Installing a new partition on a Linux server is actually very simple, and all operations can be done through remote logon. Of course, before adding the partition, make sure that the hard disk has been physically added to the server.
This operation
I. User management basics
In Linux, there are multiple ways to manage users, including using the editing tool Vi and emacs to operate on/etc/passwd, or directly using user management commands such as addusr and deleusr, and using the pwconv command
A series of security vulnerabilities recently discovered on Mac and Linux platforms remind those who trust their security measures too much: no one can be immune to the vulnerabilities. H Security indicates that a series of attack vulnerabilities in
First:
01 if you want to change SSH's default Port 22), you only need to modify Port 22 in/etc/ssh/sshd_config. Here, change 22 to the Port you want to set, but do not set the same port as the existing port to avoid unknown consequences.
02 if you
(1) SYN Attack principles
SYN attacks are a type of DOS attacks. They consume server CPU and memory resources by sending a large number of semi-connection requests due to TCP protocol defects. SYN attacks can affect the host, but can also harm the
In Linux, Quota is used to restrict the disk space used by users. Generally, Quota is included in the kernel during Linux installation and does not need to be installed separately. Quota can specify disk storage restrictions in two ways: the number
I. Basic Knowledge: threads and processes
As defined in textbooks, processes are the smallest unit of resource management, and threads are the smallest unit of program execution. In the operating system design, the main purpose of evolution from a
A Linux firewall rule example is displayed on the Internet, which is recorded for future reference.
Sbin/iptables-P INPUT DROP
/Sbin/iptables-I INPUT-p tcp-dport 80-j ACCEPT
/Sbin/iptables-I INPUT-p tcp-dport 22-j ACCEPT
/Sbin/iptables-a input-j
To modify the firewall configuration, You need to modify the/etc/sysconfig/iptables file. If you want to open a port, add one in it.
-A RH-Firewall-1-INPUT-m state -- state NEW-m tcp-p tcp -- dport 1521-j ACCEPT
1521 indicates the port number to
We have analyzed how linux uses the partner System and the slab distributor to allocate memory. The physical addresses in these methods are consecutive. However, sometimes, when you request memory, it is not suitable for the system to allocate
[Applicable]
1. File System: ext2 ext3 reiserfs xfs, etc.
2. Range: indicates that FSCK is not executed or FSCK is completed when the file system needs FSCK.
[Symptoms]
1. partitions cannot be mounted;
2. A large number of files and directories are
1. Introduction
In linux, If you download and install an application, it is very likely that the prompt "command not found" appears when you type its name. If you find the executable file in the installation target folder every time, it is too
Crontab-e
Enter a vi editing interface
Add
*/30 * netstat>/tmp/net. log
The netstat command is executed every 30 minutes and the execution result is saved to net. log.
Crontab is a program that conveniently executes a task in a scheduled (Cyclic)
During MySQL management, the PC Server is offline or restarted. I need to start the MySQL service after the host is started. If hundreds of or more MySQL hosts are maintained, similar problems may occur on multiple hosts. It is very cumbersome to
Linux is still quite common, So I studied how to configure a Linux server. Here I will share it with you and hope it will be useful to you. This article is a series of articles on Linux server configuration through GUI interface, using Open Suse and
As many people begin to apply the Suse system, many problems gradually emerge. The main thing is about the Telnet service. It is mostly something worth thinking about. Here we will share with you about the Telnet service.
How to enable the Suse
With the development of the times, many new things also become popular. Although Linux is not a new thing, it has recently been sought after by a large number of people. What is the uniqueness of the Linux system's mysteries, what is its charm?
Taking RedHat9.0 and i386 as examples, this article analyzes the Linux Startup Process from user power on to command line prompt on the screen. It also introduces various files involved in startup.
Reading the Linux source code is undoubtedly the
When we are learning Linux, we often encounter some problems. For example, how does one manage Linux shared libraries when Linux is running? In Linux, the search and loading of shared libraries are implemented by/lib/ld. so. Ld. so searches for the
According to Canonical's proposal, Linux desktop should change the GNOME and KDE Desktop notification systems. Currently, mark Shuttleworth posted a new notification demonstration for uBuntu 9.04 by the Ubuntu Desktop experience engineering team on
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.