file,Both sides of the user do not correspond, resulting in the inability to login, and then find the appropriate solution on the Internet, most of the solution to the use of single-user mode to reset the password, but the server in the customer's company, but alsois to contact them to solve, no way, things have reached this point, can only solve, so later trouble customer company maintenance personnel to deal with, very sorry.Online query, found that they are not a person, but this problem, I
# #发送邮件Fiecho "' Date +%t ' 502 $c _502"disk.sh Content#! /bin/bash# #Writen by alex##Rm-f. /log/disk.tmplang=enFor R in ' Df-h |awk-f ' [%]+ ' {print $} ' |grep-v use ' # #以一个或多个空格或% as delimiterDoIf [$r-gt] [$send-eq "1"]Thenecho "$addr ' date +%t ' disk useage is $r" >> /log/disk.tmpFiIf [-F. /LOG/DISK.TMP]ThenDf-h >>. /log/disk.tmp/bin/bash. /mail/mail.sh $addr \_disk $r. /log/disk.tmpecho "' Date +%t ' disk useage is Nook"Elseecho "' Date +%t ' disk useage is OK"Fi
[%]+ represents o
action (U)10, replace all the etc in the entire file with a CTE (1, $s/etc/cte/g)11, move the cursor to line 25th, delete the string "ly" (25G then press J to move the cursor to the right to find "lyl", press V to select, then press x)12, Restore previous action (U)13, delete line 50th (50G DD)14, Restore previous action (U)15. Delete all contents of 第37-42 (37G 6DD)16, restore previous action (U)17, copy the contents of line 48th and paste it below line 52nd (48G yy 52G p)18, restore previous
Tags: LinuxEight weeks three sessions (March 28)10.32/10.33 rsync via service sync10.34 Linux system logs10.35 Screen ToolExtended
Linux log File Explorer Logrotate http://linux.cn/article-4126-1.html
Xargs Usage Detailed http://blog.csdn.net/zhangfn2011/article/details/6776925
10.32rsync synchronization via service (UP)Open two virtual machines, a machine 192.168.133.130,b machine 192.168.133.130, two machines can communicate with each other.A machine file is synced to machine
/wtmpUsed to view the correct login history, he is a binary file that cannot be viewed by cat and can only be viewed with last.LASTB command to view the user who failed the login, the corresponding file is/var/log/btmp/var/log/secureHe is the log that logs the login failure. He is also a binary file and cannot be viewed by cat./var/log/secure Security LogHe logs log-in related, Pam-related, and so on. If someone has hacked our device, it will also be recorded in this file.Screen toolVirtual Term
315.1 FTP Introduction15.2 using VSFTPD to build FTP service (top)Install the VSFTPD software package, the command is as follows;Create a virtual user with the following command:Edit the file virtual user's password file.Write content, odd behavior user command, even behavior password.Need security, not everyone can read, set permissions, command as follows:Go to DirectoryTo the first user, create the first configuration file. The configuration file and user name are the same.Copy the following
PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMANDroot 1 0.0 0.6 128164 6824 ? Ss 5月06 0:02 /usr/lib/systemd/systemd --switched-root --system --deserialize 21root 2 0.0 0.0 0 0 ? S 5月06 0:00 [kthreadd]root 3 0.0 0.0 0 0 ? S 5月06 0:00 [ksoftirqd/0].......
How to see if a process is running, as in the following example:[[Email protected] ~]# PS aux | grep nginxRoot 44476 0.0 0.0 112676 984 pts
. The disadvantage is that the name of the process is not displayed.Linux under Grab BagGrab Bag Tool tcpdumpSee which packages are coming in. And the flow of data, length. The default is TCP packets, if you find a lot of UDP packets are likely to attack. Eg DDos UDP flood. Access to professional anti-attack devices or services only.TCPDUMP-NN NIC Name-nn the first n means that the IP is displayed as a number without displaying the hostname.Time source IP and port > Destination IP and port: Pack
The process of memorizing the word in hongbao should be a continuous process, and never be interrupted for any reason.
No. 1: The process of memorizing the word in hongbao should be a continuous process, and never be interrupted for any reason.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131227/060552O24-0.png "title =" simple vpn .png "/>
The IP address range 192.168.1.0 can be pinged to the IP address range 192.168.2.0.
R1:
Conf ter
Int f1/0
Ip add 12.1.1.1255.255
1. Topology Map:
Note: Because of the application, it is necessary to add a public network address on the LINUX2, and Linux1 can access the public network address above the LINUX2 in the event that the intermediary routing device is not under
After learning about the advantages of the open-source RDBMS Relational Database Management System, you have installed the MySQL database to provide registration, subscription, and e-commerce services for Web applications. Database reliability alone
This is a created
article in which the information may have evolved or changed.
This Morning + Noon toss fast 3-hour routing module Crazy failure, how to change are 404, in the near despair, group master help find out the problem: Import Guide
What are the 40 common mistakes of PHP programmers ?, Bad habits of programmers. What are the 40 common mistakes of PHP programmers ?, Bad habits for programmers 1. do not write comments 2. do not use IDE tools that can improve production efficiency
Old article
Looking at the development of the global virus, it is not difficult to find that the worm virus has made the anti-virus market a hit. Worms are easy to handle, such as kurniova, Sircam, red code, blue code, and bin Laden. They are more
The Tutorial at (www.bkjia.com) hopes that you will develop good naming rules when designing programs, even if you are doing a Demo, otherwise the error may make you creazy! Which of the following is my reference material! An extremely simple
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.