Banner

My Tech Blog (๊ถŒํ•œ)

์˜ค๋Š˜์˜ ๋ช…์–ธ
" ์‹ ์€ ์ธ์ƒ์—์„œ ์ตœ๊ณ ์˜ ๊ฒƒ๋“ค์„ ํ•ญ์ƒ ๋‘๋ ค์›€ ๋’ค์— ๋†“์Šต๋‹ˆ๋‹ค. "
- ์œŒ ์Šค๋ฏธ์Šค (์˜ํ™” ๋ฐฐ์šฐ)
โœ… chmod`chmod` ๋Š” bash๋‚˜ ์…ธ์—์„œ ํŒŒ์ผ ๋˜๋Š” ํด๋”์˜ ๊ถŒํ•œ์„ ๋ณ€๊ฒฝํ•  ๋•Œ ์‚ฌ์šฉํ•˜๋Š” ๋ช…๋ น์–ด์ด๋‹ค. โœ… ์‚ฌ์šฉ๋ฒ•8์ง„์ˆ˜ ๋ชจ๋“œ๋ฅผ ์‚ฌ์šฉํ•˜๊ฑฐ๋‚˜ ๋ฌธ์ž์—ด ๋ชจ๋“œ๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ๊ถŒํ•œ์„ ๋ณ€๊ฒฝํ•  ์ˆ˜ ์žˆ๋‹ค.# 8์ง„์ˆ˜ ๋ชจ๋“œ์˜๊ฒฝ์šฐchmod [์˜ต์…˜] [์†Œ์œ ์ž๊ถŒํ•œ][๊ทธ๋ฃน๊ถŒํ•œ][๊ทธ์™ธ์‚ฌ์šฉ์ž๊ถŒํ•œ] [ํŒŒ์ผ๋˜๋Š”ํด๋”]# ๋ฌธ์ž์—ด ๋ชจ๋“œ์˜ ๊ฒฝ์šฐchmod [์˜ต์…˜] [๋ ˆํผ๋Ÿฐ์Šค][์—ฐ์‚ฐ์ž][๊ถŒํ•œ] [ํŒŒ์ผ๋˜๋Š”ํด๋”] โœ… ๊ถŒํ•œ ํ™•์ธํŒŒ์ผ ๋˜๋Š” ํด๋”์˜ ๊ถŒํ•œ์€ rwx ๋กœ ํ‘œ์‹œ๋˜๋ฉฐ ์…ธ์—์„œ ls -al ๋ช…๋ น์„ ํ†ตํ•ด ํ™•์ธํ•  ์ˆ˜ ์žˆ๋‹ค. ๋งจ ์•ž์˜ d ๋Š” ํ•ด๋‹น ํ•ญ๋ชฉ์ด ํŒŒ์ผ์ธ์ง€ ํด๋”์ธ์ง€๋ฅผ ๋‚˜ํƒ€๋‚ด๋ฉฐ d ๊ฐ€ ์žˆ์œผ๋ฉด ํด๋”์ด๋‹ค. โœ… ํŒŒ์ผ ๊ถŒํ•œ ์ •๋ณด (์†Œ์œ ๊ถŒ/ํ—ˆ๊ฐ€๊ถŒ) ํ™•์ธdrwxr-xr-x 2 root root 4096 Apr 22 16:59 conoryํŒŒ์ผType ํผ๋ฏธ์…˜์ •๋ณด ..
ยท AWS
1. SSH (Secure Shell)SSH๋Š” Secure Shell์˜ ์•ฝ์ž๋กœ, ๋„คํŠธ์›Œํฌ๋ฅผ ํ†ตํ•ด ์•ˆ์ „ํ•˜๊ฒŒ ์ปดํ“จํ„ฐ์— ์›๊ฒฉ ์ ‘์†ํ•˜๊ธฐ ์œ„ํ•œ ํ”„๋กœํ† ์ฝœโ–ถ ์•”ํ˜ธํ™”๋œ ํ†ต์‹ : ๋ฐ์ดํ„ฐ๋ฅผ ์•ˆ์ „ํ•˜๊ฒŒ ์ „์†กํ•˜๊ธฐ ๋•Œ๋ฌธ์— ๋„์ฒญ์ด๋‚˜ ๋ฐ์ดํ„ฐ ๋ณ€์กฐ๋ฅผ ๋ฐฉ์ง€. โ–ถ ์›๊ฒฉ ์„œ๋ฒ„ ๊ด€๋ฆฌ: AWS EC2 ๊ฐ™์€ ์„œ๋ฒ„์— ์ ‘์†ํ•ด์„œ ๋ช…๋ น์–ด๋ฅผ ์‹คํ–‰ํ•˜๊ฑฐ๋‚˜ ํŒŒ์ผ์„ ๊ด€๋ฆฌํ•  ์ˆ˜ ์žˆ๋‹ค. โ–ถ AWS์—์„œ SSH๋Š” ๋ณดํ†ต ํ„ฐ๋ฏธ๋„์ด๋‚˜ ๋ช…๋ น์–ด ์ฐฝ(CLI)์—์„œ ์‹คํ–‰ํ•˜๋Š” ๋ช…๋ น์–ด๋ฅผ ํ†ตํ•ด ์‚ฌ์šฉ๋˜๋Š”๋ฐ, ์•„๋ž˜์™€ ๊ฐ™์€ ๋ช…๋ น์–ด๋ฅผ ์‚ฌ์šฉํ•œ๋‹ค. ssh -i "your-key.pem" ec2-user@your-ec2-ip2. 3 Ways to connect to EC2 Instance- SSH- PuTTY- EC2 Instance Connect ๐Ÿ˜Š If one method works (SSH, ..
ยท AWS
1. How can users access AWS ? - To access AWS, you have three options:    โ€ข   AWS Management Console (protected by password + MFA)    โ€ข  AWS Command Line Interface (CLI): protected by access keys    โ€ข  AWS Software Developer Kit (SDK) - for code: protected by access keys  - Access Keys are generated through the AWS Console  - Users manage their own access keys  - Access Keys are secret, just lik..
1. ๋ฌธ์ œ ํด๋”์— ์ ‘๊ทผ ๊ถŒํ•œ์ด ์—†์–ด์„œ ์ƒˆ ํด๋”๊ฐ€ ๋งŒ๋“ค์–ด์ง€์ง€ ์•Š๊ฑฐ๋‚˜, ํŒŒ์ผ์ด ์ €์žฅ๋˜์ง€ ์•Š๋Š” ๋ฌธ์ œ ์—๋Ÿฌ๋ฉ”์„ธ์ง€์ด ์œ„์น˜์— ์ €์žฅํ•  ๊ถŒํ•œ์ด ์—†์Šต๋‹ˆ๋‹ค. ๊ถŒํ•œ์„ ์–ป์œผ๋ ค๋ฉด ๊ด€๋ฆฌ์ž์—๊ฒŒ ๋ฌธ์˜ํ•˜์‹ญ์‹œ์˜ค.๋Œ€์‹  ๋‚ด ๋ฌธ์„œ ํด๋”์— ์ €์žฅํ•˜์‹œ๊ฒ ์Šต๋‹ˆ๊นŒ?    2. ํ•ด๊ฒฐ๋ฒ•์›์ธ์€ ์‚ฌ์šฉ์ž ๊ถŒํ•œ ๋ฌธ์ œ ๋ฌธ์ œ๊ฐ€ ๋ฐœ์ƒํ•œ ํด๋” ์šฐํด๋ฆญ > ์†์„ฑ(R) > ๋ณด์•ˆ ํƒญ์œผ๋กœ ๊ฐ€๋ฉด ๊ทธ๋ฃน ๋˜๋Š” ์‚ฌ์šฉ์ž ์ด๋ฆ„ ๋ชฉ๋ก์ด ๋œฌ๋‹ค.์—ฌ๊ธฐ์„œ ์ง€๊ธˆ ๋กœ๊ทธ์ธํ•˜๊ณ  ์žˆ๋Š” ๊ณ„์ •์„ ์„ ํƒํ•œ๋‹ค. ์•„๋งˆ ๋Œ€๋ถ€๋ถ„ ์ด ๋ฌธ์ œ๋ฅผ ๊ฒช๋Š” ์‚ฌ๋žŒ๋“ค์€ USER๊ณ„์ •์œผ๋กœ ์ ‘์†ํ•ด ์žˆ๊ธฐ ๋•Œ๋ฌธ์— ์ ‘๊ทผ ๊ถŒํ•œ์ด ์ œํ•œ๋œ ๊ฒƒ์ด๋‹ค. ๋ชฉ๋ก์—์„œ  User๋ฅผ ์„ ํƒํ•˜๊ณ  `ํŽธ์ง‘` ๋ฒ„ํŠผ ํด๋ฆญ   ํ•„์š”ํ•œ ๊ถŒํ•œ์„ ๋ชจ๋‘ ํ—ˆ์šฉ์œผ๋กœ ๋ฐ”๊พธ๊ณ  ์ ์šฉ ์ด๋ ‡๊ฒŒ ํ•ด๋„ ์•ˆ๋˜๋Š” ๊ฒฝ์šฐ๋Š” ๋กœ๊ทธ์ธ ๊ณ„์ •์— ๊ด€๋ฆฌ์ž ๊ถŒํ•œ์„ ๋ถ€์—ฌํ•ด ์ฃผ์–ด์•ผ ํ•œ๋‹ค. ๋กœ๊ทธ์ธ๊ณ„์ •์— ๊ด€๋ฆฌ์ž ๊ถŒํ•œ ๋ถ€์—ฌํ•˜๋Š” ..
์ƒ๋‹จ์œผ๋กœ