echo “..” |ftp –I –n ip 都是可以的! 因为他们都满足“有一个标准的输入”这个条件 4 ssh的自动登陆没有这样的自动输入密码的参数 一般都是使用公钥/私钥的方式自动登录 这种文章满街都是,网上google一下ssh自动登陆就可以找到答案。
或者用下面的办法。
自动交互方法2:利用expect脚本自动登陆 这个 expect基本属于一种编程了 基本任何需要交互式登陆的场合,他都可以解决,是相当的牛逼。
只要是第一种办法解决不了的,基本都可以用这种办法。
英语告急!!非常紧急!!!!!请英语高手帮忙!!!
1.The backstage manage beyond my power modification the friendship conjunction modification the website announce a modification registration item a modification customer a management the backstage notice to keep the successful mold version can't for empty the mold version contents can't for empty template the author link the mold version to preview a picture2.The user's name disallow is all numerals3. Encrypt the website interview verification page4 Judge a home page5 The commentary characters that quotes from to announce as follows adds the thick italic cancel format left align in the center right align to insert the facial expression form of written color form of written background color to insert a super chain to connect to throw away a super chain to connect to tidy up a code6 Don't handle temporary7 The mistake information creation the possible reason of the mistake8 Have no this message to press user's name interview9 The system has already closed the daily record contents to search the essence daily record to adjust to use 0 daily records totally at presentThe position searches the daily record headline key word to search a daily record contents key word at present10 DO not fill to click into11 Have totally12 The customer management debarkation if you not in own computer debarkation please don't keep a password do not keep you of the IP has already been target, disallowing to land you is for the first time to activate system, please perfect data stage a managing person to manage center to announce daily record13 The second step password's hinting the problem password to hint the problem answer can't hint the problem answer mistake completion for the empty password, please reset a password 5 enter a management backstage automatically behind14 Needing to be land just can look in to conceal daily record you beyond my power look into this daily record, please contact daily record host the daily record interview password mistake, please re- input15 Judge a home page16 This function is already recommended photograph by the system close to adjust totally with 0 photographs to be in use an au to broadcast the picture elucidation to obtain a system classification17 DO not match a conditional picture to broadcast frequency18 Register the current system of item has already closed to register to look into whether user's name,the area is take up a password to hint the problem password to hint answer to reset system to disallow to hand over sorry from the exterior or not!You of the IP has already been target, disallowing to register to contain in the user's name systematic disallow of character list the user's name disallows all to find back for the numeral the password hints a problem and can't can't disallow to register to contain in the pet name for empty(can't be big in 50) this pet name system for getting empty(can't be big in 50) to find back the password problem answer systematic disallow of character list the pet name can't be big in 50 the character lists have already had this pet name in the system, please change pet name implies illegal character list to carry on in the user's name the IP controls you of IP because the malice registers a quilt to forbid completion to register to register success at the time, but current system the constitution passes to examine for the demand, you turn to the system home page to congratulate automatically after temporarily doing not manage legal power 5ly!You have already registered success to click into a management backstage to choose your a favorite page style(5 enter a management backstage automatically behind) have already had this user's name in the system, please change an user's name 5 second empress then can repeat to register your different idea to register item, can't register a password to want big in 6 character list Email the address is invalid19 This daily record contents has already encrypted this daily record contents to have already conceal20 Reply the contents nots agree with to match the system request, please do not include any HTML code as far as possible after needing to be land then can announce to comment on you and don't pass a managing person to examine, can't announce to comment on a verification the code mistake, please return to break behind re- input that daily record of the parameter mistake to disallow a reply the operation of the mistake
【分析网络利弊的英文发言稿】作业帮
Internet CrisisMany inventions bring goodness and convenience to our lives. The computer is probably one of the greatest tools invented. According to Dictionary.com, The definition of computer is “an electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations.” Therefore, it has flexible verities of usages. Computers were used for military communications about several decades ago but after it was discovered for more purposes, the true meaning of computer has changed.People now use computers not only to store data, but also to edit a whole lot more programs and texts than it could before. PC games have changed a lot of kids' lives. Some of them played games, got addicted to them and dropped out of schools because of that; some of them played, got addicted, but after discovering and developing their own skills on such things as computer designing, they became billionaires. However, these people aren't even 10% of all PC gamers. As the birth was given to computers, the Internet hatched after computers. The connections between Internet and computer somehow made the attitudes toward computers even worse. Because people can share information on the internet through computers, the “information” can't be all good and proper. Besides the fact that people are getting addicted to games or online surfing, violence and pornographies have also become big issues. Internet viruses, identity thieves have also caused many troubles to people who use computers. Therefore this question has been more and more considered by people: should computers, computer programs, and, most of all, the Internet, have more restrictions on people based on their background, ages or other information by the government? Or should the Internet be like what it is now, or even freer?Many people may argue over the answer for this question. As we all know, restrictions have already been used for many programs such as video games and soft wares. But when internet has been so frequently used by people, very few regulations have be made based on ages. It's a common problem that most of the internet hackers are teenagers or college students. They hack all different websites, from people's personal sites to United States National Security website. Some of them hack websites for money, but most of them do that just for fun. People can hardly do anything to prevent this from happening because all the smart hackers know how to clear or change their IP address to prevent government from tracing them. Another key factor for these teenagers to do that is because overloaded confidence. They want to improve themselves by breaking the websites that seem to be impossible to hack. This is obviously illegal and foolish, but it seems a little crucial to put the young talented hackers into jails. Many of the hackers have now been trained officially and are working for either government or large corporations to prevent the damage they have done to the internet. However, not every hacker can be found and trained to be put in good use. Internet hacking and viruses should be prevented, not corrected. The reason why teenagers are so addicted to computers is that computers are very much something they can have total access and control of. Most of American teenagers have their personal computers, and they most likely have passwords for their computers. First, the passwords give them security of using putting their information in their computers. After internet surfing, some of them might want to do more than just playing games, listening to songs or watching movies on the internet, that's the beginning of the transformation from an internet surfer to an internet hacker. Because there is almost no rules internet and people can surf on the internet as long as they have internet connections. Therefore, no matter the age, the Internet gives them total freedom of doing whatever, however, and whenever. More restrictions are the keys to the solutions to this internet hacking problem. Such regulations as “internet access registration” can be very helpful to internet security. The way it works is that if a person wants to have internet access with any kind of computer he has, he will have to register to a certain department, and have all his information stored in the system. So every time when he goes online, he has to spend a few seconds, entering his internet ID number to confirm his identity. Therefore, no matter how he changes his IP address, he and his actions on the internet will still be traced...
threefriendsAbbie,BoobieandCillieorderdajazz,...
展开全部自动交互方法一:利用命令的自带参数,将标准输入作为手动输入的内容自动交互最关键的就是交互信息的自动输入,首先联想到文件重定向,在shell编程中有这样一种用法(参考Linux与UNIX SHELL编程指南 chapt 5.7):"command 重定向操作符command 对于需求1 要求的自动登陆ftp,并作系列操作,则可以用这种方法进行自动交互。
代码如下:[yjwan@test ~]$ ftp -i -n 192.168.21.46 user dbftp dbftp101lsEOF下面是得到的结果:Connected to 192.168.21.46.220 developerjail FTP server (Version 6.00LS) ready.331 Password required for dbftp.230 User dbftp logged in.Remote system type is UNIX.Using binary mode to transfer files.229 Entering Extended Passive Mode (|||54281|)150 Opening ASCII mode data connection for '/bin/ls'.total 8847424-rw-r--r-- 1 dbftp www 9055318991 Aug 28 14:28 ewiz90.sql_2010-08-29226 Transfer complete.221 Goodbye.测试可以发现,如上代码使用帐号名dbftp,密码dbftp101成功登陆了ftp服务器,并进入目录,ls出当前目录的文件。
注意事项:1 这里一定要加-i ,否则必定失败!!这里ftp用的-I 参数 结束了交互式输入,因此可以用文本的方式自动地输入用户密码以及操作方式如果不用-I 参数,那么必定要求你手动输入密码的!!那么就达不到自动登陆的要求了你可以man ftp找到这个参数-i 关闭多文件传送中的交互式提示。
请参考 prompt、mget、mput 和 mdelete 子命令,以取得多文件传送中的提示的描述。
-n 防止在起始连接中的自动登录。
否则, ftp 命令会搜索 $HOME/.netrc 登录项,该登录项描述了远程主机的登录和初始化过程。
请参考 user 子命令。
2 举一反三:只要是要求输入密码的命令,一般都带有一个参数,允许你从标准输入,输入用户密码,以及操作。
其他常用的自动登陆命令的参数1) Passwd命令Linux下 Passwd有参数--stdinThis option is used to indicate that passwd should read the new password from standard input, which can be a pipe.所以linux下自动改变用户密码的办法就是Echo 密码 |passwd –stdin 用户名Freebsd没有以上参数 注意他的方法是echo passwd |pw mod user username -h 02)smbpasswd-sThis option causes smbpasswd to be silent (i.e. not issue prompts)and to read its old and new passwords from standard input, ratherthan from /dev/tty (like the passwd(1) program does). This optionis to aid people writing scripts to drive smbpasswd3)sudo在shell脚本中需要用root用的来执行指令:sudo 自动输入密码echo "password" | sudo -S netstat -tlnp-SThe -S (stdin) option causes sudo to read the password from the standard input instead of the terminal device.3 标准输入还可以用以下两种写法:可以将下面的内容写入到一个文本然后ftp -I –n ip 或者echo “..” |ftp –I –n ip都是可以的!因为他们都满足“有一个标准的输入”这个条件4 ssh的自动登陆没有这样的自动输入密码的参数一般都是使用公钥/私钥的方式自动登录这种文章满街都是,网上google一下ssh自动登陆就可以找到答案。
或者用下面的办法。
自动交互方法2:利用expect脚本自动登陆这个 expect基本属于一种编程了基本任何需要交互式登陆的场合,他都可以解决,是相当的牛逼。
只要是第一种办法解决不了的,基本都可以用这种办法。
如何让Linux成为文件服务器?
一、Samba简介给Windows客户提供文件服务是通过samba实现的,凡架设过MS Windows网络的人都知道MS Windows网络的核心是SMB/CIFS,而samba也是一套基于UNIX类系统、实现SMB/CIFS协议的软件,作为UNIX的克隆,Linux也可以运行这套软件。
和NT相比较,samba的文件服务功能一点也不亚于NT,效率很高,借助Linux本身,可以实现用户磁盘空间限制功能,NT到4.0版本还是无法实现这点,samba由samba小组(http;//samba.org)开发,更新速度很快,目前最高的版本是2.0.7版,是2000年4月25日发布的,每个更新版本在功能上都所增强,也修复了已知的BUG。
本章所涉及到的技术内容以2.0.3版蓝本。
目前各种Linux发布大都包含这套软件,如果你的Linux发布是Read Hat,则是以RPM形式提供,可以在安装Linux的时候选择这个软件,也可以单独安装,以root身份。
rpm -i samba-2.0.3-8.i386.rpm,就可以了。
如果你的Linux发布没有包含这个软件,可以从ftp;//samba.org/pub/samba去下载。
另外,您的Linux的核心要支持smbfs,一般各种发布已经把smbfs的支持包含进去,如果没有包含的话,就要重新编译核心,获得smbfs支持,具体如何编译核心请参阅相关文章。
由于本章的内容是基于文件服务器, 重点介绍samba在文件服务器上的应用。
目前samba还不能完全代替Windows NT,尤其是把samba设置成PDC,最好不要这样做,NT PDC非常复杂,samba还只能实现其中一部分功能。
希望未来的版本可以做到。
这套软件由一系列的组件构成,主要的组件有:smbd SMB服务器,给SMB客户提供文件和打印服务;nmbd, Netbios 名称服务器,提供Netbios名称服务和浏览支持,帮助SMB客户定位服务器;smbclient, SMB客户程序,用来存取SMB服务器上的共享资源;testprns 测试服务器上打印机访问的程序;testparms 测试Samba配置文件的正确性的工具;smb.conf samba的配置文件;smbstatus 这个工具可以列出当前smbd服务器上的连接;make_smbcodepage 这个工具用来生成文件系统的代码页;smbpasswd 这个工具用来设定用户密码;swat samba的Web管理工具;二、如何配置samba实际上,samba安装完后,只要把/etc/smb.conf这个文件里的workgroup=XXXXX这个参数该为您的工作组,启动samba就可以运行了,但这根本不能符合我们的需要。
samba的配置都是围绕smb.conf来进行的,配置方式有很多种,如果熟练的话可以手工编辑这个文件,也可以通过linuxconf来配置,而且samba本身带了一个基于web的管理工具swat,使用901端口,安装完samba后,它会在您机器的/etc/services的尾部加上一条:swat 901/tcp #Add swat service used via inetd在inetd.conf里填上:swat stream tcp nowait.400 root /usr/sbin/swat swat在浏览器的地址栏里键入 http://youhostname:901/ 就可以进入swat对samba进行管理。
下面就介绍如何手工配置这个文件以达到让samba成为一个符合需求的文件服务器。
先看看一小段的smb.conf:# smb.conf example[global]workgroup = WORKGROUPserver string = Samba Serverhosts allow = 192.168.1. 192.168.2. 127.load printers = noprintcap name = /etc/printcapguest account = guestlog file = /usr/local/samba/var/log.%mmax log size = 50security = usersocket options = TCP_NODELAY[homes]comment = Home Directoriesbrowseable = yeswritable = yes[printers]comment = All Printerspath = /usr/spool/sambabrowseable = noguest ok = nowritable = noprintable = yesprinter driver = Epson LQ-1600K[tmp]comment = Temporary filepath = /tmpread only = nopublic = yes[public]comment = Public Zonepath = /home/sambapublic = yeswritable = yes1.段从上面的例子可以看出,smb.conf的格式和Windows里的INI文件很像,含有多个段,每个段由段名开始,一直到下个段名,每个段名放在方括号中间。
段里的参数的格式是:名称 = 值。
文件里的每个段名、参数以及注释都只能占一行,换句话说就是一行里只能写一个段名或参数或注释,如果一行写不下或不想把一行写的过长,可以在行尾用"/"来表示续行。
段名和参数名不分大小写。
可以有注释,注释以;或#开始到该行结束。
除了[global]段外,所有的段都可以看作是一个共享资源,段名是该共享资源的名字,而段里的参数就是共享资源的属性。
[global], [homes] 和 [printers]这三个段是比较特殊的,将在后面说明。
而下面的注意事项则是针对普通的段。
一个共享资源段由要提供访问的路径和附加的访问权限组成,可以是文件资源或打印资源。
共享资源段可以给guest级的用户服务,一般来说guest用户是不需要密码的,如果给guest提供服务,guest的权限是根据UNIX里的guest帐户来赋予。
如果共享资源段不是给guest提供服务的,则访问这样的段需要客户的密码。
由于赋予用户对共享资源段的访问权限是基于该用户在UNIX系统的对该资源的访问权限,所以服务器是不能赋予超过UNIX系统赋予该用户的权限的。
例如:下面的共享资源段的例子定义了一个文件共享,用户对路径/home/abc有写入的...
转载请注明出处51数据库 » total passwords