Discover kiwi syslog server linux, include the articles, news, trends, analysis and practical advice about kiwi syslog server linux on alibabacloud.com
to put the system log in memory, when the system shuts down and then copy it to the hard disk, when you run a syslog-enabled laptop or mobile device, Ramlog can help you improve the system battery or mobile device flash drive life, One of the benefits of using Ramlog is that there is no need to worry about a daemon sending a message to the syslog every 30 seconds, before the hard drive must be kept running
This article describes how to use php to troubleshoot and reinforce Linux server Trojans. This article describes how to search for, search for recently modified files, and modify php based on the pattern. ini, modify nginx. conf and other methods. if you need a friend, can you refer to the website frequently infected with Trojans? After some improvements, we can basically solve this problem. because discuz
This article describes how to use php to troubleshoot and reinforce Linux server Trojans. This article describes how to search for, search for recently modified files, and modify php based on the pattern. ini, modify nginx. conf and other methods. if you need a friend, can you refer to the website frequently infected with Trojans? After some improvements, we can basically solve this problem. because discuz
Install necessary software
Apt-get install pptpd kernel-tree-2.6.10 kernel-package
Apt-get install kernel-patch-mppe libc6-dev
Decompress Linux kernel
Cd/usr/src
Tar xjf kernel-source-2.6.10.tar.bz2
Configure the kernel
I copied an existing config file.
Cd/usr/src/kernel-source-2.6.10
Cp/boot/config-2.6.10-1-686-smp. config
Compile the kernel
Make-kpkg -- added-patches debian, mppe -- append-to-version-686-smp-mppe -- initrd kernel_image
Then go to t
Tags: statistics impact receive process blog End Agent Dynamic AtimeA Linux server Performance View 1.1 CPU Performance View 1, view the number of physical CPUs:cat /proc/cpuinfo |grep "physical id"|sort|uniq|wc -l2. View the number of cores in each physical CPU:cat /proc/cpuinfo |grep "cpu cores"|wc -l3, the number of logical CPUs:cat /proc/cpuinfo |grep "processor"|wc -lNumber of physical CPUs * Number of
http://jxtm.jzu.cn/?p=3692Hello everyone, I am a South African ant, today share with you the topic is: Online linux server operation and maintenance security policy experience. Security is the IT industry a commonplace topic, from the previous "prism door" incident reflected a lot of security issues, to deal with information security issues have become urgent. Therefore, as operations personnel, it is neces
BIND9Once the installation is complete, you can start it and let it start up as soon as the computer starts.
$ systemctl start named
$ systemctl enable named
Configure BINDThis service uses/etc/named.conf as the configuration file.BIND uses some statements like the following in that file:
Options: For global BIND configuration.
Logging: Configure what needs to be logged and what needs to be ignored. I recommend you look at
online attack password, as Beijing's users need to give priority to other options. For so many intrusion methods, I refer to Mr. H Ackalot, an article by the hacker celebrities, to introduce you to the basic steps of invading the website.
The analysis of a part of the home page by the black case can be found that the use of intruders are most interested in Web servers and FTP servers, because relatively speaking this is the simplest two ways. Given the reader's knowledge of the U nix system and
Linux DNS server views view and log system detailed
DNS server ACLs: Define ACLs in the named.conf file as defined variables in bash for subsequent referenceACL format:ACL ACL name {IP Address 1 or subnet segment 1;IP Address 2 or subnet segment 2;};For example: Write the Intranet 172.17.0.0/16 and 192.168.1.0/24,127.0.0.0/8 as ACLsACL Intra {172.17.0.0/
If you want to build a Linux server, and want to be able to maintain long-term, you need to consider security performance and speed, and many other factors. A proper Linux basic Security Configuration manual is particularly important. In my article I'll introduce you to the basic Security Configuration manual for Linux
primary domain: The configuration of the subdomain DNS server is complete.5.LogHow do we know if the DNS server is running, is it busy, and the load is small? To understand the health of the DNS server, you can do so by looking at the log files that are generated by the DNS server at run time. By default, bind is gene
LDAP (Lightweight Directory Access Service), by configuring this service, we can also manage users under Linux in the form of a directory, just like ad under Windows, which is easy for us to manage. Next we will configure the OpenLDAP service. This article runs the environment: CentOS 5. Software Requirements: db-4.7.25.tar.gz (http://www.oracle.com/technology/global/cn/software/products/berkeley-db/ index.html) openldap-stable-20090411.tgz (http://ww
This shell script is primarily used to initialize the new Linux server system, including shutting down the IPV6 module, turning off the SELinux, allowing Vim to display colors, setting system language encoding, optimizing system services, kernel parameter optimization, and so on
This shell script is primarily used for initialization of newly installed Linux
We need to do some basic security when we have a VPS or server that has a Linux system open.
There are probably several areas:1. Prohibit root account ssh, use custom account ssh;This way, the hacker must first guess the account number, then can guess the password;2. Prohibit account login, use PubKey login;3. For IP ACLs, allow only a few specific IP access;4. SSH port Migration, change the default 22 por
This shell script is primarily used for initialization of newly installed Linux server systems, including:
Turn off the IPV6 module
Close SELinux
Let vim display color
Set System language encoding
Optimizing System Services
Kernel parameter optimization and so on.
Can be modified according to their actual situation, can be used in production environment. The original author is Netseek, I made a partial mod
Write in front:When you get a server, don't worry about deploying apps, security is a top priority. If you sort the order, the Linux system can be secured by following several steps. This article is mainly for the enterprise common CentOS system, Ubuntu system slightly different can be Baidu query.1. System User Optimization2. System service Optimization3.SSH Access Policy4. Firewall configuration1. System
the {Pgid of their child processes. When a child process calls the Exec series of functions, the parent process can no longer set its pgid. 2.4 Session 2.4.1 Definition: Some associated process groups will form a session \ Implementation: Non-leader processes can call this function to create new sessions. Implementation feature: The calling process becomes the leader of the session, at which point the process is the only member of the new conversation. Create a new
Prepare the article:
RHEL 7.0 System installation Configuration Diagram Tutorial I'm not going to introduce you here.
Configuring a local Yum source with a system-mirrored file
1, using WinSCP.exe and other tools upload system image files Rhel-server-7.0-x86_64-dvd.iso to/usr/local/src directory
2. Connect to Rhel server remotely using Putty.exe tool
3. Mount System
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.