]:~/download/nginx-1.11.1$
You can use the following command to enforce overrides:sudo cp-rfp Objs/nginx/usr/local/nginx/sbin/nginxThe sixth step starts the new version of Nginx master processSend USR2 signal to old version main process number:KILL-USR2 old Nginx Master process numberThe old Nginx master process receives the -USR2 signal, renames its .pid file .oldpid , and then executes the new version of the Nginx executable, starting the new v
-rf XX (delete all files in xx) 5.cp ———— copy files 1.cp xx/yy xx1/yy1 If yy is a file and Yy1 is a folder, copy yy to Yy1 if yy is a file, and yy1 is a file or does not exist, The yy is copied to xx1 and renamed to YY12.CP-RF Xx/yy Xx1/yy1yy is the folder will be yy all files copied to xx1 under YY1 (not copied permission property information) 3.CP-RFP Xx/yy Xx1/yy1yy is the folder will yy all the text Copy to xx1 under YY1 (Replication permission a
First, homework (exercise) content:1. Summarize the detailed usage method of the task plan (at, crontab) on Linux system;2, every Monday to Saturday 3:20 A.M., run the CP command to archive the/etc/directory, storage location is/BACKUPS/ETC-YYYY-MM-DD;3, every Sunday 2:30 A.M., run the CP command to backup the/etc/fstab file, the storage location is/BACKUP/FSTAB-YYYY-MM-DD-HH-MM-SS;4, every night 12 o'clock, get all the lines in the/proc/meminfo file starting with S or M, appended to the/statist
, which, by default, allows remote commands to be sent to the IIS server, which runs as a device user and by default is the system user. We can test the existence of this vulnerability in the following ways:
C:GT;NC-NW-W 2 Get/msadc/msadcs.dll HTTP
If you get the following information:
Application/x_varg
There is a good chance that this vulnerability will not be patched and you can use the rain Forest Puppy Web site's two programs to measure (WWW.WIRETRIP.NET/
By xundihttp://www.xfocus.org
Xundi1@21cn.com
Some of the loopholes in the IIS hack are sorted out here for your reference.
1, introduce
Because these methods are targeted for 80来 operations through ports, there is a certain threat because as a web you
This mouth is always open. If you want to check the leak while smoking, OK, you download some CGI scanners to
To help you check, you can try using these two:
"Whisker" by "Rain Forest Puppy" (WWW.WIRETRIP.NET/
To prevent your Web server from being compromised by security vulnerabilities, we recommend the following measures:
Adherence to the principle of least privilege
Make sure your Web server does not have any sample programs or unnecessary script and files that will disclose valuable information
。 Install only the things you need.
Regular Web server security
There are a wide variety of tool programs that allow you to do security audits for Web servers. Our favorites are whisker (http://www.wiretrip
Security | Front of the server like Shaun Clowes and RFP, etc. are more detailed introduction of PHP, CGI program in the programming process encountered problems, and how to use the Application vulnerability Breakthrough System, this article we have some of PHP server-side features to configure to enhance PHP security. When writing CGI scripts, we do pay attention to various security issues, the user input for strict filtration, but often in the shore
, allows remote commands to be sent to the IIS server, which runs as a device user and by default is the system user. We can test the existence of this vulnerability in the following ways:
C:\GT;NC-NW-W 2 Get/msadc/msadcs.dll HTTP
If you get the following information:
Application/x_varg
There is a good chance that this vulnerability is not patched and you can use rain forest
The puppy website's two programs are measured (WWW.WIRETRIP.NET/RFP) ==>mdac.
The Cp command adds the-I option by default in the system, so it automatically alerts you if the original file is overwrittenAlias view command aliases in the systemCP-RFP Dir1 dir2/
Rm/rmdir Delete directory, file RM must be used with caution
Rmdir Delete Empty Directory Rm Delete a file or directory-I overwrite replication with prompt information-F forced Override-R Recursive replicationRm dir1Rm file4Rm-f File6 does not need to a
realization team product implementation team
PS planned start date plan start date
PSA Professional Services Agreement professional service agreement
PSO program Support Office Project Group Support Office
PSP professional services provider Professional Service Provider
PV Price Variance price deviation
Pvwa planned value for work accomplished planned value of completed work
Pvws planned value for work scheduled planned work planned value QA Quality Assurance
Qar Quality Assurance representativ
turn off system service processes other than irqbalance and Messagebus, as well as conserve system resources.Four: how to use Stream1. Download Stream source program Stream.tar (http://www.nersc.gov/users/computational-systems/cori/nersc-8-procurement/ trinity-nersc-8-rfp/nersc-8-trinity-benchmarks/stream/)2, decompression Stream.tar, into the directory stream;3. Open the makefile file (e.g.), modify the compiler according to the platform, and open t
Enhance php security by configuring server-side features. author: san Home: http://www.nsfocus.com
Date: 2001-11-15
Previously, Shaun Clowes and rfp described in detail the problems encountered by php and cgi programs during programming and how to break through the system through application vulnerabilities, in this article, we will configure some server-side features of php to Enhance php Security. When writing cgi scripts, we must pay attention to
installed, recompile
Specifies the directory if it is a third-party module, or the module name if it is a built-in module.
./configure--prefix=/Your installation directory --add-module=/third-party module directory
./configure--user=www--group=www--prefix=/usr/local/nginx--with-http_stub_status_module--with-http_ssl_module- -with-http_v2_module--with-http_gzip_static_module--with-ipv6--with-http_sub_module--add-module=./ Do not execute install after nginx-sticky-module-ng//make, use manual
"alt=" Wkiom1fflc6xvtveaacbkdi4zdy582.png "/>4. Copy the image file to the/var/ftp/pub directory[Email protected] ~]# cp-rfp/misc/cd/*/var/ftp/pub/centos5. Turn on the VSFTPD service and turn off the firewall[[Email protected] ~]# service vsftpd restart [[email protected] ~]# service iptables stop6. Use the new machine to boot with a CD-ROM, manually specify the boot: press ESC on the boot screen to enter the boot interface. Enter the Linux ks=ftp://
Enhance php security by configuring some server-side features of phpBy san@xfocus.orgPreviously, Shaun Clowes AND rfp both described in detail the problems encountered by php and cgi programs during programming and how to connect themApplication vulnerability breakthrough system. In this article, we will configure some server-side features of php to enhance php security. WriteWhen Using cgi scripts, we must pay attention to various security issues and
directoryFind/-type l Search all soft links under the root directoryFind/-type b Search all block devices in the root directoryFind/-type f-links +1 Search in root directory for all hard links larger than one normal fileExample to find the owner of the IRA file and copy it to the /root/finds file#Mkdir/root/finds#Find/-user ira-exec cp-rfp{}/root/finds/\;#Ls/root/findsPS: doubt 1 if greater than or equal to 100min How to write? Find It ! -mmin2. Ln
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.