Secure use of FTP services in Linux FTPs (vsftpd over TSL)

FTP is currently the most commonly used to upload and download the file of the Protocol, because its communications content is not encrypted to consider its security and generated the SCP and SFPT agreements. We can also use FTPs (FTP over Ssl/tls)

Linux disk and directory information view

"Du: View directory or File size"Du, English full name disk usage, which is used to calculate the size of a file or directory. If you do not specify any options, count the number of blocks occupied by recursively all subdirectories under the current

Linux zip compression and unzip decompression usage detailed

zip

Generally speaking, zip is more general, whether under Windows or Linux, zip can be easily compressed and decompression.Here are two more commonly used compression commands and decompression commands.Compress Zip Mypackge.zip-r/var/test/

Linux Bash Critical security vulnerability Repair Tutorial

A very serious security vulnerability (vulnerability reference https://access.redhat.com/security/cve/CVE-2014-6271) has been found in the Linux official built-in bash. Hackers can take advantage of this bash vulnerability to fully control the

Configure Nginx deny delegate access tutorial in Linux

Let's talk about the simple structure. Front end a nginx reverse proxy, backend a Nginx instance app for PHP ... is actually a discuz, before the CC attack is a warning script or take a CDN, but this time the attackers no longer hit traffic, but the

Mydumper need to enter plaintext password solution in Linux

When using Mydumper, you need to enter the username and password in the command line, which is recorded in the history, which is relatively insecure.[Root@liufofu backup]# mydumper-h localhost-u root-p tiger-c-O./liufofu/-B LiufofuThere are 2 types

Linux VPS Use command to learn notes

I use the putty, follow the operating procedures of this VPS, record these common commands passwd: Modify Password Cd:current Directory: access to catalogue; Eg:cd/home into the home directory; CD/to root directory Ls:list: Lists the current

Method of Postfix replacement export IP address in Linux

DescriptionTheir own post Office server because of configuration problems, was brought to mass bulk spam. Now the egg hurts, send emails to Gmail or other mailboxes, will be sent back or directly in the bin. One complaint too troublesome, direct

Under-Linux SVN installation and deployment/read/password/user detailed

Step One: Quick Start Linux Install SVN The code is as follows Copy Code Installation: Apt-get Install Subversion (apt-get installation)Installation: Yum install Subversion (yum installation) Whether the test

Linux logical volume snapshots and the use of SSM

Linux logical volume snapshots and the use of SSMTheoretical part: Logical Volume Management (LVM) provides a snapshot of any logical volume in order to get a partitioned backup in a consistent state. Because during the backup process, The

The Rsync Remote Data Synchronization tool for Linux

rsync (remote synchronize) is a data synchronization tool that synchronizes files between local and remote hosts using the rsync algorithm.The advantage of rsync is that only two files are synchronized in different parts, the same parts are not

Ifconfig detailed explanation of Linux commands

Depending on the options properties used in the Ifconfig command, the Ifconfig tool can be used to simply obtain network interface configuration information and modify these configurations.1. Command format:ifconfig [Network Devices] [parameters]2.

Linux commands: Vmstat command-View Server resource summary information

Vmstat command Function descriptionThe Vmstat command can display the CPU usage, memory usage, and virtual memory exchange of the server including the IO read and write situation. Use the following: Vmstat [Options] [delay

Linux common commands (1) CD command

1 command format:CD [Directory name]2 command functionsToggle current directory to DirName3 Common examples3.1 Entering the system root directoryCD/3.2 Go to Parent directoryCd.. or CD. //3.3 Entering the current user home directoryThe current user

Application of DNW to arm Development Board in Linux system

Use DNW to send programs to the Board under Linux. Includes driver code: SECBULK.C, Application code: DNW.C. Can only run on a 32-bit system and prompt for errors on 64-bit systems: DNW download Data size is too big.DNW Source code:#include #include#

LINUX-SSH Remote Background Execution script-place background execution issues

Tag: Kill cal load requires Roo quote Ora loop oneWrote a monitoring load of a smallScript(Dead Cycle,TestKill the corresponding process after the end), because you need to monitor more than one server, so on a single server to

Build the war package build environment on Linux

svn

I. Check if your Linux machine has its own JDKJava-version check can be, if there is a need for the compilation of different versions, first uninstall, and then install the required version of the compilationJDK installation and configuration.(1)

Linux Scheduled Tasks. MD

CrondCrond is a daemon that is used to periodically perform certain tasks or wait for certain events under Linux, similar to Scheduled tasks under Windows, when the operating system is installed, the Service tool is installed by default and the

Disable Linux under Ctrl+alt+del operating system parameters

I. Status NoteCheck the system profile found that the "Control-alt-delete" Restart key combination is not disabled, and it is recommended to disable this key combination in the configuration file in order to prevent the computer from restarting due

DNS of Linux services (i)

DNS and BindSockets:C:Client: The program that initiated the application request;Server: A program that responds to a request (providing a service);Listen:socketTransport Layer Protocol: TCP, UDP, SCTPTcp:transmission Control

Total Pages: 5467 1 .... 1685 1686 1687 1688 1689 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.