图片 1

黑客难防,Linux的经典shell命令整理

F-35:武器易挡,黑客难防图片 1

NotificationListenerService

Linux的经典shell命令整理

1.删除0字节文件
find -type f -size 0 -exec rm -rf {} \;

2.查看进程
按内存从大到小排列
ps -e -o “%C : %p : %z : %a”|sort -k5 -nr

3.按cpu利用率从大到小排列
ps -e -o “%C : %p : %z : %a”|sort -nr

4.打印说cache里的URL
grep -r -a jpg /data/cache/* | strings | grep “http:” | awk -F’http:’
‘{print “http:”$2;}’

5.查看http的并发请求数及其TCP连接状态:
netstat -n | awk ‘/^tcp/ {++S[$NF]} END {for(a in S) print a, S[a]}’

  1. sed -i ‘/Root/s/no/yes/’ /etc/ssh/sshd_config
    sed在这个文里Root的一行,匹配Root一行,将no替换成yes.

7.1.如何杀掉mysql进程:
ps aux|grep mysql|grep -v grep|awk ‘{print $2}’|xargs kill -9

(从中了解到awk的用途)
pgrep mysql |xargs kill -9

killall -TERM mysqld

kill -9 `cat /usr/local/apache2/logs/httpd.pid`

试试查杀进程PID

8.显示运行3级别开启的服务:
ls /etc/rc3.d/S* |cut -c 15-

(从中了解到cut的用途,截取数据)

9.如何在编写SHELL显示多个信息,用EOF
cat << EOF
+————————————————————–+ | ===
Welcome to Tunoff services === |
+————————————————————–+ EOF

  1. for 的巧用(如给mysql建软链接)
    cd /usr/local/mysql/bin for i in * do ln /usr/local/mysql/bin/$i
    /usr/bin/$i done
  2. 取IP地址:
    ifconfig eth0|sed -n ‘2p’|awk ‘{print $2}’|cut -c 6-30 或者: ifconfig
    eth0 |grep “inet addr:” |awk ‘{print $2}’|cut -c 6- 或者 ifconfig | grep
    ‘inet addr:’| grep -v ‘127.0.0.1’ | cut -d: -f2 | awk ‘{ print $1}’
    或者: ifconfig eth0 | sed -n ‘/inet /{s/.*addr://;s/ .*//;p}’
    Perl实现获取IP的方法:
    ifconfig -a | perl -ne ‘if ( m/^\s*inet (?:addr:)?([\d.]+).*?cast/
    ) { print qq($1\n); exit 0; }’
    12.内存的大小: free -m |grep “Mem” | awk ‘{print $2}’
  3. netstat -an -t | grep “:80” | grep ESTABLISHED | awk ‘{printf “%s
    %s\n”,$5,$6}’ | sort
    14.查看Apache的并发请求数及其TCP连接状态: netstat -n | awk ‘/^tcp/
    {++S[$NF]} END {for(a in S) print a, S[a]}’
    15.因为同事要统计一下服务器下面所有的jpg的文件的大小,写了个shell给他来统计.原来用xargs实现,但他一次处理一部分,搞的有多个总和….,下面的命令就能解决啦.
    find / -name *.jpg -exec wc -c {} \;|awk ‘{print $1}’|awk
    ‘{a+=$1}END{print a}’
    CPU的数量(多核算多个CPU, cat /proc/cpuinfo |grep -c processor
    )越多,系统负载越低,每秒能处理的请求数也越多。

  1. CPU负载 # cat /proc/loadavg
    检查前三个输出值是否超过了系统逻辑CPU的4倍。
  2. CPU负载 #mpstat 1 1 检查%idle是否过低(比如小于5%)
  3. 内存空间 # free 检查free值是否过低 也可以用 # cat /proc/meminfo
  4. swap空间 # free 检查swap used值是否过高 如果swap
    used值过高,进一步检查swap动作是否频繁: # vmstat 1 5
    观察si和so值是否较大
  5. 磁盘空间 # df -h 检查是否有分区使用率(Use%)过高(比如超过90%)
    如发现某个分区空间接近用尽,可以进入该分区的挂载点,用以下命令找出占用空间最多的文件或目录:
    # du -cks * | sort -rn | head -n 10
  6. 磁盘I/O负载 # iostat -x 1 2 检查I/O使用率(%util)是否超过100%
  7. 网络负载 # sar -n DEV 检查网络流量(rxbyt/s, txbyt/s)是否过高
  8. 网络错误 # netstat -i 检查是否有网络错误(drop fifo colls carrier)
    也可以用命令:# cat /proc/net/dev
  9. 网络连接数目 # netstat -an | grep -E “^(tcp)” | cut -c 68- | sort |
    uniq -c | sort -n
  10. 进程总数 # ps aux | wc -l 检查进程个数是否正常 (比如超过250)
  11. 可运行进程数目 # vmwtat 1 5
    列给出的是可运行进程的数目,检查其是否超过系统逻辑CPU的4倍
  12. 进程 # top -id 1 观察是否有异常进程出现
  13. 网络状态 检查DNS, 网关等是否可以正常连通
    ping traceroute nslookup dig
  14. 用户 # who | wc -l 检查登录用户是否过多 (比如超过50个)
    也可以用命令:# uptime
  15. 系统日志 # cat /var/log/rflogview/*errors
    检查是否有异常错误记录 也可以搜寻一些异常关键字,例如:
    # grep -i error /var/log/messages # grep -i fail /var/log/messages
    # egrep -i ‘error|warn’ /var/log/messages 查看系统异常 32 核心日志
    # dmesg 检查是否有异常错误记录
  16. 系统时间 # date 检查系统时间是否正确
    当前时间: date +”%Y-%m-%d %H:%M:%S”
  17. 打开文件数目 # lsof | wc -l 检查打开文件总数是否过多
  18. 日志 # logwatch ?print 配置/etc/log.d/logwatch.conf,将 Mailto
    设置为自己的email 地址,启动mail服务
    (sendmail或者postfix),这样就可以每天收到日志报告了。
    缺省logwatch只报告昨天的日志,可以用# logwatch ?print ?range all
    获得所有的日志分析结果。
    可以用# logwatch ?print ?detail high
    获得更具体的日志分析结果(而不仅仅是出错日志)。
    36.杀掉80端口相关的进程 lsof -i :80|grep -v “PID”|awk ‘{print “kill
    -9”,$2}’|sh
    37.清除僵死进程。 ps -eal | awk ‘{ if ($2 == “Z”) {print $4}}’ | kill
    -9
    38.tcpdump 抓包 ,用来防止80端口被人攻击时可以分析数据
    # tcpdump -c 10000 -i eth0 -n dst port 80 > /root/pkts

39.然后检查IP的重复数 并从小到大排序 注意 “-t\ +0″ 中间是两个空格
# less pkts | awk {‘printf $3″\n”‘} | cut -d. -f 1-4 | sort | uniq -c
| awk {‘printf $1″ “$2″\n”‘} | sort -n -t\ +0

40.查看有多少个活动的php-cgi进程
netstat -anp | grep php-cgi | grep ^tcp | wc -l

41.利用iptables对应简单攻击
netstat -an | grep -v LISTEN | awk ‘{print $5}’ |grep -v 127.0.0.1|grep
-v 本机ip|sed “s/::ffff://g”|awk ‘BEGIN { FS=”:” } { Num[$1]++ } END {
for(i in Num) if(Num>8) { print i} }’ |grep
‘[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}’|
xargs -i[] iptables -I INPUT -s [] -j DROP

Num>8部分设定值为阀值,这条句子会自动将netstat -an
中查到的来自同一IP的超过一定量的连接的列入禁止范围。
基中本机ip改成你的服务器的ip地址

  1. 怎样知道某个进程在哪个CPU上运行?
    # ps -eo pid,args,psr

  2. 查看硬件制造商
    dmidecode -s system-product-name

44.perl如何编译成字节码,这样在处理复杂项目的时候会更快一点?
perlcc -B -o webseek webseek.pl

  1. 统计var目录下文件以M为大小,以列表形式列出来。
    find /var -type f | xargs ls -s | sort -rn | awk ‘{size=$1/1024;
    printf(“%dMb %s\n”, size,$2);}’ | head
    查找var目录下文件大于100M的文件,并统计文件的个数
    find /var -size +100M -type f | tee file_list | wc -l

  2. sed 查找并替换内容
    sed -i “s/varnish/LTCache/g” `grep “Via” -rl
    /usr/local/src/varnish-2.0.4`

sed -i “s/X-Varnish/X-LTCache/g” `grep “X-Varnish” -rl
/usr/local/src/varnish-2.0.4`

  1. 查看服务器制造商
    dmidecode -s system-product-name

  2. wget 模拟user-agent抓取网页
    wget -m -e robots=off -U “Mozilla/5.0 (Windows; U; Windows NT 5.1;
    zh-CN; rv:1.9.1.6) Gecko/20091201 Firefox/3.5.6”

  3. 统计目录下文件的大小(按M打印显示)
    du $1 –max-depth=1 | sort -n|awk ‘{printf “%7.2fM —->
    %s\n”,$1/1024,$2}’|sed ‘s:/.*/\([^/]\{1,\}\)$:\1:g’

51.关于CND实施几个相关的统计
统计一个目录中的目录个数
ls -l | awk ‘/^d/’ | wc -l

统计一个目录中的文件个数
ls -l | awk ‘/^-/’ | wc -l

统计一个目录中的全部文件数
find ./ -type f -print | wc -l

统计一个目录中的全部子目录数
find ./ -type d -print | wc -l

统计某类文件的大小:
find ./ -name “*.jpg” -exec wc -c {} \;|awk ‘{print $1}’|awk
‘{a+=$1}END{print a}’

  1. 查找占用磁盘IO最多的进程
    wget -c

    dstat -M topio -d -M topbio

  2. 去掉第一列(如行号代码)
    awk ‘{for(i=2;i<=NF;i++) if(i!=NF){printf $i” “}else{print $i} }’
    list
    55.输出256中色彩
    for i in {0..255}; do echo -e “\e[38;05;${i}m${i}”; done | column -c
    80 -s ‘ ‘; echo -e “\e[m”
    56.查看机器支持内存 机器插内存情况: dmidecode |grep -P
    “Maximum\s+Capacity”
    机器最大支持内存: dmidecode |grep -P “Maximum\s+Capacity”
    57.查看PHP-CGI占用的内存总数:
    total=0; for i in `ps -C php-cgi -o rss=`; do total=$(($total+$i));
    done; echo “PHP-CGI Memory usage: $total kb”

作者:NetSeek
资料来源:http://bbs.linuxtone.org/thread-16-1-1.html%20print%20a,%20S%5Ba%5D%7D%E2%80%99%20%206.%20sed%20-i%20%E2%80%98/Root/s/no/yes/%E2%80%99%20/etc/ssh/sshd_config%20sed%E5%9C%A8%E8%BF%99%E4%B8%AA%E6%96%87%E9%87%8CRoot%E7%9A%84%E4%B8%80%E8%A1%8C%EF%BC%8C%E5%8C%B9%E9%85%8DRoot%E4%B8%80%E8%A1%8C%EF%BC%8C%E5%B0%86no%E6%9B%BF%E6%8D%A2%E6%88%90yes.%20%207.1.%E5%A6%82%E4%BD%95%E6%9D%80%E6%8E%89mysql%E8%BF%9B%E7%A8%8B%EF%BC%9A%20ps%20aux%7Cgrep%20mysql%7Cgrep%20-v%20grep%7Cawk%20%E2%80%98%7Bprint%20%242%7D%E2%80%99%7Cxargs%20kill%20-9%20%20(%E4%BB%8E%E4%B8%AD%E4%BA%86%E8%A7%A3%E5%88%B0awk%E7%9A%84%E7%94%A8%E9%80%94)%20pgrep%20mysql%20%7Cxargs%20kill%20-9%20%20killall%20-TERM%20mysqld%20%20kill%20-9%20%60cat%20/usr/local/apache2/logs/httpd.pid%60%20%20%E8%AF%95%E8%AF%95%E6%9F%A5%E6%9D%80%E8%BF%9B%E7%A8%8BPID%20%208.%E6%98%BE%E7%A4%BA%E8%BF%90%E8%A1%8C3%E7%BA%A7%E5%88%AB%E5%BC%80%E5%90%AF%E7%9A%84%E6%9C%8D%E5%8A%A1:%20ls%20/etc/rc3.d/S%20%7Ccut%20-c%2015-%20%20(%E4%BB%8E%E4%B8%AD%E4%BA%86%E8%A7%A3%E5%88%B0cut%E7%9A%84%E7%94%A8%E9%80%94%EF%BC%8C%E6%88%AA%E5%8F%96%E6%95%B0%E6%8D%AE)%20%209.%E5%A6%82%E4%BD%95%E5%9C%A8%E7%BC%96%E5%86%99SHELL%E6%98%BE%E7%A4%BA%E5%A4%9A%E4%B8%AA%E4%BF%A1%E6%81%AF%EF%BC%8C%E7%94%A8EOF%20cat%20%3C%3C%20EOF%20+————————————————————–+%20%7C%20===%20Welcome%20to%20Tunoff%20services%20===%20%7C%20+————————————————————–+%20EOF%20%2010.%20for%20%E7%9A%84%E5%B7%A7%E7%94%A8(%E5%A6%82%E7%BB%99mysql%E5%BB%BA%E8%BD%AF%E9%93%BE%E6%8E%A5)%20%20cd%20/usr/local/mysql/bin%20for%20i%20in%20%20do%20ln%20/usr/local/mysql/bin/%24i%20/usr/bin/%24i%20done%20%2011.%20%E5%8F%96IP%E5%9C%B0%E5%9D%80%EF%BC%9A%20%20ifconfig%20eth0%7Csed%20-n%20’2p’%7Cawk%20’%7Bprint%20%242%7D’%7Ccut%20-c%206-30%20%E6%88%96%E8%80%85:%20ifconfig%20eth0%20%7Cgrep%20%22inet%20addr:%22%20%7Cawk%20’%7Bprint%20%242%7D’%7Ccut%20-c%206-%20%E6%88%96%E8%80%85%20ifconfig%20%7C%20grep%20’inet%20addr:’%7C%20grep%20-v%20’127.0.0.1’%20%7C%20cut%20-d:%20-f2%20%7C%20awk%20’%7B%20print%20%241%7D’%20%E6%88%96%E8%80%85%EF%BC%9A%20ifconfig%20eth0%20%7C%20sed%20-n%20’/inet%20/%7Bs/.addr:/;s/%20./;p%7D’%20%20Perl%E5%AE%9E%E7%8E%B0%E8%8E%B7%E5%8F%96IP%E7%9A%84%E6%96%B9%E6%B3%95:%20%20ifconfig%20-a%20%7C%20perl%20-ne%20’if%20(%20m/%5E%5Csinet%20(?:addr:)?(%5B%5Cd.%5D+).?cast/%20)%20%7B%20print%20qq(%241%5Cn);%20exit%200;%20%7D’%20%2012.%E5%86%85%E5%AD%98%E7%9A%84%E5%A4%A7%E5%B0%8F:%20free%20-m%20%7Cgrep%20%22Mem%22%20%7C%20awk%20’%7Bprint%20%242%7D’%20%2013.%20netstat%20-an%20-t%20%7C%20grep%20%22:80%22%20%7C%20grep%20ESTABLISHED%20%7C%20awk%20’%7Bprintf%20%22%s%20%s%5Cn%22,%245,%246%7D’%20%7C%20sort%20%2014.%E6%9F%A5%E7%9C%8BApache%E7%9A%84%E5%B9%B6%E5%8F%91%E8%AF%B7%E6%B1%82%E6%95%B0%E5%8F%8A%E5%85%B6TCP%E8%BF%9E%E6%8E%A5%E7%8A%B6%E6%80%81%EF%BC%9A%20netstat%20-n%20%7C%20awk%20’/%5Etcp/%20%7B++S%5B%24NF%5D%7D%20END%20%7Bfor(a%20in%20S)%20print%20a,%20S%5Ba%5D%7D’%20%2015.%E5%9B%A0%E4%B8%BA%E5%90%8C%E4%BA%8B%E8%A6%81%E7%BB%9F%E8%AE%A1%E4%B8%80%E4%B8%8B%E6%9C%8D%E5%8A%A1%E5%99%A8%E4%B8%8B%E9%9D%A2%E6%89%80%E6%9C%89%E7%9A%84jpg%E7%9A%84%E6%96%87%E4%BB%B6%E7%9A%84%E5%A4%A7%E5%B0%8F,%E5%86%99%E4%BA%86%E4%B8%AAshell%E7%BB%99%E4%BB%96%E6%9D%A5%E7%BB%9F%E8%AE%A1.%E5%8E%9F%E6%9D%A5%E7%94%A8xargs%E5%AE%9E%E7%8E%B0,%E4%BD%86%E4%BB%96%E4%B8%80%E6%AC%A1%E5%A4%84%E7%90%86%E4%B8%80%E9%83%A8%E5%88%86,%E6%90%9E%E7%9A%84%E6%9C%89%E5%A4%9A%E4%B8%AA%E6%80%BB%E5%92%8C….,%E4%B8%8B%E9%9D%A2%E7%9A%84%E5%91%BD%E4%BB%A4%E5%B0%B1%E8%83%BD%E8%A7%A3%E5%86%B3%E5%95%A6.%20%20find%20/%20-name%20.jpg%20-exec%20wc%20-c%20%7B%7D%20%5C;%7Cawk%20’%7Bprint%20%241%7D’%7Cawk%20’%7Ba+=%241%7DEND%7Bprint%20a%7D’%20CPU%E7%9A%84%E6%95%B0%E9%87%8F%EF%BC%88%E5%A4%9A%E6%A0%B8%E7%AE%97%E5%A4%9A%E4%B8%AACPU%EF%BC%8C%20cat%20/proc/cpuinfo%20%7Cgrep%20-c%20processor%20%EF%BC%89%E8%B6%8A%E5%A4%9A%EF%BC%8C%E7%B3%BB%E7%BB%9F%E8%B4%9F%E8%BD%BD%E8%B6%8A%E4%BD%8E%EF%BC%8C%E6%AF%8F%E7%A7%92%E8%83%BD%E5%A4%84%E7%90%86%E7%9A%84%E8%AF%B7%E6%B1%82%E6%95%B0%E4%B9%9F%E8%B6%8A%E5%A4%9A%E3%80%82%20%20——————————————————————————————————————–%20%2016.%20CPU%E8%B4%9F%E8%BD%BD%20#%20cat%20/proc/loadavg%20%E6%A3%80%E6%9F%A5%E5%89%8D%E4%B8%89%E4%B8%AA%E8%BE%93%E5%87%BA%E5%80%BC%E6%98%AF%E5%90%A6%E8%B6%85%E8%BF%87%E4%BA%86%E7%B3%BB%E7%BB%9F%E9%80%BB%E8%BE%91CPU%E7%9A%844%E5%80%8D%E3%80%82%20%2018.%20CPU%E8%B4%9F%E8%BD%BD%20#mpstat%201%201%20%E6%A3%80%E6%9F%A5%idle%E6%98%AF%E5%90%A6%E8%BF%87%E4%BD%8E(%E6%AF%94%E5%A6%82%E5%B0%8F%E4%BA%8E5%)%20%2019.%20%E5%86%85%E5%AD%98%E7%A9%BA%E9%97%B4%20#%20free%20%E6%A3%80%E6%9F%A5free%E5%80%BC%E6%98%AF%E5%90%A6%E8%BF%87%E4%BD%8E%20%E4%B9%9F%E5%8F%AF%E4%BB%A5%E7%94%A8%20#%20cat%20/proc/meminfo%20%2020.%20swap%E7%A9%BA%E9%97%B4%20#%20free%20%E6%A3%80%E6%9F%A5swap%20used%E5%80%BC%E6%98%AF%E5%90%A6%E8%BF%87%E9%AB%98%20%E5%A6%82%E6%9E%9Cswap%20used%E5%80%BC%E8%BF%87%E9%AB%98%EF%BC%8C%E8%BF%9B%E4%B8%80%E6%AD%A5%E6%A3%80%E6%9F%A5swap%E5%8A%A8%E4%BD%9C%E6%98%AF%E5%90%A6%E9%A2%91%E7%B9%81%EF%BC%9A%20#%20vmstat%201%205%20%E8%A7%82%E5%AF%9Fsi%E5%92%8Cso%E5%80%BC%E6%98%AF%E5%90%A6%E8%BE%83%E5%A4%A7%20%2021.%20%E7%A3%81%E7%9B%98%E7%A9%BA%E9%97%B4%20#%20df%20-h%20%E6%A3%80%E6%9F%A5%E6%98%AF%E5%90%A6%E6%9C%89%E5%88%86%E5%8C%BA%E4%BD%BF%E7%94%A8%E7%8E%87(Use%)%E8%BF%87%E9%AB%98(%E6%AF%94%E5%A6%82%E8%B6%85%E8%BF%8790%)%20%E5%A6%82%E5%8F%91%E7%8E%B0%E6%9F%90%E4%B8%AA%E5%88%86%E5%8C%BA%E7%A9%BA%E9%97%B4%E6%8E%A5%E8%BF%91%E7%94%A8%E5%B0%BD%EF%BC%8C%E5%8F%AF%E4%BB%A5%E8%BF%9B%E5%85%A5%E8%AF%A5%E5%88%86%E5%8C%BA%E7%9A%84%E6%8C%82%E8%BD%BD%E7%82%B9%EF%BC%8C%E7%94%A8%E4%BB%A5%E4%B8%8B%E5%91%BD%E4%BB%A4%E6%89%BE%E5%87%BA%E5%8D%A0%E7%94%A8%E7%A9%BA%E9%97%B4%E6%9C%80%E5%A4%9A%E7%9A%84%E6%96%87%E4%BB%B6%E6%88%96%E7%9B%AE%E5%BD%95%EF%BC%9A%20#%20du%20-cks%20%20%7C%20sort%20-rn%20%7C%20head%20-n%2010%20%2022.%20%E7%A3%81%E7%9B%98I/O%E8%B4%9F%E8%BD%BD%20#%20iostat%20-x%201%202%20%E6%A3%80%E6%9F%A5I/O%E4%BD%BF%E7%94%A8%E7%8E%87(%util)%E6%98%AF%E5%90%A6%E8%B6%85%E8%BF%87100%%20%2023.%20%E7%BD%91%E7%BB%9C%E8%B4%9F%E8%BD%BD%20#%20sar%20-n%20DEV%20%E6%A3%80%E6%9F%A5%E7%BD%91%E7%BB%9C%E6%B5%81%E9%87%8F(rxbyt/s,%20txbyt/s)%E6%98%AF%E5%90%A6%E8%BF%87%E9%AB%98%20%2024.%20%E7%BD%91%E7%BB%9C%E9%94%99%E8%AF%AF%20#%20netstat%20-i%20%E6%A3%80%E6%9F%A5%E6%98%AF%E5%90%A6%E6%9C%89%E7%BD%91%E7%BB%9C%E9%94%99%E8%AF%AF(drop%20fifo%20colls%20carrier)%20%E4%B9%9F%E5%8F%AF%E4%BB%A5%E7%94%A8%E5%91%BD%E4%BB%A4%EF%BC%9A#%20cat%20/proc/net/dev%20%2025.%20%E7%BD%91%E7%BB%9C%E8%BF%9E%E6%8E%A5%E6%95%B0%E7%9B%AE%20#%20netstat%20-an%20%7C%20grep%20-E%20%E2%80%9C%5E(tcp)%E2%80%9D%20%7C%20cut%20-c%2068-%20%7C%20sort%20%7C%20uniq%20-c%20%7C%20sort%20-n%20%2026.%20%E8%BF%9B%E7%A8%8B%E6%80%BB%E6%95%B0%20#%20ps%20aux%20%7C%20wc%20-l%20%E6%A3%80%E6%9F%A5%E8%BF%9B%E7%A8%8B%E4%B8%AA%E6%95%B0%E6%98%AF%E5%90%A6%E6%AD%A3%E5%B8%B8%20(%E6%AF%94%E5%A6%82%E8%B6%85%E8%BF%87250)%20%2027.%20%E5%8F%AF%E8%BF%90%E8%A1%8C%E8%BF%9B%E7%A8%8B%E6%95%B0%E7%9B%AE%20#%20vmwtat%201%205%20%E5%88%97%E7%BB%99%E5%87%BA%E7%9A%84%E6%98%AF%E5%8F%AF%E8%BF%90%E8%A1%8C%E8%BF%9B%E7%A8%8B%E7%9A%84%E6%95%B0%E7%9B%AE%EF%BC%8C%E6%A3%80%E6%9F%A5%E5%85%B6%E6%98%AF%E5%90%A6%E8%B6%85%E8%BF%87%E7%B3%BB%E7%BB%9F%E9%80%BB%E8%BE%91CPU%E7%9A%844%E5%80%8D%20%2028.%20%E8%BF%9B%E7%A8%8B%20#%20top%20-id%201%20%E8%A7%82%E5%AF%9F%E6%98%AF%E5%90%A6%E6%9C%89%E5%BC%82%E5%B8%B8%E8%BF%9B%E7%A8%8B%E5%87%BA%E7%8E%B0%20%2029.%20%E7%BD%91%E7%BB%9C%E7%8A%B6%E6%80%81%20%E6%A3%80%E6%9F%A5DNS,%20%E7%BD%91%E5%85%B3%E7%AD%89%E6%98%AF%E5%90%A6%E5%8F%AF%E4%BB%A5%E6%AD%A3%E5%B8%B8%E8%BF%9E%E9%80%9A%20ping%20%20%20traceroute%20%20%20nslookup%20%20%20dig%20%2030.%20%E7%94%A8%E6%88%B7%20#%20who%20%7C%20wc%20-l%20%E6%A3%80%E6%9F%A5%E7%99%BB%E5%BD%95%E7%94%A8%E6%88%B7%E6%98%AF%E5%90%A6%E8%BF%87%E5%A4%9A%20(%E6%AF%94%E5%A6%82%E8%B6%85%E8%BF%8750%E4%B8%AA)%20%E4%B9%9F%E5%8F%AF%E4%BB%A5%E7%94%A8%E5%91%BD%E4%BB%A4%EF%BC%9A#%20uptime%20%2031.%20%E7%B3%BB%E7%BB%9F%E6%97%A5%E5%BF%97%20#%20cat%20/var/log/rflogview/errors%20%20%E6%A3%80%E6%9F%A5%E6%98%AF%E5%90%A6%E6%9C%89%E5%BC%82%E5%B8%B8%E9%94%99%E8%AF%AF%E8%AE%B0%E5%BD%95%20%E4%B9%9F%E5%8F%AF%E4%BB%A5%E6%90%9C%E5%AF%BB%E4%B8%80%E4%BA%9B%E5%BC%82%E5%B8%B8%E5%85%B3%E9%94%AE%E5%AD%97%EF%BC%8C%E4%BE%8B%E5%A6%82%EF%BC%9A%20%20#%20grep%20-i%20error%20/var/log/messages%20#%20grep%20-i%20fail%20/var/log/messages%20%20#%20egrep%20-i%20’error%7Cwarn’%20/var/log/messages%20%E6%9F%A5%E7%9C%8B%E7%B3%BB%E7%BB%9F%E5%BC%82%E5%B8%B8%2032%20%E6%A0%B8%E5%BF%83%E6%97%A5%E5%BF%97%20%20#%20dmesg%20%E6%A3%80%E6%9F%A5%E6%98%AF%E5%90%A6%E6%9C%89%E5%BC%82%E5%B8%B8%E9%94%99%E8%AF%AF%E8%AE%B0%E5%BD%95%20%2033.%20%E7%B3%BB%E7%BB%9F%E6%97%B6%E9%97%B4%20#%20date%20%E6%A3%80%E6%9F%A5%E7%B3%BB%E7%BB%9F%E6%97%B6%E9%97%B4%E6%98%AF%E5%90%A6%E6%AD%A3%E7%A1%AE%20%E5%BD%93%E5%89%8D%E6%97%B6%E9%97%B4:%20date%20+%22%Y-%m-%d%20%H:%M:%S%22%20%2034.%20%E6%89%93%E5%BC%80%E6%96%87%E4%BB%B6%E6%95%B0%E7%9B%AE%20#%20lsof%20%7C%20wc%20-l%20%E6%A3%80%E6%9F%A5%E6%89%93%E5%BC%80%E6%96%87%E4%BB%B6%E6%80%BB%E6%95%B0%E6%98%AF%E5%90%A6%E8%BF%87%E5%A4%9A%20%2035.%20%E6%97%A5%E5%BF%97%20#%20logwatch%20?print%20%E9%85%8D%E7%BD%AE/etc/log.d/logwatch.conf%EF%BC%8C%E5%B0%86%20Mailto%20%E8%AE%BE%E7%BD%AE%E4%B8%BA%E8%87%AA%E5%B7%B1%E7%9A%84email%20%E5%9C%B0%E5%9D%80%EF%BC%8C%E5%90%AF%E5%8A%A8mail%E6%9C%8D%E5%8A%A1%20(sendmail%E6%88%96%E8%80%85postfix)%EF%BC%8C%E8%BF%99%E6%A0%B7%E5%B0%B1%E5%8F%AF%E4%BB%A5%E6%AF%8F%E5%A4%A9%E6%94%B6%E5%88%B0%E6%97%A5%E5%BF%97%E6%8A%A5%E5%91%8A%E4%BA%86%E3%80%82%20%20%E7%BC%BA%E7%9C%81logwatch%E5%8F%AA%E6%8A%A5%E5%91%8A%E6%98%A8%E5%A4%A9%E7%9A%84%E6%97%A5%E5%BF%97%EF%BC%8C%E5%8F%AF%E4%BB%A5%E7%94%A8#%20logwatch%20?print%20?range%20all%20%E8%8E%B7%E5%BE%97%E6%89%80%E6%9C%89%E7%9A%84%E6%97%A5%E5%BF%97%E5%88%86%E6%9E%90%E7%BB%93%E6%9E%9C%E3%80%82%20%20%E5%8F%AF%E4%BB%A5%E7%94%A8#%20logwatch%20?print%20?detail%20high%20%E8%8E%B7%E5%BE%97%E6%9B%B4%E5%85%B7%E4%BD%93%E7%9A%84%E6%97%A5%E5%BF%97%E5%88%86%E6%9E%90%E7%BB%93%E6%9E%9C(%E8%80%8C%E4%B8%8D%E4%BB%85%E4%BB%85%E6%98%AF%E5%87%BA%E9%94%99%E6%97%A5%E5%BF%97)%E3%80%82%20%2036.%E6%9D%80%E6%8E%8980%E7%AB%AF%E5%8F%A3%E7%9B%B8%E5%85%B3%E7%9A%84%E8%BF%9B%E7%A8%8B%20lsof%20-i%20:80%7Cgrep%20-v%20%22PID%22%7Cawk%20’%7Bprint%20%22kill%20-9%22,%242%7D’%7Csh%20%2037.%E6%B8%85%E9%99%A4%E5%83%B5%E6%AD%BB%E8%BF%9B%E7%A8%8B%E3%80%82%20ps%20-eal%20%7C%20awk%20’%7B%20if%20(%242%20==%20%22Z%22)%20%7Bprint%20%244%7D%7D’%20%7C%20kill%20-9%20%2038.tcpdump%20%E6%8A%93%E5%8C%85%20%EF%BC%8C%E7%94%A8%E6%9D%A5%E9%98%B2%E6%AD%A280%E7%AB%AF%E5%8F%A3%E8%A2%AB%E4%BA%BA%E6%94%BB%E5%87%BB%E6%97%B6%E5%8F%AF%E4%BB%A5%E5%88%86%E6%9E%90%E6%95%B0%E6%8D%AE%20%20#%20tcpdump%20-c%2010000%20-i%20eth0%20-n%20dst%20port%2080%20%3E%20/root/pkts%20%2039.%E7%84%B6%E5%90%8E%E6%A3%80%E6%9F%A5IP%E7%9A%84%E9%87%8D%E5%A4%8D%E6%95%B0%20%E5%B9%B6%E4%BB%8E%E5%B0%8F%E5%88%B0%E5%A4%A7%E6%8E%92%E5%BA%8F%20%E6%B3%A8%E6%84%8F%20%E2%80%9C-t%5C%20+0%E2%80%B3%20%E4%B8%AD%E9%97%B4%E6%98%AF%E4%B8%A4%E4%B8%AA%E7%A9%BA%E6%A0%BC%20#%20less%20pkts%20%7C%20awk%20%7B’printf%20%243%22%5Cn%22’%7D%20%7C%20cut%20-d.%20-f%201-4%20%7C%20sort%20%7C%20uniq%20-c%20%7C%20awk%20%7B’printf%20%241%22%20%22%242%22%5Cn%22’%7D%20%7C%20sort%20-n%20-t%5C%20+0%20%2040.%E6%9F%A5%E7%9C%8B%E6%9C%89%E5%A4%9A%E5%B0%91%E4%B8%AA%E6%B4%BB%E5%8A%A8%E7%9A%84php-cgi%E8%BF%9B%E7%A8%8B%20netstat%20-anp%20%7C%20grep%20php-cgi%20%7C%20grep%20%5Etcp%20%7C%20wc%20-l%20%2041.%E5%88%A9%E7%94%A8iptables%E5%AF%B9%E5%BA%94%E7%AE%80%E5%8D%95%E6%94%BB%E5%87%BB%20netstat%20-an%20%7C%20grep%20-v%20LISTEN%20%7C%20awk%20%E2%80%98%7Bprint%20%245%7D%E2%80%99%20%7Cgrep%20-v%20127.0.0.1%7Cgrep%20-v%20%E6%9C%AC%E6%9C%BAip%7Csed%20%E2%80%9Cs/::ffff://g%E2%80%9D%7Cawk%20%E2%80%98BEGIN%20%7B%20FS=%E2%80%9D:%E2%80%9D%20%7D%20%7B%20Num%5B%241%5D++%20%7D%20END%20%7B%20for(i%20in%20Num)%20if(Num%3E8)%20%7B%20print%20i%7D%20%7D%E2%80%99%20%7Cgrep%20%E2%80%98%5B0-9%5D%5C%7B1,3%5C%7D%5C.%5B0-9%5D%5C%7B1,3%5C%7D%5C.%5B0-9%5D%5C%7B1,3%5C%7D%5C.%5B0-9%5D%5C%7B1,3%5C%7D%E2%80%99%7C%20xargs%20-i%5B%5D%20iptables%20-I%20INPUT%20-s%20%5B%5D%20-j%20DROP%20%20Num%3E8%E9%83%A8%E5%88%86%E8%AE%BE%E5%AE%9A%E5%80%BC%E4%B8%BA%E9%98%80%E5%80%BC%EF%BC%8C%E8%BF%99%E6%9D%A1%E5%8F%A5%E5%AD%90%E4%BC%9A%E8%87%AA%E5%8A%A8%E5%B0%86netstat%20-an%20%E4%B8%AD%E6%9F%A5%E5%88%B0%E7%9A%84%E6%9D%A5%E8%87%AA%E5%90%8C%E4%B8%80%EF%BC%A9%EF%BC%B0%E7%9A%84%E8%B6%85%E8%BF%87%E4%B8%80%E5%AE%9A%E9%87%8F%E7%9A%84%E8%BF%9E%E6%8E%A5%E7%9A%84%E5%88%97%E5%85%A5%E7%A6%81%E6%AD%A2%E8%8C%83%E5%9B%B4%E3%80%82%20%E5%9F%BA%E4%B8%AD%E6%9C%AC%E6%9C%BAip%E6%94%B9%E6%88%90%E4%BD%A0%E7%9A%84%E6%9C%8D%E5%8A%A1%E5%99%A8%E7%9A%84ip%E5%9C%B0%E5%9D%80%20%2042.%20%E6%80%8E%E6%A0%B7%E7%9F%A5%E9%81%93%E6%9F%90%E4%B8%AA%E8%BF%9B%E7%A8%8B%E5%9C%A8%E5%93%AA%E4%B8%AACPU%E4%B8%8A%E8%BF%90%E8%A1%8C%EF%BC%9F%20#%20ps%20-eo%20pid,args,psr%20%2043.%20%E6%9F%A5%E7%9C%8B%E7%A1%AC%E4%BB%B6%E5%88%B6%E9%80%A0%E5%95%86%20dmidecode%20-s%20system-product-name%20%2044.perl%E5%A6%82%E4%BD%95%E7%BC%96%E8%AF%91%E6%88%90%E5%AD%97%E8%8A%82%E7%A0%81%EF%BC%8C%E8%BF%99%E6%A0%B7%E5%9C%A8%E5%A4%84%E7%90%86%E5%A4%8D%E6%9D%82%E9%A1%B9%E7%9B%AE%E7%9A%84%E6%97%B6%E5%80%99%E4%BC%9A%E6%9B%B4%E5%BF%AB%E4%B8%80%E7%82%B9%EF%BC%9F%20perlcc%20-B%20-o%20webseek%20webseek.pl%20%2045.%20%E7%BB%9F%E8%AE%A1var%E7%9B%AE%E5%BD%95%E4%B8%8B%E6%96%87%E4%BB%B6%E4%BB%A5M%E4%B8%BA%E5%A4%A7%E5%B0%8F,%E4%BB%A5%E5%88%97%E8%A1%A8%E5%BD%A2%E5%BC%8F%E5%88%97%E5%87%BA%E6%9D%A5%E3%80%82%20find%20/var%20-type%20f%20%7C%20xargs%20ls%20-s%20%7C%20sort%20-rn%20%7C%20awk%20%E2%80%98%7Bsize=%241/1024;%20printf(%E2%80%9C%dMb%20%s%5Cn%E2%80%9D,%20size,%242);%7D%E2%80%99%20%7C%20head%20%E6%9F%A5%E6%89%BEvar%E7%9B%AE%E5%BD%95%E4%B8%8B%E6%96%87%E4%BB%B6%E5%A4%A7%E4%BA%8E100M%E7%9A%84%E6%96%87%E4%BB%B6%EF%BC%8C%E5%B9%B6%E7%BB%9F%E8%AE%A1%E6%96%87%E4%BB%B6%E7%9A%84%E4%B8%AA%E6%95%B0%20find%20/var%20-size%20+100M%20-type%20f%20%7C%20tee%20file_list%20%7C%20wc%20-l%20%2046.%20sed%20%E6%9F%A5%E6%89%BE%E5%B9%B6%E6%9B%BF%E6%8D%A2%E5%86%85%E5%AE%B9%20sed%20-i%20%E2%80%9Cs/varnish/LTCache/g%E2%80%9D%20%60grep%20%E2%80%9CVia%E2%80%9D%20-rl%20/usr/local/src/varnish-2.0.4%60%20%20sed%20-i%20%E2%80%9Cs/X-Varnish/X-LTCache/g%E2%80%9D%20%60grep%20%E2%80%9CX-Varnish%E2%80%9D%20-rl%20/usr/local/src/varnish-2.0.4%60%20%2047.%20%E6%9F%A5%E7%9C%8B%E6%9C%8D%E5%8A%A1%E5%99%A8%E5%88%B6%E9%80%A0%E5%95%86%20dmidecode%20-s%20system-product-name%20%2048.%20wget%20%E6%A8%A1%E6%8B%9Fuser-agent%E6%8A%93%E5%8F%96%E7%BD%91%E9%A1%B5%20wget%20-m%20-e%20robots=off%20-U%20%E2%80%9CMozilla/5.0%20(Windows;%20U;%20Windows%20NT%205.1;%20zh-CN;%20rv:1.9.1.6)%20Gecko/20091201%20Firefox/3.5.6%E2%80%9D%20./%5C(%5B%5E/%5D%5C%7B1,%5C%7D%5C)%24:%5C1:g%E2%80%99%20%2051.%E5%85%B3%E4%BA%8ECND%E5%AE%9E%E6%96%BD%E5%87%A0%E4%B8%AA%E7%9B%B8%E5%85%B3%E7%9A%84%E7%BB%9F%E8%AE%A1%20%E7%BB%9F%E8%AE%A1%E4%B8%80%E4%B8%AA%E7%9B%AE%E5%BD%95%E4%B8%AD%E7%9A%84%E7%9B%AE%E5%BD%95%E4%B8%AA%E6%95%B0%20ls%20-l%20%7C%20awk%20%E2%80%98/%5Ed/%E2%80%99%20%7C%20wc%20-l%20%20%E7%BB%9F%E8%AE%A1%E4%B8%80%E4%B8%AA%E7%9B%AE%E5%BD%95%E4%B8%AD%E7%9A%84%E6%96%87%E4%BB%B6%E4%B8%AA%E6%95%B0%20ls%20-l%20%7C%20awk%20%E2%80%98/%5E-/%E2%80%99%20%7C%20wc%20-l%20%20%E7%BB%9F%E8%AE%A1%E4%B8%80%E4%B8%AA%E7%9B%AE%E5%BD%95%E4%B8%AD%E7%9A%84%E5%85%A8%E9%83%A8%E6%96%87%E4%BB%B6%E6%95%B0%20find%20./%20-type%20f%20-print%20%7C%20wc%20-l%20%20%E7%BB%9F%E8%AE%A1%E4%B8%80%E4%B8%AA%E7%9B%AE%E5%BD%95%E4%B8%AD%E7%9A%84%E5%85%A8%E9%83%A8%E5%AD%90%E7%9B%AE%E5%BD%95%E6%95%B0%20find%20./%20-type%20d%20-print%20%7C%20wc%20-l%20%20%E7%BB%9F%E8%AE%A1%E6%9F%90%E7%B1%BB%E6%96%87%E4%BB%B6%E7%9A%84%E5%A4%A7%E5%B0%8F:%20find%20./%20-name%20%E2%80%9C*.jpg%E2%80%9D%20-exec%20wc%20-c%20%7B%7D%20%5C;%7Cawk%20%E2%80%98%7Bprint%20%241%7D%E2%80%99%7Cawk%20%E2%80%98%7Ba+=%241%7DEND%7Bprint%20a%7D%E2%80%99%20%2053.%20%E6%9F%A5%E6%89%BE%E5%8D%A0%E7%94%A8%E7%A3%81%E7%9B%98IO%E6%9C%80%E5%A4%9A%E7%9A%84%E8%BF%9B%E7%A8%8B%20wget%20-c%20)

 

美国大众机械网站11月15日消息:美国的F-35″闪电II”战斗机可以避开雷达的侦测,神不知鬼不觉地侵入敌方领空发起突袭。但是,这种先进的隐身飞机存在一个很大的缺陷——容易遭受黑客攻击。随着它最终进入量产阶段,美国空军正在想方设法地弥补漏洞,以防黑客利用其上可与各方连通的系统,进而造成灾难性的后果。


正如《空军时报》所报道那样,F-35本身是相当安全的。它设计有多层安全保障,包括飞行员专用的个人身份密码、向机载计算机上传任务包时所需的安全认证等。然而,无论是家用电脑、电话、平板电脑,还是价格昂贵的战斗机,与外部世界的连接越多,可能被黑客利用的漏洞也就越多。F-35的最大优势在于,它不但能与各军兵种的相应系统广泛连接,而且能够使用与任务相关的大数据。

参考
http://blog.csdn.net/cankingapp/article/details/50858229

全世界的F-35机队至少会与两个旨在最大限度提高效率的安全网络相连接。其中一个就是自动后勤信息系统(ALIS),它可以在全球范围内持续追踪每一架飞机中存在的问题和所需零备件及设备的位置。F-35战斗机的制造商在其发布的视频中介绍自动后勤信息系统时称,”无论是在哪一个国家,每个F-35中队都配有一个由13台服务器构成的自动后勤信息包,并与全球自动后勤信息系统相连。每一架F-35都可以将后勤数据发送给其所在国的中心接入点,再由这个接入点转发至洛克希德公司在德克萨斯州沃斯堡的中央服务器。事实上,这个系统数据回传量之大,已经让一些国家开始担心有可能会泄露过多涉及其F-35战斗机行动的信息。”

http://www.android100.org/html/201502/16/119635.html
http://blog.inet198.cn/?yueqian\_scut/article/details/51417547
http://www.codota.com/android/classes/android.service.notification.NotificationListenerService
http://www.jianshu.com/p/6ddbd2927620
http://www.jianshu.com/p/352c79eb0c96
http://www.jianshu.com/p/e0a06d5abf98
http://www.jianshu.com/p/82713b43b59e
http://www.2cto.com/kf/201408/325900.html
http://blog.csdn.net/yihongyuelan/article/details/40977323
http://blog.csdn.net/yihongyuelan/article/details/41084165

另一个网络系统是联合重组企业系统(JRE),它维护着一个可由全球F-35机队共享的潜在对手传感器及武器系统资料库。举例来说,这个系统会搜寻并共享敌方雷达和电子战信号的相关信息,这样各国空军就不必再自行追踪这类信息了。这种能力使得拥有F-35战斗机的国家能够根据预期威胁,量身定制任务,进行先发制人的打击。

http://www.bkjia.com/Androidjc/864526.html
http://www.smartcitychina.cn/QianYanJiShu/2016-07/7519.html
http://w4lle.github.io/2016/07/24/Android%E8%BF%9B%E7%A8%8B%E4%BF%9D%E6%B4%BB%E4%B9%8B%E7%BB%91%E5%AE%9A%E7%B3%BB%E7%BB%9F%E6%9C%8D%E5%8A%A1/
http://www.codes51.com/article/detail\_415644.html
http://hoyoshaw.github.io/2015/12/15/%E9%80%9A%E7%9F%A5%E7%AE%A1%E7%90%86%E5%8A%9F%E8%83%BD%E4%B8%8E%E5%B8%B8%E9%A9%BB%E9%80%9A%E7%9F%A5%E6%A0%8F%E7%9A%84%E8%AE%BE%E8%AE%A1%E4%B8%8E%E5%AE%9E%E7%8E%B0/
http://hoyoshaw.github.io/2015/12/11/Android-4-3-NotificationListenerService-%E7%9A%84%E4%BD%BF%E7%94%A8/
http://www.aspku.com/kaifa/android/179203.html
http://ju.outofmemory.cn/entry/215197
http://www.tuicool.com/articles/RjqIry
https://developer.android.com/reference/android/service/notification/NotificationListenerService.html
http://www.tuicool.com/articles/feuAvi
http://www.zhihu.com/question/33540416
http://www.0791quanquan.com/news\_keji/topic\_1429431/
http://download.csdn.net/detail/yihongyuelan/8146319

虽然这些网络采取了严格的网络安全防护措施,但无论是在和平时期,还是在战争期间,它们无疑都会成为各国黑客的重点目标。黑客们可能会设法使这些网络完全陷入瘫痪,或扰乱全球后勤体系,甚至会让F-35无法获得急需的零备件。他们也可能会破坏自动后勤信息系统数据的完整性,例如在全球范围内造成F-35发动机短缺的假象。此外,黑客们还可能会在联合重组企业系统中加入能够损害任务安全性的错误数据,缩短某种武器系统的射程,从而使飞行员误以为自己身处远离交战区的安全空域。


即使是用于训练飞行员的F-35模拟器也有可能会将数据泄露给对手。因为这些模拟器的程序会尽可能地反映F-35的实际飞行状态,所以对模拟器数据进行反推便可获得这种飞机的真实数据。

Rxjava
http://gank.io/post/560e15be2dca930e00da1083
http://gank.io/post/56e80c2c677659311bed9841
http://www.infoq.com/cn/articles/RxAndroid-basics
http://www.infoq.com/cn/articles/rxandroid-basics-2
https://github.com/bboyfeiyu/android-tech-frontier/tree/master/androidweekly/%E4%BD%BF%E7%94%A8RxJava.Observable%E5%8F%96%E4%BB%A3AsyncTask%E5%92%8CAsyncTaskLoader?utm\_source=www.race604.com
http://www.jianshu.com/p/749c4531d108
http://jayfeng.com/2016/03/22/Android-Bitmap%E9%9D%A2%E9%9D%A2%E8%A7%82/
http://mouxuejie.com//blog/2016-03-27/rxjava-basis/
http://blog.chengyunfeng.com/?p=983
http://www.jdon.com/idea/rxjava/
http://www.androidweekly.cn/android-dev-special-weekly-rxjava-rxandroid-issue-0/
http://www.androidweekly.cn/android-dev-special-weekly-rxjava-rxandroid-issue-1/
http://www.cnblogs.com/zhaoyanjun/p/5535651.html
http://www.qingpingshan.com/rjbc/java/150188.html
http://jcodecraeer.com/a/anzhuokaifa/androidkaifa/2015/0430/2815.html

美国空军F-35综合办公室主任斯蒂芬·乔斯特准将在接受《防务新闻》采访时表示,”在很多节点上都存在漏洞,不仅全球联网系统会因此而易受攻击,而且用于支持F-35的无线系统也有可能成为黑客入侵的切入点,我们目前的当务之急就是尽快弥补这些漏洞。”


求《黑客社会工程学攻击》黑客软件与安全资料,随书DVD黑客工具包,给个迅雷下载地址呗….

Retrofit
http://www.infoq.com/cn/news/2016/06/Android-7-0-Retrofit
http://www.infoq.com/cn/news/2016/09/Android-weekly-android-2-2-weixi
http://mp.weixin.qq.com/s?\_\_biz=MzI1NjEwMTM4OA==&mid=2651232170&idx=1&sn=f4d7eb8f35ebf3b13696562ca3172bac&chksm=f1d9eac9c6ae63df357c3a96aa0218b5d66237c5411de5b34cd24ddb7a1d258b34444966d8c6&scene=0\#rd

ed2k://|file|%E9%9B%B6%E6%97%A5%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8%E5%B7%A5%E5%85%B7%E5%8C%85.rar|213272708|24e29666ca700a50d351b83da682c5d0|h=54FBQC5Y3MU6IRPQZZJQIFYH36SML62X|/
ed2k://|file|WEB%E6%94%BB%E5%87%BB%E5%B7%A5%E5%85%B7%E5%8C%85.rar|114306375|e204673689a0a058490c9a4810d92e7f|h=OAFXP4C6AGSBFEWRWGVTXYCKR2DUI7CT|/
ed2k://|file|%E8%BD%AF%E4%BB%B6%E6%94%BB%E5%87%BB%E5%B7%A5%E5%85%B7.7z|439220895|fa5768da195663fee02b682e30910360|h=5EP56ZZOJSLVL2ATVOIWRG3GASS3INXW|/
ed2k://|file|%E6%9C%A8%E9%A9%AC%E7%97%85%E6%AF%92%E5%B7%A5%E5%85%B7%E5%8C%85.rar|327191749|be6958d3976b6b491e3f50bcc3c42489|h=V42P7VE3ARCWDUZFXCDFX5YLAH4XRPGK|/
ed2k://|file|%5B%E6%8E%A8%E8%8D%90%5D%E9%BB%91%E5%AE%A2%E8%B5%84%E6%96%99%E6%A1%A3%E6%A1%88%E5%BA%93.rar|1708106505|52c58db979ab02ede0cccae9ee8c02b2|h=IGSP5DIK22JUJ3PI5NWCS2FEFO5ENROV|/
ed2k://|file|%E7%B3%BB%E7%BB%9F%E6%94%BB%E5%87%BB%E5%B7%A5%E5%85%B7%E5%8C%85.rar|196045742|e78518d484498412f99873768de4f984|h=JSJZUMIU74OF4CXI6KKJ7H2SFVHK4Y3D|/
ed2k://|file|%E6%97%A0%E7%BA%BF%E6%94%BB%E5%87%BB%E5%B7%A5%E5%85%B7%E5%8C%85.rar|762937532|fb466f33a42313deea0b67ad1588846b|h=DUML3J6G4ZIU3WN2WXN7VE65EKJVIDWJ|/
ed2k://|file|%E4%BB%A3%E7%A0%81%E6%94%BB%E5%87%BB%E5%B7%A5%E5%85%B7%E5%8C%85.rar|74969540|7b193ce654e1df9d63bf96cc3c078eec|h=E74YW6ZRLTDYTOAMMUWLFIQIEMMN2VL4|/
ed2k://|file|%E5%9B%BE%E4%B9%A6%E4%B8%AD%E8%BD%AF%E4%BB%B6%E4%BB%A5%E5%8F%8A%E5%85%89%E7%9B%98%E6%96%87%E4%BB%B6.rar|131261324|b09cf97a76c71e5347b3058c51b27418|h=3QV2DMXG4CUDA2NX5HVOZYH67NG37D7O|/
ed2k://|file|%E7%A4%BE%E4%BC%9A%E5%B7%A5%E7%A8%8B%E5%AD%A6%E5%B7%A5%E5%85%B7%E5%8C%85.rar|186386880|edccd24a97320948e1f5a7a5bfb4182b|h=3UTG43MHAQQWARNIGOUFQKO7O35ZFSTO|/
ed2k://|file|2007%E5%B9%B4%E4%B8%96%E7%95%8C%E9%BB%91%E5%AE%A2%E5%B7%A5%E5%85%B7TOP%E7%B2%BE%E9%80%89.rar|52532749|08ad0dfe6267060037f6b0ca911a95c8|h=UN6OQEAFVZWSQT3JRWU4RYUBOWNPRV6A|/
ed2k://|file|%5B%E5%AE%89%E5%85%A8%E7%9B%9B%E5%85%B8%5DSyngress%E5%AE%89%E5%85%A8%E4%B8%9B%E4%B9%A6.rar|2012439865|a0b276df908680a53598b222cdb53b53|h=WNIUTGEIYIBF4NGBMTQRWXEO52GJWT7D|/
ed2k://|file|%E5%AE%89%E5%85%A8%E9%98%B2%E6%8A%A4%E5%B7%A5%E5%85%B7%E5%8C%85.rar|122370261|1c82109a90129146303bfa0f05e3b990|h=65SB267NY3SQCCRXBJ7QHKWWNSMEIIWU|/
以上链接请用迅雷下载,大概有5.9GB左右

http://www.jianshu.com/p/5dcdc5798d85

https://github.com/EisRoot/DataBindingEasyAdapter
https://jiangchunyu.github.io/2016/09/06/google-%E5%AE%98%E6%96%B9mvp%E5%AE%9E%E4%BE%8B%E7%9A%84%E5%AE%9E%E8%B7%B5%E4%B9%8Bmvp-databinding-Rxjava-%E4%B8%80/
http://www.jianshu.com/p/cf3ebfaf1e10
http://www.jianshu.com/p/2fc41a310f79


DataBinding