http://jxtm.jzu.cn/?p=3692Hello everyone, I am a South African ant, today share with you the topic is: Online linux server operation and maintenance security policy experience. Security is the IT industry a commonplace topic, from the previous "prism door" incident reflected a lot of security issues, to deal with information security issues have become urgent. Therefore, as operations personnel, it is neces
Content Abstract: some experience in using MySQL services, mainly from the following aspects of MySQL service planning and design. For high-load sites, PHP and MySQL running together (or any application and database running together planning) is the biggest performance bottleneck. Such a design is like making people draw a picture in one hand, in this way, the work efficiency of two people is definitely not as high as making one person draw a circle and one person draw a picture, running applica
different environment and cannot generalize).This rebulid\reorg index will be quite expensive for resources and time-consuming, and in some cases will not give you the opportunity to do so.For example, the following rebuild a composite index time-consuming situation, just one index on a table, it took 5 minutesIt's normal for a business to have such 35 indexes on a complex table.According to this, if the whole library or the entire instance under the more than 10 library, each library hundreds
:00 make a differential backup, as shown in the basic logic:(Figure: Database backup file generation logic)Tips:1. If your database is larger, and streaming data (that is, some of the recorded data) is more, we would like to separate these large tables out of a new database (vertical cutting database), so the next question, this article can be solved;2. If the stream data cannot be separated from the database, then the table partition can be considere
Server maintenance knowledge 1. boot sequence
Generally, the system should strictly follow the steps below:
Turn on the total power supply.
Power on the computer Cabinet
Power on external devices (such as disk arrays and tape libraries)
After the external device self-check is complete, the host is powered on.
Server maintenan
In response to the phrase "it is more difficult to win the world to keep the world", server maintenance is like "keep the world "! The network is paralyzed by a slight random gain. Maintaining servers requires a thorough understanding of the hardware, operating systems, and application software systems of the servers. It is also a system engineering, hardware System mai
following example of the master stylesheet method is used to import other style files. Using this method can not only optimize the style structure, but also reduce unnecessary server requests. There are many methods to break down files. master stylesheet uses the most common one.
@ Import "reset.css? 1.1.5 ";
@ Import "layout.css? 1.1.5 ";
@ Import "colors.css? 1.1.5 ";
@ Import "typography.css? 1.1.5 ";
@ Import "flash.css? 1.1.5 ";
/* @ Import "
, the basic logic as shown in the following figure:
(Figure: Database backup file generation logic)
Tips:
1. If your database is large, and the flow of data (that is, some of the recorded water data) More, our approach is to separate these large tables a new database (vertical cutting database), so the next question, this article can be resolved;
2. If the streaming data cannot be separated from the database, you can consider table par
First, backgroundPreviously wrote an article about backup: SQL Server maintenance plan to implement database backup, the above article using full backup and differential backup basically can solve the problem of database backup, but in order to protect the data more secure, we need to perfect our backup plan again;The following article mainly joins the log backup, and the design of the frequency of backup a
. Local Users and groups can be maintained here.
Click the local user option to enter the Local Users on Server page (Figure 2), which lists all the user accounts for the Windows 2003 server. Click the "New" button on the taskbar to create a new user. In addition, you can delete, modify, and so on users that already exist.
Switch to the "Local Group" tab, the u
: first think of what common properties, private properties, common skills, first stop instance of the angle to think
#Step Two: write when you start writing class, and then in the build instance
classChinese:dang='Gongchandang' #Common Properties
def __init__(Self,name,age,gender):#Private PropertiesSelf.name =name Self.age=Age Self.gender=GenderdefTalk (self):Print('chifan Shuijiao Dadoudou ...')#Common Skills
D=chinese ('Lijun', 18,'F') the idea of writi
Configure Server settings Server IP address1. Edit the network configuration file # Vi/etc/sysconfig/network-scripts/ifcfg-eth02. Modify the network Auto-start (Modify the contents of the file) Onboot=yesVI command, I edit, move cursor, modify No to Yes, press ESC, enter WQ, save and exit.3. Restart the network server # Service Network Restart4. View native IP ad
Windows Server maintains eight elements 1. Checks the website code to check whether webpage Trojans, ASP Trojans, and webshell programs are stored by hackers.
Windows Server maintains eight factors 2. Checks website code security and checks for SQL injection and file upload vulnerabilities, among other common site security hazards.
Eight factors for Windows
and import them to a TXT file. For example, we can use this command: netsh dhcp server export e: \ dhcp.txt all. Export the configuration file of the server to the root directory of the edisk. The file name is dchp.txt. If the server encounters a fault next time, we can use the command to restore it. Command syntax: netsh dhcp
recovery, and differential recovery;
With the above foundation, we have added database backup elements to generate database backup files through maintenance plans. These include two types of files: Full backup and differential backup of the database, with these two files, we can use SQL Server backup and restoration full strategy (Graphic operations) or SQL Server
What do the daily server maintenance do? server maintenance is a headache problem, often encounter such or such problems; If the company has the operation of cattle or hosting servers, renting servers in individual ISPs, congratulations, you are lucky, if not, it is best to regularly back up, check, to avoid problems w
From: http://www.51testing.com/html/95/n-125895.html
LinuxAlthough the server is relatively more stable and secure than the windwos server. However, to do this, you must first sharpen your tools. Stable and secure Linux servers are still inseparable from reasonable and timely maintenance.Work. There are many maintenance skills for Linux
The NTP server----operation of the Linux real-World Deployment series explains how to deploy a load-balanced and highly available NTP server under a simple architecture. Next, we need to understand the maintenance of the technology, so as to better escort the company's business AH.
NTP server
number 1. expand HKEY_LOCAL_MACHINE/SYSTEM/CURRENTCONTROLSET/CONTROL/terminal server/WDS/RDPWD/TDS/TCP to change PortNumber to the port number you want to use. use decimal (example 40228) HKEY_LOCAL_MACHINE/SYSTEM/CURRENTCONTROLSET/CONTROL/TERMINAL SERV ER/WINSTATIONS/RDP-TCP/PortNumber in the right key value to change the port number you want to use. note: Use decimal (for example, 40228). Note: The port 40228 is modified on the firewall of windows.
important. One backup every day can meet our business needs. How should we design our backup solution?
Perform a full database backup at on Sunday, and perform a differential backup at from Monday to Saturday at other times. The basic logic is shown in:
(Figure: database backup file generation logic)
Ti:
1. if your database is large and has a large amount of stream data (that is, some recorded stream data, our practice is to separate these large tables into a new database (vertical cutting dat
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.