On the internet to see a lot about Linux optimization of good articles, here I do not repeat these articles, I just want to from my own experience to talk about this aspect of the problem.
As a system administrator, I'm talking about Linux based on server applications, because the use of
Kali system installation text tutorial, kali system installation text
Tools and Raw Materials
1. Virtual Machine: Oracle VM VirtualBox
: Https://www.virtualbox.org/wiki/Downloads
Download from your computer's operating system. If the host is a 32-bit x86 version, download the 64-bit x64 version.
2. ISO document: kali-
Now most of the computer users are no longer using XP system, because the XP system will always prompt "XXX error", there are some security risks, so most users should choose to upgrade the system to WIN8. The WIN8 system has many benefits, such as its compatibility with all Win7 applications, faster startup, support f
Tags: Linux shutdown shutdown3.2 "Linux learning is not difficult" Linux character Interface (2): Shutdown command to shut down and restart the Linux systemThe shutdown command can safely shut down or restart the Linux system, and
uninstall a file system in use. In addition, for the sake of security, in Linux systems, only the system administrator root can complete hard disk partitioning, formatting partitioning, installing the file system, or uninstalling the file
The improvement of Linux system security is a task that administrators should pay great attention to. It can be implemented in many ways. Here we will first introduce how you implement system security through system optimization, it not only improves Linux
will be subject to the following four restrictions: execute external commands when opening files, some restrictions are imposed on connecting to MySQL database HTTP-based authentication in safe mode, only external programs in a specific directory can be executed. calls to other programs will be rejected. This directory can be specified by using the safe_mode_exec_dir command in the php. ini file, or by adding the -- with-exec-dir option to compile PHP. the default value is/usr/local/php/bin. If
, and page format files.The/home directory contains the user's files: parameter settings files, personalization files, documents, data, EMAIL, cached data, and so on. This directory should be maintained at the system provincial level.The/proc directory contains all the unreal files. They do not actually exist on the disk, and they do not occupy any space. (Ls–l can be used to display their size) when viewing these files, they are actually accessing th
solutions to install the decoder.
After the decoder is installed, click "tool"-> "Check environment" in the lite MP4 tool. The following dialog box is displayed:
If all three are "installed", the environment will basically be okay. Next, let's take a look at the tutorial and try to see if AVS can be properly previewed.
Player selection:You may not be very clear about the decoder and player concepts. So that you do not know what a decoder i
super users. Sudo is such a tool.
The Sudo program allows a general user to log on again with the user's own password after the configuration is set, to obtain the permissions of the Super User, but only a limited number of commands can be executed.
Set the security level of the user account
In addition to passwords, user accounts also have security levels, because each account on Linux can be assigned different permissions. Therefore, when a new use
partition of the hard disk, each partition has detailed information, Not in detail here;The relationship between disk partitions and directories under Linux is as follows:– Any partition must be mounted on a directory.– The directory is a logical distinction. Partitioning is a physical distinction.– The disk Linux partition must be mounted to a specific directory in the directory tree for read and write op
Install and configure MemcachedforPHP5.3 in Windows. Install and configure MemcachedforPHP5.3 in windows. how can I enable php to support memcached on windows? Step 1: install the Memcached service Step 2: Let php load memcach and install and configure Memcached for PHP 5.3 in the win system
On windows, how does one enable php to support memcached?
Step 1: install the Memcached serviceStep 2: Let php load the memcached. dll extension
See the followin
Tutorial on setting up FTP service in Linux and tutorial on linuxftp
It is easy to create users in Linux, but these operations are not often performed. After a long time, it is easy to forget. By the way, Configure FTP. Statement: use Linux version release 5.6 and run it as
A tutorial on configuring LNMP under the Debian system, DEBIANLNMP
LNMP environment configuration is required to let our host support Nginx, MySQL, PHP, PhpMyAdmin, so configured to use this environment directly, and run the site on the above, I will configure the method.
We'll take a look at the official statement
LNMP One-click installation package is a Linux
The log subsystem in Linux is very important for system security. It records all kinds of events that occur in the system every day, including those users who used or are using the system, logs can be used to check the cause of the error. More importantly, after the system i
temporary file storage point used by the system administrator/tmp public/root system administrator's main directory (haha, privileged class) /The mnt system provides this directory for users to temporarily mount other file systems. The/lost + found directory is usually empty, and the
source code of the program
Linux
Directory structure
Because the files in/usr are not related to a specific computer and will not be modified in normal use, you can share the Directory (file system) over the network. in this way, after the administrator installs the new software, all computers that share the file system
people from system installation to system security. it is more useful to read these documents than to read the essence of any forum. books and documents are like three meals a day that you can't leave every day. The essence of documents in the forum area is like snacks and fruits. you can choose not to eat snacks or fruits, but never to eat dinner.
Of course, you cannot read the document for reading the
bindings on the RS side, do not set 0 even if the VIP bindings are stoppedif [${#VIP [@]}-le 1];thenecho "0" >/proc/sys/net/ipv4/config/lo/arp_ignoreecho "0" >/proc/sys/net/ipv4/config/lo/arp_announceecho "0" >/proc/sys/net/ipv4/config/all/arp_ignoreecho "0" >/proc/sys/net/ipv4/config/all/arp_announceFi
Inspection of the service provided by the RS node itself
Auxiliary exclusion Tool Tcpdump Ping
Load balancing and reverse proxy clusters
2.4.4 LVS make Error[[email protected] i
Although the Linux operating system is much more stable than the Windows operating system. However, this stability is relative. That is to say, the Linux operating system may also get angry. In some cases, the system's resource usage (including CPU or memory) may reach more
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.