# # Learning Summary# #超级用户权限
VSFTPD installation (L)Yum Install vsftpd apt-get install VSFTPD
VSFTPD configuration (local user login restricted to their home directory,/etc/vsftpd.conf)Listen=yes (see if the connection is turned on if
Small White is the King Goddess of all-Stack Development Co., Ltd., a financial intern staff, after 3 months of internship, small white is will hurdles hurdles Ah! Finally became a formal employee of the company, and received the king personally
Another attack on the server, there is no way to prevent, here is a simple way to restrict the specified IP access.The command for a single IP isIptables-i input-s 59.151.119.180-j DROPThe command for the IP segment isIptables-i input-s 211.1.0.0/16-
Top is a dynamic display process where the current state can be refreshed continuously with the user key. If the command is executed in the foreground, it will monopolize the foreground until the user terminates the program. More accurately, the top
Uesradd-m Devpasswd Dev ( can be omitted )Su-dev ( Add horizontal to use the dev environment variable, without using the root environment variable )Cd/home/devMkdir.sshchmod-r700. SSHCD .ssh&& Touch Authorized_keyscat id_rsa.pub > Authorized_keys (
1. Recursively view file information for a directory: Lsof test/test12. Do not use the +D option to traverse through all file information for a directory: lsof |grep ' Test/test3 '3. List the file information opened by a User: Lsof-u username4. List
Personal blog Address: http://www.cnblogs.com/wdfwolf3/Update-alternatives is a command that Ubuntu systems use for software version switching. For example, there are several versions of the JDK in the system that map the directories of these
For the Linux master seemingly simple network configuration problem, perhaps to say why is not easy, so there are still too many beginners wandering outside the door is not strange,Here, the old boy teacher spent some time summing up this document
From the previous articles in my blog, it has been emphasized that the operating system is a multi-process collaborative operation to achieve the logical purpose of the entire operating system, to achieve an artificially manipulated system:The
This is a learning process notes, if there are most similarities, then you and I must be classmates, just do not know it!Cacti OverviewCacti is a software implemented using the PHP language, the main function is to use the SNMP service to obtain
Linux under the log system detailsTwo Log service syslog and syslog-ng on 1.linux systemSyslog service has two processes syslogd and KLOGDSYSLOGD: System-generated log informationKLOGD: Log information generated by the kernelKLOGD: Kernel generates
YUM--RPM Package Management ToolsHow to use:Yum install-y vim-enhanced (Install vim-enhanced pack)Yum Remove vim-enhanced (unload vim-enhanced pack)Yum List (list RPM package Library, network resources)Yum List |grep vim (List of packages with vim
Manually customize a BusyBox-based micro Linux systemPremise:1. A Linux as host; the system version is Redhat Enterprise Linux 5.8;2, BusyBox source; version is busybox-1.20.2. Busbox to pack a lot of commands together3, add a piece of extra hard
First, about the Linux partition situationAlthough the hard disk partition table can store up to four partitions, but we actually use only two partitions, one is the primary partition (Primary partion) is an extended partition (extended partition)
===================linux Basic Instruction ========================================Cat-b Displays line numbers equal to NLMore press B to page UP press Q to exit press the Space page by page, press ENTER line to turn less pagedown page down PageUp
1 What is BondThe network card bond is a kind of common technology in the production scene, which is bound by multi-net cards as a logical NIC, which realizes the redundancy, bandwidth expansion and load balance of the local network card. Kernels 2.4
First, priorityPriority value = Priority Factor +nice valueThe priority coefficients are determined by the system kernel and cannot be changed. The nice value can be changed manually, the lower the value of the -20~19 priority, the higher the
Zhou Zixuan Original works reproduced annotated source "Linux kernel Analysis" MOOC course http://mooc.study.163.com/course/USTC-1000029000Notes:
The core idea of the von Neumann architecture is to store program computers. There are two
The learning process is a guide to Linux from the master boot record to the first user-space program.The process of starting a Linux system consists of a series of steps. But whether you're launching a standard X86 desktop or embedded PowerPC, most
First, let's take a look at what synchronization is:In fact, the so-called synchronization, is the issue of a function call, before the result is not obtained, the call will not return, while other threads can not call this method. By this
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service