best linux server distro for home

Read about best linux server distro for home, The latest news, videos, and discussion topics about best linux server distro for home from alibabacloud.com

How to check whether a Linux server is attacked

history files to/dev/null so that you cannot see the commands they have input. You can access your history file by typing history at the shell prompt. If you find that you are using the history command and it does not appear in the list of commands you have used before, you should take a look at your ~ /. Bash_history file. If the file is empty, execute an ls-l ~ /. Bash_history command. After you execute the preceding command, you will see the following output: -Rw ------- 1 jd 13829 Oct 10/

UbuntuServer14.04 Install Web Server (Linux + Apache + MySQL + PHP)

installation configuration LAMP (Apache + PHP5 + MySQL) server environment http://www.linuxidc.com/Linux/2014-12/111030.htm Ubuntu 14.04 configure LAMP + phpMyAdmin PHP (5.5.9) Development Environment http://www.linuxidc.com/Linux/2014-10/107924.htm Windows 7 hard drive installation Ubuntu 14.10 graphic tutorial http://www.linuxidc.com/

Deploy Python's Django project to Apache server under Linux

It took some time these days to deploy the Django-developed Web project to Apache, referencing some official documents and documents on the Internet, or spending more time on the configuration process. Convenient to have the need of friends, can refer to, less detours! 1. Django Project Deployment Environment descriptionOperating system: Red Hat Enterprise Linux Server Release 5.3 (Tikanga) x86_64 Apache V

Configure WEB application logs on a Linux server to print to a specified file

On the Linux server, configure the WEB application logs to print to the specified file server environment, which is RedHat Linux and runs Apache + Tomcat, the container runs a small e-commerce website of our company. The log information in the original project is printed directly with the Tomcat container to/tomcat/log

Seamless upgrade of Nginx on linux server

Seamless Nginx upgrade for linux server 1. download the latest official Nginx website: http://nginx.org/2.pdf use xftpto upload and download a compressed package (nginx-1.4.0.tar.gz) to/home on the server 3. use putty to log on to the server, go to the/

Linux NFS server builds and uses Windows,macos system mount directory

Reference Blog: www.linuxidc.com/Linux/2017-02/141150.htm1 Installing NFS Servicessudo apt-get install nfs-kernel-server Nfs-common2 Setting Mount directory permissionssudo vim/etc/exportsAssuming that the NFS shared directory is/HOME/RYAN/NFS, allowing all clients access, the/etc/exports file can be written as:/home/r

Linux Squid Configuration Detailed details Squid Proxy server configuration 1th/3 page _linux

Proxy server is the function of network users to obtain network information, it is a transit point for network information. With the widespread use of proxy servers, a series of security issues followed. Because there is no comprehensive and meticulous configuration of the access control policy of proxy server, the user can access many pornographic and reactionary illegal sites through proxy

Apache HTTPD-based SVN server Setup and configuration in Linux

] The configuration of the table name HTTPD has successfully started successfully when the above words appear.6. Start SVN? 1 [[emailprotected]~]#svnserve-d-r/home/svn/ 7. See if the SVN service is working? 1234 [[emailprotected]~]#psaux|grepsvn##出现以下内容说明svn服务已经成功启动root86100.00.0152864740?Ss11:250:00svnserve-d-r/home/svn/repos1/root131280.00.01

Setting up the ArcGIS Server service on startup in a Linux environment

ArcGIS Server is deployed in a Linux system with CentOS 6.5 installed in VMware 11.0, which does not automatically start the service when it is installed, and it is cumbersome to start it manually (as shown) each time it is powered on. This document documents the process of setting up the boot ArcGIS Server service from startup.1. Log in to

Notes on Linux physical server migration

Notes on Linux physical server migration Two days ago, we performed online migration on the two servers in the production system. Therefore, we would like to summarize some of the operations and lessons learned before and after the migration. In a professional style, I have read some official migration guides from Microsoft and RedHat before and after that, but I found that there are not many practical sect

TFTP server configuration in Linux

In Linux, the TFTP server configures the TFTP server as the software working on the host machine and mainly provides download of the main image files on the target machine. 1. to install the tftp server, you must install xinetd (dependency), tftp (tftp command), and tftp-server

Linux NTP server build explaining

Linux NTPServer(time server)Date–s 22:12:30 # Set timeleap seconds 7 months 1 days : minutes at this time, to turn off the NTP service1.1.Software InstallationRequired software: installed by defaultYum Install Ntp-yntpdate-4.2.6p5-1.el6.centos.i686Fontpackages-filesystem-1.41-1.1.el6.noarchntp-4.2.6p5-1.el6.centos.i6861.2.ConfigurationNtpConfiguration file:Vi/etc/ntp.conf! NTP policyRestrict(limit) default

Set up an FTP server in Linux (6)

Article Title: Setting up an FTP server in Linux (6 ). Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. Ensures ftp server security First

NFS server steps for Linux client configuration Kerberos Authentication

activates the daemon and then starts listening on client side requests:#/etc/rc.d/init.d/nfs StartUsers can also restart the Linux server and start the NFS service automatically.After the NFS server is started, you will also need to check settings such as the firewall for the Linux

Four security policies for remote Linux server access through SSH

More and more webmasters begin to use independent hosts and VPS. In order to save costs or improve performance, many independent machines and VPS are all unmanaged bare-metal machines, and everything needs to be DIY. At this time, the implementation of security policies is still important. In the following article, I will take CentOS as an example to briefly summarize how to configure Secure SSH access. Linux SSH Security Policy 1: Disable irrelevant

Use linux TC for server traffic control

The network environment of a server in the company is too high. when the server is connected to the source server for download, it runs to 400 M-500 M. in order to control the server, we studied TC. To control traffic. to control it to a small point, do not let this one occupy all the networks. TC is very powerful. man

Linux Setup DNS server (ii)

2. Install Server Software 2.1 Get the Bind package (now the new version is 8.2.2 P5) Get the latest stable version of three files from Bind's home page http://www.isc.org: Bind-contrib.tar.gz Bind-doc.tar.gz Bind-src.tar.gz Or get three files from the http://www.redhat.com: bind-8.2.2-p5-9.i386.rpm bind-devel-8.2.2-p5-9.i386.rpm cache-nameserver-6.2-2.noarch.rpm 2.2 Installing the BIND package I

Django Displays the text content of a Linux server on a Web page

Displaying the contents of a Linux server on a Web pageDjango Project name: Minicms/home/username/minicmsApp name in Project: News/home/username/minicms/newsRelated documents:/tmp/abc.txt#cat/tmp/abc.txt company public Network IP address: 183.54.15.11 server memory:192.168.1

A tutorial on Linux to install PROFTPD using FTP server

use the default value and install as standalone server. The code is as follows: sudo netstat-antp|grep proftpd View 21 ports for PROFTPD listening Create a new virtual user test and set a password with the ftpasswd provided by PROFTPD: The code is as follows: sudo mkdir-p/png/proftpd The code is as follows: sudo ftpasswd \ --PASSWD \ --FILE=/PNG/PROFTPD/PASSWD \ --name=test \ --uid=122 \ --gid=65534 \ --

Four tips for configuring Linux server SSH security access _linux

I take CentOS as an example and simply summarize how to configure SSH security access. Linux SSH Security Policy One: close unrelated portsMost of the hosts captured on the network were targeted by hackers scanning the tools in large areas. So, to avoid being scanned, all but the necessary ports, such as Web, FTP, SSH, and so on, should all be turned off. It is worth mentioning that I strongly recommend shutting down the ICMP port and setting the rul

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.