Linux Network Security Tips
Date: 2001-6-15
Author member name: WANGSB email:wangshoub@yeah.net
Network security is a very important topic, basically you run the service backstage more, you can open more security vulnerabilities. If configured
The first time to use redhat many unfamiliar places, recorded:
Check Status:
Service Iptables StatusStop service:
Service Iptables StopTo view the Firewall service:
Chkconfig--list | grep iptablesShutdown status is turned on:
Chkconfig--level 23
sudo a2enmod rewriteUnder lamp use pseudo static need to open Apache's rewrite module, enter above code can realize
But after testing or not, this time you can modify the Apache file
sudo emacs/etc/apache2/sites-available/defaultTo modify several
Friends who are often exposed to Linux, especially those on a server that is shared by many people, may often encounter problems like this:Received a disk alarm, said that the XXX partition is full, then log on to the server DF A look, found that
Vagrant Solve the problem
A little bit of team collaboration development experience should know how important the team collaborative development environment is, at first, everyone's development environment is Windows,max OS X,ubuntu,centos, and so
Dear user Hello, from now on import and export function has been offline, please go to Aliyun official database management platform IDB Cloud Use this feature!
Continuing to discover in IDB Cloud that the exported database files are SQL files
Give me the phone, I was decisive first let him put the system partition, the data disk partition first part, and so into the system after I remotely look at the problem. Then he does not divide the data disk after the normal installation of the
The first thing to do with a Linux system in any network environment is to find out what services the server is offering.Those services that are not needed should be banned, preferably unloaded, so that hackers are less able to attack the system.
First download Software Installation
SECURECRT is the charge software, if you support the genuine words to the official website to buy. Or Baidu a bit more than n cracked version, random download a hint to crack can be used
New Connection
Action steps are as follows:
1. Edit/etc/ssh/ssh_config File:
#vim/etc/ssh/ssh_config
Remove the annotation symbol "#" before the annotated port 22, and change the 22 to 8888 to save the exit.
2. Edit/etc/ssh/sshd_config File:
#vim/etc/ssh/sshd_
Build trust between Linux hostsEstablish a trust between host A and Host B so that host a can ssh to host B without a password.
Execute SSH-KEYGEN-T rsa-b 1024 on the ◦a host (can also use SSH-KEYGEN-T dsa-b 1024)◦ in the home directory. SSH
Today, when you install CentOS5.5 on a virtual machine, you find that you run some very normal commands, such as Init,shutdown,fdisk:
bash:xx command not found.
The first thing to consider is whether or not the $path in root contains these
1. Query Inode:
The code is as follows
Copy Code
[Oracle@test]$ Ll-iTotal 1469445217956913-rw-r–r–1 Oracle Oinstall 0 18 20:24 1? Txt
2. Modify the test file name:
The code is as follows
Copy
The free command displays the memory usage, including the physical memory, virtual swap file memory, shared memory segments, and the system core buffer.SyntaxFree [-bkmotV] [-s ]Parameter description: -B displays memory usage in bytes. -K
$ @"$ @" Returns all command line parameters as an array. Unlike "$ *", it is returned as a string."$ @" Can traverse all elements through loops, as shown in the following script:#! /Bin/bashFor var in "$ *"; doEcho $ varDoneBecause $ * only returns
After purchasing a Linux vps or server, we first need to check whether the purchased server is the same as the solution and configuration we see, this is because the purchased machines are not the same configuration as those actually needed. In this
Currently, VM instances are more and more widely used. System images of some VM instances do not automatically mount swap partitions, which will definitely affect the performance of the machines, The solution is as follows: 1. Some VM instance
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service