Linux SSH Security Policy Change ssh port

The default ssh port is 22. We strongly recommend that you change it to 10000 or above. In this way, the chances of other users scanning ports are also greatly reduced. Modification Method: # edit/etc/ssh/ssh_configVim/etc/ssh/ssh_config # Add

Set firewall on Linux Proxy Server

Generally, there are two policies for implementing the firewall function of Linux. One is to completely disable all input, output, and forward data packets, and then gradually enable various service functions according to the user's specific needs.

Linux g ++ about warning: Extra tokens at end of # endif direve ve

Original file timesynmanager. h   # Ifndef timesynmanager_h __# Define timesynmanager_h __ Const int max_year = 1100;Const int min_year = 70;Typedef long _ int64; # Include # Include # Include # Include # Include // # Include Typedef/* _

Linux backup file command collection

Ar Function Description: create or modify a file to be kept, or extract files from the file to be kept. Syntax: Ar [-dmpqrtx] [cfossuvv] [A ] [B ] [I ] [keep files] [member files] Note: Ar allows you to collect many files and make them a

Linux OpenSSL Basics

Currently, large online transaction systems such as online banking and e-commerce generally adopt the combination of HTTP and SSL. The server uses a web server that supports SSL, and the client uses a browser that supports SSL for secure

Linux Apache Web Server (Continued 1)

Before proceeding, we must tell you that Apache has adopted a series of default values during installation and has enabled the WWW server to run. You only need to connect the host installed with Linux + Apache to the Internet, and then store the

Feeling of using linux

Because the company wants to operate GroupON, it downloads an Open Source PHP template and intends to try it out. I am in the MS camp and haven't deployed Linux + Apache2.0 + PHP5.0 + MySQL5.0 + Zend Optimizer3.3.0 for three days. Today, I have

Linux programming basics-thread Overview

Sometimes, we need to run multiple control flows simultaneously in one infrastructure. For example, a graphical download software must respond to control operations such as stopping and deleting a task while processing the download task. In this

Linux operating system optimization and security

I have seen many good articles on linux Optimization on the internet, and I will not repeat these articles here. I just want to talk about these issues from my own experiences. As a system administrator, I will talk about linux based on server

Linux hardware Installation

1. How much hard disk space does Linux installation occupy? It depends on what distribution Linux is to be installed, how many applications need to be loaded, and whether to install the original code. For example, the most basic Slackware Linux

Easy use of USB mobile memory in Linux

USB mobile memory is becoming more and more popular, but it is used in different Linux releases in different ways, some need corresponding tool software. The RedHat Linux9, which is frequently used, provides better support for USB mobile memory. You

How to build a Secure Linux Server

To create a Secure Linux server, you must first understand the meaning of the configuration files related to network services in the Linux environment and how to configure security. In Linux, the TCP/IP network is configured through several text

Three methods for deleting SVN: delSvn (windows + linux)

1. in linux It is easy to delete these directories. The command is as follows: Find.-type d-name ". svn" | xargs rm-rf Or Find.-type d-iname ". svn"-exec rm-rf {}\; 2. Use the following methods in windows: 1. Execute the doscommand in the project

Use Linux to create a vro

Linux, as a new operating system, is gradually accepted by users due to its stable performance, open source code, and price advantages. At present, Linux is mainly used in the server field. However, after proper configuration, it can also serve as

Ubuntu wine installation and garbled Solution

1. Install wine: For detailed installation method, see web site: http://wiki.ubuntu.org.cn/Wine is only installed with this method, ubuntu9.10 software source to add changed to: deb http://wine.budgetdedicated.com/apt dapper main (official source ).

Process Management for Linux operating systems

Tutorial: Linux Process Management is much more powerful than Windows, and all processes are mapped to the/proc directory, we can view the memory data of these processes as we operate on common files. ~ $ Ls-l/proc Dr-xr-x 7 root 0 1......-R -- 1

LUPA image channel added bid for puhua linux download

In June October 20, the LUPA image channel will add a new member-won the bid for puhua linux. This LUPA provides users with the download of the Personal Edition of puhua linux Desktop 4.0. If you are suffering from pirated software, you are welcome

Description of the/etc/sysconfig/i18n file under Red Hat

Generally, the following configurations are displayed in the/etc/sysconfig/i18n file under Red hat:LANG = "zh_CN.GB18030"SUPPORTED = "zh_CN.GB18030: zh_CN: zh: en_US.UTF-8: en_US: en"SYSFONT = "latarcyrheb-sun16"First, the etc/sysconfig/i18n file

Linux Command Line basic usage

Linux provides a large number of commands, such as file management operations, disk operations, network management operations, process management, file attributes and permission settings.1. Linux Command Line Composition Command line format Linux

Resolution setting and vim color scheme in Linux

I recently learned some configuration items in Linux, and now I have recorded the learning process for easy reference. System Environment: Linux debian I. su, sudo After Linux is installed, we often need to use the permission switch command su, sudo.

Total Pages: 5467 1 .... 1603 1604 1605 1606 1607 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.