First, the system security record file
The record file inside the operating system is an important clue to detect whether there is a network intrusion. If your system is connected directly to the Internet, you find that a lot of people do telnet/ftp logon attempts on your system, and you can run the "#more/var/log/secure grep refused" to check the attack on the system to take appropriate countermeasures, such as using SSH to replace Telnet/rlogin.
S
service if your local area network is# Untrusted! For a secure way of using VNC, see this URL:# Http://kbase.RedHat.com/faq/docs/DOC-7028
# Use "-nolisten tcp" to prevent X connections to your VNC server via TCP.
# Use "-localhost" to prevent remote VNC clients connecting tables t when# Doing so through a secure tunnel. See the "-via" option in# 'Man vncviewer '
Article Title: Linux-based Web server performance testing. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Abstract: Linux, as a free op
server through my own VPN. The settings are as follows:
# edit/etc/hosts.allow
vi/etc/hosts.allow
# For example, only allow 123.45.67.89 login
sshd:123.45.67.89
Linux SSH security Policy four: Login SSH with certificate
Using a certificate is more secure than using a password to log on. tap water for coffee has written a detailed tutorial, with its consent, re
merchant for the goods. Each phase involves RSA encryption of data and RSA digital signatures. Using set protocol, in a transaction, to complete multiple encryption and decryption operations, it has a high security, but the set protocol is more complex than the SSL protocol, businesses and banks need to transform the system to achieve interoperability.
Under Linux, the more popular support for SSL authentication is the OpenSSL
To create a Secure Linux server, you must first understand the meaning of the configuration files related to network services in the Linux environment and how to configure security. In Linux, the TCP/IP network is configured through several text files. You may need to edit t
same direction, and the client initiates a connection to the server for data transfer. The client's connection port is the port to use when initiating the data connection request. When an FTP client accesses an FTP server outside the firewall, it needs to use the passive transfer mode.
3. Single port mode
In addition to the above two modes, there is also a single port mode. The data connection request for
Add by Zhj: Although it was a 2002 article, it was a lot of money to read. In Zhangwensong: About LVs and Ali Open source behind the wonderful story of LVs initiator and main contributors talk about the development process of LVS and Ali Open source of some storiesOriginal: http://www.linuxvirtualserver.org/zh/lvs1.htmlThis paper introduces the background and target of the Linux server cluster system--LVS (
%.6. Improve Linux Exim server performanceThere are many ways to improve server Exim performance, one way is to use the DNS cache daemon, which reduces the bandwidth and CPU time required to resolve DNS records, and the DNS cache improves network performance by eliminating the need to find DNS records every time from the root node, Djbdns is a very powerful DNS
To maintain an enterprise-level Secure Computing Environment, policies and processes need to be designed to minimize unauthorized access to systems and data. To protect Linux-based computer assets from these threats, like many other security-centric processes, you must know what you want to protect and how others may try to obtain access. Successful security management is a mentality. That is to say, think
, which helps increase system memory availability, freeing up more resources for the software that really needs to run faster.
5. Disable Control Panel
In Linux, there are many popular control panels, such as cpanel,plesk,webmin and phpMyAdmin, believe that each Linux novice is very fond of these control panels, but, disable these packages can release about 120MB of memory, therefore, I strongly recommen
Remote connection to a Linux server typically uses SSH.1, the Linux system connected to the remote Linux server can directly use the SSH command.The format is as follows:SSH [Email protected] 192.168. 1.1Root corresponds to the user name you use, 192 ... The corresponding
As an open operating system, Linux is favored by many programmers. Many senior programmers prefer to write software related to the Linux operating system. This makes the Linux operating system rich in software support, and countless technical staff as technical support, which makes Linux more and more popular for progr
For IT administrators, integrating Linux with legacy systems and implementing a secure IT system are two of the biggest challenges, and they complain about Linux in general, as Peter Harrison said. Peter Harrison is an IT professional in many fields and has just written a new book Linux Quick Fix Notebook published by
operations personnel to conduct system audits and troubleshooting, while the server has been hacked, you can also use this command or file to query the hacker login server to perform the historical command operation, but sometimes hackers in order to destroy the server after the destruction of traces, may be deleted. bash_history file, This requires a reasonable
Tags: LinuxThere are a lot of things to be aware of when building a Linux server, and one of the most secure configuration tables is what a server's builders and maintainers need to master. In this article you will find a complete Linux server security building manual If you
With the popularity of Linux in Open source system, its application in large and medium-sized enterprises is becoming more and more popular, many enterprise application services are built on it, such as Web services, database services, cluster services and so on. Therefore, the security of Linux has become an enterprise to build a security application of a foundation, is the most important, how to protect i
Enterprises need reliability, stability, and compatibility. There is no doubt that enterprise owners favor this situation: this is also the goal of their efforts. Business owners who spend time looking for free and low-cost solutions can also find the right option for them. In terms of software, the Linux operating system topped the list. From the perspective of more than 100 available products, Linux 1. Re
servers in the remote intranet, I first use theSSH Secure Shell Client After the SSH connection, then the local 5901 port is forwarded:650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/85/84/wKiom1em96yArHNfAABo_2GPoAc548.png "title=" 20160611164246923.png "alt=" Wkiom1em96yarhnfaabo_2gpoac548.png "/>This is followed by a connection using the VNC viewer:650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M02/85/83/wKioL1em98XzT7mwAABW9N9j
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.