$ ip link# 检查网卡 $ lspci -k $ sudo ip linkset wlan0 up # 打开网卡 Operation not possible due to RF-kill $ sudo rfkill list all wifi 被 Soft blocked 了 $ sudo rfkill unblock wifi $ sudo ip linkset wlan0 up
C:\Users\XTL>ssh-keygen -t rsa <== 建立密钥对,-t表示类型选项,这里采用rsa加密算法 Generating public/private rsa key pair. Enter file inwhich to save the key (C:\Users\XTL/.ssh/id_rsa): <== 按 Enter,或者输入密钥保存位置及文件名 Enter passphrase (empty for no passphrase): <== 输入密钥锁码,或按Enter留空,可以留空 Enter same passphrase again: Your identification has been saved in C:\Users\XTL/.ssh/id_rsa. <== 私钥(无后缀) Your public key has been saved in C:\Users\XTL/.ssh/id_rsa.pub. <== 公钥 The key fingerprint is: SHA256:3LwQzWzOXlvm3PmCnJBETPClUVf6xgmT/u7XS/07C28 xtl@Matrix-F-58-54-4C The key's randomart image is: +---[RSA 3072]----+ | .+o.o ...| | =o+ ... | | ..B +. | | . B. . oo.| | S.=...o.+| | ooo *.oo| | oo.+o++| | + *E=| | oOO| +----[SHA256]-----+
Options: --system Show the system journal --user Show the user journal for the current user -S --since=DATE Show entries not older than the specified date -U --until=DATE Show entries not newer than the specified date -b --boot[=ID] Show current boot or the specified boot -u --unit=UNIT Show logs from the specified unit --user-unit=UNIT Show logs from the specified user unit -g --grep=PATTERN Show entries with MESSAGE matching PATTERN --case-sensitive[=BOOL] Force case sensitive or insensitive matching -f --follow Follow the journal -n --lines[=INTEGER] Number of journal entries to show --no-tail Show all lines, even in follow mode -r --reverse Show the newest entries first -o --output=STRING Change journal output mode (short, short-precise, short-iso, short-iso-precise, short-full, short-monotonic, short-unix, verbose, export, json, json-pretty, json-sse, json-seq, cat, with-unit) --output-fields=LIST Select fields to printin verbose/export/json modes --utc Express timein Coordinated Universal Time (UTC)