The default ssh port is 22. We strongly recommend that you change it to 10000 or above. In this way, the chances of other users scanning ports are also greatly reduced. Modification Method: # edit/etc/ssh/ssh_configVim/etc/ssh/ssh_config
# Add
Generally, there are two policies for implementing the firewall function of Linux. One is to completely disable all input, output, and forward data packets, and then gradually enable various service functions according to the user's specific needs.
Original file timesynmanager. h
# Ifndef timesynmanager_h __# Define timesynmanager_h __
Const int max_year = 1100;Const int min_year = 70;Typedef long _ int64;
# Include # Include # Include # Include # Include // # Include
Typedef/* _
Ar
Function Description: create or modify a file to be kept, or extract files from the file to be kept.
Syntax: Ar [-dmpqrtx] [cfossuvv] [A ] [B ] [I ] [keep files] [member files]
Note: Ar allows you to collect many files and make them a
Currently, large online transaction systems such as online banking and e-commerce generally adopt the combination of HTTP and SSL. The server uses a web server that supports SSL, and the client uses a browser that supports SSL for secure
Before proceeding, we must tell you that Apache has adopted a series of default values during installation and has enabled the WWW server to run. You only need to connect the host installed with Linux + Apache to the Internet, and then store the
Because the company wants to operate GroupON, it downloads an Open Source PHP template and intends to try it out. I am in the MS camp and haven't deployed Linux + Apache2.0 + PHP5.0 + MySQL5.0 + Zend Optimizer3.3.0 for three days.
Today, I have
Sometimes, we need to run multiple control flows simultaneously in one infrastructure. For example, a graphical download software must respond to control operations such as stopping and deleting a task while processing the download task. In this
I have seen many good articles on linux Optimization on the internet, and I will not repeat these articles here. I just want to talk about these issues from my own experiences.
As a system administrator, I will talk about linux based on server
1. How much hard disk space does Linux installation occupy?
It depends on what distribution Linux is to be installed, how many applications need to be loaded, and whether to install the original code.
For example, the most basic Slackware Linux
USB mobile memory is becoming more and more popular, but it is used in different Linux releases in different ways, some need corresponding tool software. The RedHat Linux9, which is frequently used, provides better support for USB mobile memory. You
To create a Secure Linux server, you must first understand the meaning of the configuration files related to network services in the Linux environment and how to configure security. In Linux, the TCP/IP network is configured through several text
1. in linux
It is easy to delete these directories. The command is as follows:
Find.-type d-name ". svn" | xargs rm-rf
Or
Find.-type d-iname ". svn"-exec rm-rf {}\;
2. Use the following methods in windows:
1. Execute the doscommand in the project
Linux, as a new operating system, is gradually accepted by users due to its stable performance, open source code, and price advantages. At present, Linux is mainly used in the server field. However, after proper configuration, it can also serve as
1. Install wine:
For detailed installation method, see web site: http://wiki.ubuntu.org.cn/Wine is only installed with this method, ubuntu9.10 software source to add changed to: deb http://wine.budgetdedicated.com/apt dapper main (official source ).
Tutorial: Linux Process Management is much more powerful than Windows, and all processes are mapped to the/proc directory, we can view the memory data of these processes as we operate on common files.
~ $ Ls-l/proc
Dr-xr-x 7 root 0 1......-R -- 1
In June October 20, the LUPA image channel will add a new member-won the bid for puhua linux. This LUPA provides users with the download of the Personal Edition of puhua linux Desktop 4.0. If you are suffering from pirated software, you are welcome
Generally, the following configurations are displayed in the/etc/sysconfig/i18n file under Red hat:LANG = "zh_CN.GB18030"SUPPORTED = "zh_CN.GB18030: zh_CN: zh: en_US.UTF-8: en_US: en"SYSFONT = "latarcyrheb-sun16"First, the etc/sysconfig/i18n file
Linux provides a large number of commands, such as file management operations, disk operations, network management operations, process management, file attributes and permission settings.1. Linux Command Line Composition
Command line format
Linux
I recently learned some configuration items in Linux, and now I have recorded the learning process for easy reference. System Environment: Linux debian
I. su, sudo
After Linux is installed, we often need to use the permission switch command su, sudo.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service