Tags: LinuxEight weeks three sessions (March 28)10.32/10.33 rsync via service sync10.34 Linux system logs10.35 Screen ToolExtended
Linux log File Explorer Logrotate http://linux.cn/article-4126-1.html
Xargs Usage Detailed http://blog.csdn.net/zhangfn2011/article/details/6776925
10.32rsync synchronization via service (UP)Open two virtual machines, a machine 192.168.133.130,b machine 192.168.133.130, two machines can communicate with each other.A machine file is synced to machine
/wtmpUsed to view the correct login history, he is a binary file that cannot be viewed by cat and can only be viewed with last.LASTB command to view the user who failed the login, the corresponding file is/var/log/btmp/var/log/secureHe is the log that logs the login failure. He is also a binary file and cannot be viewed by cat./var/log/secure Security LogHe logs log-in related, Pam-related, and so on. If someone has hacked our device, it will also be recorded in this file.Screen toolVirtual Term
315.1 FTP Introduction15.2 using VSFTPD to build FTP service (top)Install the VSFTPD software package, the command is as follows;Create a virtual user with the following command:Edit the file virtual user's password file.Write content, odd behavior user command, even behavior password.Need security, not everyone can read, set permissions, command as follows:Go to DirectoryTo the first user, create the first configuration file. The configuration file and user name are the same.Copy the following
PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMANDroot 1 0.0 0.6 128164 6824 ? Ss 5月06 0:02 /usr/lib/systemd/systemd --switched-root --system --deserialize 21root 2 0.0 0.0 0 0 ? S 5月06 0:00 [kthreadd]root 3 0.0 0.0 0 0 ? S 5月06 0:00 [ksoftirqd/0].......
How to see if a process is running, as in the following example:[[Email protected] ~]# PS aux | grep nginxRoot 44476 0.0 0.0 112676 984 pts
. The disadvantage is that the name of the process is not displayed.Linux under Grab BagGrab Bag Tool tcpdumpSee which packages are coming in. And the flow of data, length. The default is TCP packets, if you find a lot of UDP packets are likely to attack. Eg DDos UDP flood. Access to professional anti-attack devices or services only.TCPDUMP-NN NIC Name-nn the first n means that the IP is displayed as a number without displaying the hostname.Time source IP and port > Destination IP and port: Pack
After learning about the advantages of the open-source RDBMS Relational Database Management System, you have installed the MySQL database to provide registration, subscription, and e-commerce services for Web applications. Database reliability alone
This is a created
article in which the information may have evolved or changed.
This Morning + Noon toss fast 3-hour routing module Crazy failure, how to change are 404, in the near despair, group master help find out the problem: Import Guide
What are the 40 common mistakes of PHP programmers ?, Bad habits of programmers. What are the 40 common mistakes of PHP programmers ?, Bad habits for programmers 1. do not write comments 2. do not use IDE tools that can improve production efficiency
Old article
Looking at the development of the global virus, it is not difficult to find that the worm virus has made the anti-virus market a hit. Worms are easy to handle, such as kurniova, Sircam, red code, blue code, and bin Laden. They are more
The Tutorial at (www.bkjia.com) hopes that you will develop good naming rules when designing programs, even if you are doing a Demo, otherwise the error may make you creazy! Which of the following is my reference material! An extremely simple
C. Greg and Arraytime limit per test
2 secondsMemory limit per test
256 megabytesInput
Standard inputOutput
Standard output
Greg has an arrayASignature = SignatureA1, bytes,A2, middle..., middle ,...,ANAndMOperations.Each operation looks:LI,RI,DI, (1
Chapter I and Chapter II Basic OC syntax
IPhone development tutorial Chapter 1 Basic OC syntax iPhone development overview-required (1.1)Http://www.apkbus.com/android-102215-1-1.htmlChapter 2 installation and introduction of development tools for
Do not ignore any words that the customer has said-if it is through email communication, you should carefully analyze each sentence when receiving the customer's email, and think deeply about the customer's thoughts behind the request, only by
This article is translated from a gigaom article. The original post address is Jonathan boutelle, one of the CTO and founders of the famous site slideshare.
Cloud computing is a powerful tool for startups, because they can have almost unlimited
1. The project manager must pay attention to the three criteria for successful projects.
Simply put, one is punctuality, the other is budget control within the established scope (within budget), and the third is quality approved by managers and
I want to write it earlier than today.
Case 1:
No error is reported when accessing the JSP project and webpage, but no display is displayed. There is no error in the IDE syntax check for the white one.
Cause: javascript . If is used, this
A major system upgrade was recently conducted. Because there are many database scripts to be executed during the upgrade, a script that should not be executed was accidentally executed during the release. Although we promptly remedy the problem
The speech is recorded as follows:
Today, we can see that many of our members are old friends, including those from the media and investment companies, the first purpose of this meeting today is to discuss practices from traditional media to new
This time, the old database has about 0.3 million records. I did this for the first time and didn't think too much about the efficiency. This was implemented with the help of a friend. It took about two hours to complete the process (CPU: Sai Yang 3.
In the process of technological updates, there are still some people holding things that have passed through the air. some people enter the new world, but they still cannot get rid of old habits. I didn't use the word "bad habits", because I am also
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.