linux server

Alibabacloud.com offers a wide variety of articles about linux server, easily find your linux server information here online.

Getting Started with Linux network server configuration (i) _unix Linux

To establish a secure Linux server, you first need to understand the meaning of the configuration files that are related to the network service and how to configure them securely in the Linux environment. In a Linux system, TCP/IP networks are configured with several text files, and you may need to edit these files to

How to build a simple Linux Server

located instead of MBR during installation. Then, use the boot disk to start Linux, mount the Windows partition to/mnt/dos. Then run dd if =/dev/hda? Bs = 512 count = 1 of =/mnt/dos/bootsect. lin, so a bootsect is available in the Windows partition. lin file, which records the Linux partition boot information, and then in the Windows nt startup configuration file boot. add C: BOOTSECT to ini. LIN = "Red Ha

Linux server security audit tools and procedures

Today, many Linux servers are not just deployed on new machines. Professional Linux system administrators perform regular maintenance. It technicians often have to take full responsibility for the security of their own servers. if your server is intruded, not only is all sensitive information exposed, but the server it

Linux Upgrade NTPD server-compile and install NTP-4.2.8P9 and configure NTPD server

=/usr--bindir=/usr/sbin--sysconfdir=/etc--enable-linuxcaps-- With-lineeditlibs=readline--docdir=/usr/share/doc/ntp-4.2.8p9--enable-all-clocks--enable-parse-clocks-- Enable-clockctl make make install[Email protected] ~]# ntpntpd ntpdate ntpdc ntp-keygen ntpq ntptime ntptrace ntp-wait4. Create a configuration file[Email protected] ~]# cp/etc/init.d/ntpd.bak/etc/init.d/ntpd[[email protected] ~]# cp/etc/sysconfig/ntpd.bak/etc/ Sysconfig/ntpd[[email protected] ~]# cp/etc/sysconfig/ntpdate.bak/etc/

Linux Server build station data backup automatically upload FTP server

.TAR.GZ[[EMAILNBSP;PROTECTED]_WEB5 ~]# ls/data/code-backup/www.51cto.com/www.51cto.com_20180517_ 174409.TAR.GZ (2) database backup (automatically delete backup files up to 10 days ago) [[[emailprotected] crontab]# pwd/data/mysql_bakup/crontab[[emailprotected] crontab]# cat backup_db_ Xiaobaicai.sh#!/bin/bashmysql= "/usr/bin/mysql" mysqldump= "/usr/bin/mysqldump" backup_dir= "/Data/Mysql_Bakup" #DB_ socket= "/var/lib/mysql/mysql.sock" db_hostname= "119.27.184.XX" dbname= "Xiaobaicai" db_user= "Db

Linux installation Oracle client does not open install to Leader Server name: Server Name Error Resolution method

Label:$./runinstaller command execution, pop up an error message dialog box, the content is very simple, only "info:info" a few words (server named info)1. View detailed error information$CD/tmp$more Orainstall2014-04-18_01-38-41am.err2, problem analysis2.1 View host Name: INFO$ hostname2.2 Viewing the IP and host name configuration in the hosts$ cat/etc/hosts#127.0.0.1 localhost localhost.localdomain localhost4localhost4.localdomain4:: 1 localhost lo

Linux Common server build-ftp server

Before configuration, please close Selinux,firewallsystemctl Stop Firewalld.service #停止firewallTurn off the default firewall firewall 500 OOPS:vsftpd:refusing to run with writable root inside chroot () to fix this error, you can use the command chmod a-w/home/user to remove the user's home directory Write permission, notice to replace the directory with your own. Or you can add one of the following two entries in the VSFTPD configuration file: Allow_writeable_chroot=yesInstallation Environme

FAQs about FTP server deployment on Linux

Article title: FAQs about FTP server deployment on Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. The File Transfer Protocol (FTP) is a common method for transferring files

Linux Server adventure using lighttpd

Linux Server adventure: Use lighttpd-Linux Enterprise Application-Linux server application information. The following is a detailed description. I. Why lighttpd? Isn't apache acceptable? When only static objects are supported, such as video clips and files, Lighttpd is faste

Linux Server Analysis Optimization

Ext.: http://jiekeyang.blog.51cto.com/11144634/1774473I. System performance Analysis1. The performance of the system refers to the effectiveness, stability and responsiveness of the operating system to complete the task . The complete task of the operating system is related to the system itself, the network topology, the routing device, the routing strategy, the access device and the physical circuit . when the Linux

SSH key login makes Linux vps/server more secure

As PHP becomes more popular, Linux vps/servers are used more and more, and Linux security issues need to be enhanced, if you install denyhosts and set up email reminders, you may be subject to several letters each day denyhosts The reporting will come to break the SSH password IP join/etc/hosts.deny. There are two types of Linux ssh logins: 1, the use of passwo

Linux Common server build-ftp server

FTP ServerFTP is the abbreviation for file Transfer Protocol (document Transfer Protocol), and Chinese is called "Interfax protocol".Used for two-way transmission of control files on the Internet.At the same time, it is also an application (application). There are different FTP applications based on different operating systems, and all of these applications follow the same protocol to transfer files.In the use of FTP, users often encounter two concepts: "Download" (Download) and "Upload" (Upload

Improve VSFTP server security in Linux

Article Title: improve the security of VSFTP servers in Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. FTP is an old character in Internet applications, which facilitates file sharing among enterprise users. However, t

Configuring a syslog server on Linux

A syslog server can be used as a log monitoring center in a network, and all the facilities that can send logs over the network (including Linux or Windows servers, routers, switches, and other hosts) can send logs to it. By setting up a syslog server, logs sent by different facilities/hosts can be filtered and merged into a separate location, making it easier fo

Linux Server Security Configuration _linux

The first part: RedHat Linux Chapter 1. Overview Linux Server version: RedHat Linux as For an open operating system---Linux, system security settings include minimizing system services, restricting remote access, hiding important data, patching security vulnerabilities, adop

Building an efficient FTP server with Linux

the same direction, and the client initiates a connection to the server for data transfer. The client's connection port is the port to use when initiating the data connection request. When an FTP client accesses an FTP server outside the firewall, it needs to use the passive transfer mode. 3. Single port mode In addition to the above two modes, there is also a single port mode. The data connection reques

Use ten commands to check Linux server performance within one minute

Use ten commands to check Linux server performance within one minute If the load on your Linux Server suddenly surges and an alert message is sent to your mobile phone, how can I find out the Linux performance problem in the shortest time? Let's take a look at this blog post

SSH key logon makes Linux VPS/server more secure

As PHP becomes more and more popular, Linux VPS/servers are used more and more, and Linux security issues need to be strengthened. If you have installed DenyHosts and set up email reminders, you may receive several DenyHosts reports every day to add the IP address that is used to crack the SSH password to/etc/hosts. deny. There are two types of Linux SSH Logon: 1

Linux Server NIC Driver Installation and troubleshooting (figure)

Article Title: Linux Server NIC Driver Installation and troubleshooting (figure ). Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.    3. Set an IP address for the new Nic    An alia

Linux Server program specification

In addition to network communication, the server program must also take into account many other details of the problem, fragmented, but basically the template-style. ——— cited Linux server programs typically run in the background. Daemon is also known as the daemon process. It does not control the terminal and therefore does not accidentally accept user

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.