Linux system management and O & M experience sharing

The O & M of Enterprise Linux systems has become the focus of enterprises. As an excellent open-source network operating system, it is very important to make full use of Linux tools and use corresponding methods to improve O & M efficiency. In the

Bugzilla installation configuration process record

I configured a bugzilla in the previous group because of project requirements, and encountered some minor problems in the middle, so I recorded the process. after several months of operation, I moved from the Internet to the intranet, these two

Enable iptables for CentOS system configuration

After CentOS is installed, only port 22 is enabled by default. if you want to open other ports, you need to open the required ports. For example, open the default port 80 for http edit iptablesvi/etc/sysconfig/iptables

How to configure encryption authentication and ca certificates in Linux

Encryption mechanism: plaintext encryption: telnetftppop3 password unreliable sendmailNFSNIS information data unreliable rshrcp verification unreliable security mechanism: 1. random number generator (RandomNumberGenerater) /dev/random system

Fedoracore server security settings tutorial

Preface I have long wanted to write an article on Linux security settings. One advantage of writing an article is that you can understand your own ideas, and you will be able to remember it if you forget to write an article later. This article is

Difference between active and passive modes of ftp servers

First, introduce the principles of ftp in active and passive modes: What is the role of ftp? If you build an ftp server on the intranet for testing, you do not need to pay attention to it. it is very easy. there is generally no firewall between

Iptable configuration instance tutorial

When iptables uses an instance, let's first take a look at the interaction principle between the server and client. Services provided by servers with certain functions are always provided by specific background programs. In TCP/IP networks, this

Disable and open ports of iptables firewall

1. disable all INPUTFORWARDOUTPUT to open only some ports. The following is the command implementation: iptables-PINPUTDROPiptables-PFORWARDDROPiptables-POUTPUTDROP and then use the command iptables-L-n to check whether the settings are correct. you

How to Open ftp ports in iptables firewall

It is very convenient to install ftp on a Linux server to provide users with upload and download. However, if your server has enabled the iptables firewall, you need to set the ftp port. I have also used iptables to allow access from a port. why do

Tcpdump usage remarks

TcpDump remarks tcpdump usage explanation and comment abstract the first type keyword is about the type, mainly including host, net, port, such as host210.27.48.2, indicating that 210.27.48.2 is a host, net202.0.0.0 indicates that 202.0.0.0 is a

Tcpdump command basic instructions

Port5060orport2727: // only 5060 packets with ports 2727 and 5000 are captured. // The maximum number of packets is 5000./home/lishilin/0713001.cap// the number of packets saved to/home/lishilin/is 0713001. cap if all packets on the server are

Solution to node downtime caused by 11gr2rac enabling iptables firewall

When iptables is enabled for 11gR2RAC, node downtime is usually handled. when installing a database, the vast majority of users require selinux and iptables to be disabled before installation. However, in the carrier's system, many security factors

Use iptables for dynamic dns

1. the core idea of configuring a dynamic DNS server is to run multiple binds on the DNS server. each BIND provides resolution for users from different regions, therefore, each BIND should have different configuration files and domain files, and

The most practical method for building cdh4 cloud storage

Manually download the following package. after downloading the package, use yum to locally install yumlocalinstall -- nogpgcheck *. after rpmyum installation is complete, re-run the cloudera-manager-installer.bin to complete the installation (if the

Linux command TCPDUMP

TCPDUMP introduction for network management personnel, the use of sniffer can grasp the actual network conditions at any time, when the network performance drops sharply, you can use the sniffer tool to analyze the cause, find out the source of

Modify LINUX command prompt

Those who have used linux terminal will not feel unfamiliar with such a command prompt. in particular, they will be able to clearly know the host of their username in the multi-user status. However, there is a problem with it, that is, the directory

Crontab usage tutorial

Crontab is a good entry in Wikipedia. Unfortunately, this address cannot be accessed by proxy in China. Although the introduction of Crontab is everywhere, after reading this entry in detail, we still have some gains. The Crontab name is from

Linuxiptables instance configuration

1. configure a filter table firewall (1) to clear the original rules. whether or not you have enabled the firewall when installing linux, if you want to configure your own firewall, clear all the filter rules. [root @ tp ~] # Iptables-F clear the

First glance at Linuxiptables firewall

By default, firewall rules deny and prohibit the transmission of data packets from an IP firewall in the IP firewall. three built-in filter rule chains are used. All data packets arriving at the interface are filtered according to the input rule

Linuxiptables firewall tutorial 2

Netfilter (packet filtering mechanism): analyzes the network packets that enter the host, captures the packet header data for analysis, and determines the online connection as a mechanism for release or resistance. 1. the table is an iptables

Total Pages: 2732 1 .... 2677 2678 2679 2680 2681 .... 2732 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.