When you do not need to use a secure folder, you can uninstall it, and the contents and applications will be deleted, as follows:
1. On the main screen, click "Settings".
2. Click "Lock screen and security".
3. Click on "Security Folder".
4. Click "Uninstall".
5. If you choose Uninstall at this time, all applications in the
sessioncreated ( Httpsessionevent se) {
//We encapsulate the created session in a map
map
Two, the foreground display page we use before and after the login, are displayed in a page, using JSTL expression to make the difference can be.
Among them, we use when the login successfully, we will use the set session directly, so that the difference can be, when we adopt a
In the previous article to ensure that Linux VPS and server more secure Xshell set key login article has been shared to Xshell use the key to login to our VPS server to ensure the safety of the machine, but many students are not like the old left with Xshell, There are still a lot of use putty login ssh, so a separate
protect against a small number of DDoS attacks
Regardless of how our website project program to do security, VPS login security is necessary to do, even if we modify the port, it will be guessed that the other port number to crack out, a more secure solution is that we use the key to log in, For example, we need to use Xshell (here to share the Xshell key login
A reasonable use of the shell History command logging functionUnder Linux, the History command allows you to view all of the user's historical operations records, while the shell command action record is saved by default in the. bash_history file in the user directory, which allows you to query the execution history of the shell command. Help operations personnel to conduct system audits and troubleshooting, while the server has been hacked, you can also use this command or file to query the hac
A reasonable use of the shell History command logging functionUnder Linux, the History command allows you to view all of the user's historical operations records, while the shell command action record is saved by default in the. bash_history file in the user directory, which allows you to query the execution history of the shell command. Help operations personnel to conduct system audits and troubleshooting, while the server has been hacked, you can also use this command or file to query the hac
}/${user_ip}.history. $DT"
Export histtimeformat="[%y.%m.%d%h:%m:%s]"
chmod $HISTDIR/${logname}/*.history* 2>/dev/null
Keep the folder directory of History commands as discreet as possible to avoid being deleted by hackers.Second, reasonable use of Su, sudo commandThe SU command is a tool for switching users, and is often used to switch ordinary users to superuser and, of course, from a superuser to a normal user. In order to ensure the secu
Implement secure password-free SSH login
1, the use of Ssh-keygen to generate a pair of public private keys, commands are as follows
SSH-KEYGEN-T RSA
A carriage return will allow you to enter the path and name of the public key, which is stored by default in the ~/.ssh/directory
Then enter a password to protect the private key, if you enter the password here, you will be connected to upload the public key
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.