With the rapid development of cloud computing technology, users can store their data on the cloud, and many applications on the cloud platform become important. At the same time, ldquo; Software Definition rdquo; with the continuous development of concepts and applications, the voices of today's users for software applications are constantly increasing. How to ensure the most critical security check for users ldquo; cloud Vulnerabilities rdquo; fo
Source: CCID
1. Call void mtrace (void) (IN mcheck. h? (Declared). mtrace installs hooks for functions such as malloc to record memory allocation information. void muntrace (void) is called at the end of the Code that requires memory leak check ).
Note: In general, do not call muntrace, but let the program end naturally, because some memory Code may not run until muntrace is released.
2. Compile the checked code in debug mode (-g or-ggdb)
3. Set the e
1.[Email protected] redmine-3.3.0-0]# cat/proc/acpi/thermal_zone/tz00/temperatureTemperature:28 C[Email protected] redmine-3.3.0-0]# cat/proc/acpi/thermal_zone/tz01/temperatureTemperature:30 C[Email protected] redmine-3.3.0-0]#2.If not installed, install it first.# yum-y Install Lm_sensors check Test sensor: If the above steps are not a problem, you can see the CPU temperature by executing the following command:# sensors# sensorsacpitz-virtual-0Ada
Swap is used if the system's physical memory is used up. The system will run slowly but still run. If swap space is used up, the system will have an error. Generally, the error "application is out of memory" may occur. In severe cases, the service process may be deadlocked. Therefore, we must attach great importance to it.
There are many ways to view swap:Free
Free-m
We can see the swap used by the current system. So how can we check which processes
In CentOS Linux, start and stop tomcat and check the shell script and centostomcat logs.
Tomcat installation directory of CentOS:/usr/local/tomcat
Vi MyTomcatUitl. sh create a fileChmod u + x MyTomcatUtil. sh grant execution permissionShell script:
1 #! /Bin/bash 2 3 # Start and Stop tomcat. The log shows script 4 5 if [$1 = '']; then 6 echo" run the command with a parameter: start tomcat, stop tomcat, l
I wrote a script to check whether the SLAVE of MySQL REPLICATION is normal in Linux, which is relatively simple.If you want to run it with CRONTAB, remove the Read part.1. Run the MYSQL Command show status to View Script 1.[Root @ localhost ~] # Cat slave_is_running
#! /Bin/sh
#
# Created by david yeung
#
# To determine whether slave is running or not.
Echo "Enter your Username"Read USERNAMEEcho "Enter your
In Linux, check the folder size, disk space remaining (du/df), and dudf.1. Introduction
View the directory size in du, and view the disk usage in df.2. du
Disk usage(1) Basic functions Recursively view the size of all files in a folder(2) common parameters: -H,-human-readable Display dimensions in a readable manner (for example, 1 K 234 M 2G) -S,-summarize only calculates the total usage of each parameter
In linux, "the mysqli extension is missing. Check the PHP configuration solution.
Tar-zxvf php-5.2.17.tar.gz
Cd php-5.2.17/ext/mysqli/
/Usr/bin/phpize # The configure configuration file is generated in the current directory.
./Configure-with-php-config =/usr/bin/php-config-with-mysqli =/usr/bin/mysql_config
Make
Make install
If no error ex
Check the installation information of mysql on the linux server.
View mysql installation information:
# Ps-ef | grep mysql
Usr/bin/mysql indicates the mysql running path.Var/lib/mysql refers to the storage path of mysql database files.Usr/lib/mysql indicates the installation path of mysql.
# Whereis mysql
# Mysqladmin-u root-p variables
Root is your database accountAfter you press enter, you wil
Linux shell mysql database Master/Slave synchronization status check alarmRequirements: 1. Monitor the Master/Slave status of the database. 2. Obtain the main database parameters. 3. Read the configuration file. 4. Adaptive deployment location. # Global variables include the program path, binfile path, time, and SMS sending Database Configuration #! /Bin/bash # obtain the shell script execution path DIR = "
The Linux File System is asynchronous, that is, writing a file is not saved to the media hard disk, USB flash disk, etc. immediately, but saved to the buffer zone, to a certain extent and then stored together in the media. If you do not have umount, you will be unable to undo the USB flash drive. The program does not know that fopen, fwrite, and other functions still return correct results. When you know that the operating system needs to write the me
After booting from the installation CD--select rescue installed System--select english--ok--us--after you are prompted to do not set up the network-select no--after selecting the continue--prompt (the original operating system files are mounted in/mnt/ Sysimage), prompt (if you want to go into the Directory Select command chroot/mnt/sysimage)--Select shell start shell (this mode) will prompt bash-4.1#(If you want to go under the original operating system)bash-4.1# cd/mnt/sysimage/(under director
1. Recursively query a file containing a string in the specified folder (the file content fragment listed)grep-r "string to find" file pathsuch as: Grep-r "HelloWorld". #在当前目录下递归查找 "HelloWorld" string2. recursively find file names (list file names)such as: Find. -name "*.log" #在当前目录中递归列出以log为扩展名的文件3 . Viewing the number of operating system bitsArch4. String Simple intercept operationsuch as: str= "Com.baidu.android.lulei" 1. Get the tail of a string${str##*.} Get "Lulei" (# #最大限度截取 *.)${str#*.}
What is a cc attack?A CC attack is the use of a large number of proxy servers to initiate a large number of connections to target computers, causing the target server resource exhaustion to cause denial of service. So how to judge the query cc attack?This article mainly introduces some Linux commands for judging cc attacks.View connections for all 80 portsNetstat-nat|grep-i "|wc-l"Sort the connected IP by the number of connectionsNETSTAT-ANP | grep '
The website is not open, SSH is not connected, this is a lot of webmaster pain. The following example 3 ways to determine if the IP is blocked.
1, routing Analysis method
# traceroute 212.239.8.22//linux downTraceroute to 212.239.8.22 (212.239.8.22), hops max, byte packets1 192.168.10.1 (192.168.10.1) 0.308 ms 0.515 ms 0.634 ms2 * * *3 124.74.57.93 (124.74.57.93) 5.325 ms 5.314 ms 5.310 ms4 101.95.42.177 (101.95.42.177) 5.219 ms 5.222 ms 5.214 ms5 6
Installing JDK Java-version under Linux is not the version you needSetting environment variables, which is the most importantAdd under the Etc/profile fileExport java_home=/usr/java/jdk1.8.0_131Export path= $JAVA _home/bin: $PATHWarm hint, modify the configuration file before the Bak one, in the case you are not sure, so as not to change the wrong, affecting other functions, and can not recover.If you do not want to re-system, you can use the command
ReproducedThis article collects and collates some methods to review whether Linux systems are compromised, which can be added to your operations routine patrol.1. Check your accountThe code is as follows:# less/etc/passwd# grep:0:/etc/passwd (check if a new user was generated, and UID, GID is 0 users) # ls-l/etc/passwd (view file modification date) # awk-f: ' $3=
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.