All files have three time information and are stored in the file system atime (access time)
Is the last read time of the file or the execution time of the file mtime (Modified Time)
Is the last time the file was written (it was changed as the file
RedHat 4:1. Create accuont & password dB, which can be deleted after logins.txt is used.
VI logins.txt
TestaTestapTestbTestbp
Db41_load-T-t hash-F/tmp/logins.txt/etc/vsftpd/vsftpd_load.db
Chmod 600/etc/vsftpd/vsftpd_load.db
2. Create
Occasionally see this articleArticleI feel very helpful to my colleagues in the organization. I will repost it to encourage everyone.
For public speeches, I think most people will face one of the biggest problems: tension. Once nervous, it will
Life cannot have no pain, just like the sea without wind, the sky without rain, the mountains without a cliff, and the pictures of colors.
Hardships and hardships are essential to the achievement of truth. Good fortune is a friendly friend, while
This shell script aims to obtain the IP address of the local machine, because it is a dynamic pppoe
#! /Bin/sh # This scripts will auto get ppp0 'IP-ADDR and send it to e-mail sleep 5 ipaddr = "" until [1-EQ 0] DO ipaddr = "" until [-n "$
Enter
DP,
Select a device under devices, right-click the device, and choose Properties> Control> remove barcode reader support,
Next, under repository, select the cleaning belt and cleaning slot.
Then, right-click the drives of the device and
Learn about WebSphere Application Server 6 and record it!
Log File Created when the application server profile is created
In addition to the logs created in the core product fileProfile_root/LogsCreate the following logs in the directory.
I. Iptables for Nat
WAN = eth0 has an Internet IP address xx. xx
LAN = eth1 has an intranet IP address yy. yy/255.255.0.0 step #8. Use IP Tables to configure Nat
# Delete and refresh default tables, such as "filter", and other tables such as "Nat",
DB2 tools
Two categories:
Control Center (CC) is mainly used to manage DB2 servers.
Configuration Assistant (CA) is used to Set Client/Server Communications and maintain registry variables.
Six basic features should be found in any DB2
Observing recent security events and their consequences, security experts have come to the conclusion that these threats are mainly caused by SQL injection. Although many articles have discussed SQL injection, the content discussed today may help
It is mainly about SQL.
The general SQL statement will not be written, and I will record some of the statements that I think are different from those of oracle or SQL Server.
Top Writing Method
Select * from staff fetch first 10 rows only
Returns
Memory leakage is mainly used to monitor the memory consumption of processes. The memory consumption can be obtained through ps vg in Aix to compareIn addition, there is a very useful Script: post_vg.sh to compare the increase in memory
The
NFS user manual for Solaris
Author: eastspider Short Message reply
All test environments are sun's Solaris systems.
1. Understand the functions of NFS servers and clients.
NFS is a product established by Sun to use the TCP/IP protocol and Sun's
In HP-UXIn a file system, the default value is a small File System (that is, it cannot be larger than 2 GB ).If you want the current file system to support files larger than 2 GBWe can do this:
1,When creating a file system:
Mkfs-F vxfs-O largefiles/
I. concept:1). PV (physical volume): physical volume, which is at the bottom of LVM. It can be a physical hard disk or partition.
2). VG (volume group): volume group, built on PV, can contain one or more PVS. 3). lv (logical volume): logical volume,
With the rapid development of information technology, it has greatly promoted the progress of human society. Online Information Exchange and e-commerce,Office automation, automatic control technology, and other information technologies greatly
In this authentication when block A1 is written to disk 0, the same block isAlso written to disk 1. Since the disks are independent of one another,Write to disk 0 and the write to disk 1 can happen at the same time. However,When the data is read,
In this layout, data is written in block stripes to the first three Disks(Disks 0, 1, and 2) while the third drive (Disk 3) is the parity drive.Parity of the blocks ss the drives is computed by the RAID Controller andStored on the dedicated parity
1) Comparison of Action Implementation classes: struts 1 requires action classes to inherit an abstract base class; a specific problem of struts 1 is the use of abstract class programming rather than interfaces. Struts 2 Action class can implement
Denyhosts is a program written in python2.3. It analyzes/var/log/secure (RedHat, Fedora
Core, centos) and other log files. When the same IP address is found to be used for multiple SSH password attempts, the IP address will be recorded in
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service