command. It may seem quite normal for you. The figure below shows an example of the ps command output. The real problem is, "Are you sure you are normal ?" A common trick for hackers is to replace the ps command, and the ps command will not show the illegal running on your machine. To test the command, check your ps file size. It is usually located in/bin/ ps in our Linux machine, it is about 60 kb. I rece
The GNU C Library (GLIBC) is the GNU implementation of the standard C library. GLIBC is a key component of the GNU tool chain for use with binary tools and compilers to generate user-space applications for the target schema.
Some Linux programs may need to be linked to a specific version of GLIBC when building from the source code. In this case, you may want to check the installed GLIBC information to see
Linux tips: How to check which font is used in PDF
Q: I want to know what fonts are used in the PDF file or what fonts are embedded. Is there a tool in Linux that can check which font is used in the PDF document?
To check whether the PDF file contains or uses any font, you
over by someone.
Can you trust your ps command?
The first trick to find out the root kit is to run the ps command. Everything may seem normal to you. The figure below shows an example of ps command output. The real problem is, "Is everything really normal ?" A common trick for hackers is to replace the ps command, and the ps on the replace will not show illegal programs running on your machine. To test files, check the size of your ps file, which is
The last section of the Linux system security performance check notes has not been understood yet.
Note:
1. Accounts check
# Less/etc/passwd# Grep: 0:/etc/passwd
Note that new users, UID, and GID are 0.
2. Log Check
Note "entered promiscuous mode"
Note:
Remote Procedure Call (rpc) programs with a log entry that in
the program 4.Helgrind: It is mainly used to check the competition problem that occurs in multiple threads 5.Massif: It is primarily used to check the problems that arise in the use of the stack in the program 6.Extension: You can use the features provided by the core to write your own specific memory Debugging Tools Linux Program memory space layout
Code snippe
Article Title: How to check whether the USB flash disk is connected in Linux. Linux is a technology channel of the IT lab in China. Including desktop applications, Linux system management, kernel research, embedded systems, open source, and other basic categories in Linux sy
over by someone. Can you trust your ps command? The first trick to find out the root kit is to run the ps command. Everything may seem normal to you. The figure below shows an example of ps command output. The real problem is, "Is everything really normal ?" A common trick for hackers is to replace the ps command, and the PS on the replacement will not show the illegal operations on your machine.Program. To test files, check the size of your Ps file
Check the linux Startup time-Linux Enterprise Application-Linux server application information. The following is a detailed description. You need to know how long it takes for your server to start up and what processes and services you have started. In addition to viewing logs, you also have a more graphical method, th
If you are a white-collar engineer, often sitting in the office and sending and receiving emails every day, you can use the Linux operating system in the company, so you have installed the mail system in the Linux operating system, but do you know the installation is successful? In Linux, how does one check whether the
time after unlocking, Unit is seconds;Root_unlock_time set the root user lock, how much time after the unlock, the unit is seconds;3. system file Permission check
000
4. System User default access rights
Cat/etc/login.defs See If Umask is 077
5. Check whether the log is turned on
CAT/var/log/messagescat/var/log/secure
6. Vie
A little understanding of Linux under MCE (Machine Check Exception)
1.MCE (Machine Check Exception) is a logging mechanism used to report host hardware-related issues.
The log file for the 2.MCE (Machine Check Exception) is/var/log/mcelog
3. The mcelog does not necessarily exist on any
In Linux, check whether the USB flash drive is inserted-general Linux technology-Linux technology and application information. The following is a detailed description. The Linux File System is asynchronous. That is to say, writing a file is not saved to the media (hard disk,
command, and the first matching command will be executed. )[[email protected]] #!rpmList all history on a per-screen basis:MoreImmediately clears the history of all current historical commands[[email protected]] #history-CCat, tail and watchSystem all the logs are under the/var/log to see their own (specific use can be self-check, appendix lists some common logs)Cat/var/log/syslog et Cat/var/log/*.logTail-fIf the log is updated, how to view tail-f in
Linux has become more and more popular among computer users. As a result, many people begin to learn about Linux. Today, we will explain how to use BackTrack to check Linux security vulnerabilities. I hope you will learn how to apply BackTrack to check
Article Title: Practical Tips: How to check the number of CPUs in Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
# Cat/proc/cpuinfo
Lin
This article describes how to correctly check the port number occupied by DB2 in Linux or Unix, if you are interested in the actual operation steps for correctly checking the DB2 port number in Linux or Unix, you can click to view the following articles.
Linux, Unix, port Linux
scanned by some hackers by a specific port of a wide range of machines, and tries to intrude into the system through this port. Unfortunately, the firewall or PortSentry program treats these intrusion attempts as normal and reasonable connections.
System Log check)
Logcheck is the software (http://www.psionic.com/abacus/logcheck/) used to scan system log files ). Logcheck scans System Log Files (in Linux,
Check the port number opened on the server in Linux.
Before discussing this issue, let's take a look at computer concepts such as physical ports, logical ports, and port numbers.
Concepts related to ports:
In network technology, a Port can be a logical Port or a physical Port. Physical port refers to the physical port, such as ADSL Modem, Hub, switch, router interface used to connect to other network d
Check the cpu temperature in linux. install lm_sensors and install lm_sensors to check the temperature of www.2cto.com yum-y install lm_sensors rpm-qa | grep coretemp. Check whether kmod-coretemp exists, if not, you need to install this x86 and x64 systems directly wget http://www.pperry.f2s.com/
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.