Security | Network
About partitionsA potential hacker will first attempt a buffer overflow if it is to attack your Linux server. In the past few years, the type of buffer overflow is one of the most common forms of security vulnerabilities. More
Linux Instance mount data disk error
Linux Instance mount data disk error, there are several scenarios.
Scenario 1:
Problem Description:
ECS Linux mounts The data disk to the/MNT directory and finds that the/MNT directory data is missing.
steps for Linux installation using GitHub
1. Register the account in the website, create the project test to enter the project, the bottom right corner will have a project warehouse address.
2.Linux installation of GitHub
sudo apt-get
Today Linus Torvalds and the hard working core team are proud to announce the Linux Kernel 4.5 version and have it open for download. Since the release of the first candidate on January 25, 2016, two months of unremitting updates, after the release
1. Graphics information
DMESG | Grep-i VGA
Lspci | Grep-i VGA//view video card information
2.dmidecode | Grep-i ' serrial number '//view motherboard information, check the motherboard serial numbers
3.CPU Information
#通过/proc File system
Iptables this instruction, as shown in the following man query, it is used to filter packets and do NAT network address translation (network location translation), the application of a lot of this directive, can do many network application.
Iptables-
Introduction to Iptables Use
Iptables is a powerful network tool based on packet filtering, this article briefly introduces the use of iptables and how to use it to build a network firewall.
Iptables is composed of two subsystems, namely kernel
Use IPTABLES-ADC to specify the rules of the chain-a add-D Delete-C modification
Iptables-[RI] chain rule num Rule-specification[option]
specified by Iptables-ri in the order of the Rules
iptables-d chain Rule num[option]
Delete specified
Preliminary Knowledge (RPM): Iptable has three queue (table) rules, mangle queue, filter queue, Nat queue.
1. The mangle table which is responsible for the alteration of quality of service bits in the TCP header.
2. The second table is the filter
NetFilter provides an abstract, general-purpose framework that defines the implementation of a child function that includes the following five parts of the packet filtering subsystem framework:
1. Define a hook function for each network protocol
window| Program | weather Forecast | This improvement is mainly to increase the image acquisition, and provide a relatively complete function to get the remote file. The specific code is as follows:
?
$fcont =file ("http://www.bjmb.gov.cn/today.asp")
window| function to get the remote file, wrote a small function of the following, basic aspects are considered, we look at it:
function Getpic ($url, $dir, $name) {
Gets the URL file and then stores it in the Dir directory, with name as the filename.
Web page Production WEBJX article introduction: The Linux 2.6.35 version, just released earlier this month, contains RPS and RFS, two new technologies that Google has contributed to. RPS's full name is the receive Packet steering, which distributes
The management of LVM
Let's first introduce the DM, and the rationale of the logical Volume:
Dm:device Mapper Device Mapping, a mechanism for providing logical devices
1, the combination of multiple physical devices into a logical device
2, the
Linux Root has the supremacy of power, once the root password forgotten or stolen, is a very headache, then how to retrieve the root password, I summed it up as follows:
(i) Linux system password cracking
1. Enter edit mode by E in the Grub
It's written in front.
Many of these tutorials on the Internet, I also refer to their articles and some books to get success. Nothing innovative, just for the record down, for self understanding and later review.
The so-called 工欲善其事, its
Summary: Hard disk and hard disk partitions in Linux are represented as devices, in our popular parlance, is how to represent or describe the hard disk and or hard disk partitions, but this description should be scientific and specific; For example,
ReiserFS is a very good file system. It is also one of the earliest log file systems for Linux. ReiserFS's developers are very bold, and the entire filesystem is designed entirely from scratch. At present, ReiserFS can easily manage hundreds of g of
We can use the loopback interface on Linux to simulate two stages of routing, the first phase is to go through the Pre/post routing process, NAT implementation, the second phase completes the simple route forwarding. However, it is necessary to hook
Only need to move the log files to the backup directory
Then package the journal compression and delete the log file
Last Rebuild log file
#!/bin/bash
#
Nginx_app=/usr/local/nginx/sbin/nginx
logs_dir=/usr/local/nginx/logs
bak_dir=/
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service