We recommend two free web server software for running ASP. NET websites in Linux.
1. kangle
Kangle Web Server is a high-performance Web server and reverse proxy server software that is powerful, secure, stable, and easy to operate
Set up (install) the ftp server (debian) in linux 1: install vsftpd # aptitudeinstallvsftpd2: Configure vsftpd # vim/etc/vsftpd. conf [cpp] # The server runs in standalong mode, so that the following controls can be performed: listenYES # accept...
Set up (install) the ftp server (debian) in
I. SYSTEM environment# cat/etc/redhat-release CentOS Linux release 7.3.1611 (Core)Two. Installing NFS Services1. See if the System has NFS installedRpm-qa |grep Nfsrpm-qa | grep rpcbind2. Install NFSYum-y Install Nfs-utils Rpcbind3. Server-side configurationMkdir/nfs-datachmod666/nfs-data editing the main profile:/etc/exportsvim/etc/exports/ NFS-DATANBSP;NBSP;192.168.101.128/24 (Rw,no_root_squash,no_all_squ
the match fails before it is mapped to an anonymous user or user group.The remaining options in the previous sections are:1->. How the client is specifiedSpecify the IP address of the host: 192.168.0.100Specify all hosts in the subnet: 192.168.0.0/24 or 192.168.0.0/255.255.255.0Host of the specified domain name: nfs.test.comSpecify all hosts in the domain: *.test.comAll hosts: *2-> option descriptionRO: Shared directory read only;RW: The shared directory can be read and writable;All_squash: All
VSFTP is an abbreviation for very secure FTP. It is divided into active mode and passive mode, and the port is divided into command port (21) and data port.In active mode: 1. The client opens a command channel with a random port x greater than 1024 and a 21 port on the FTP server.2. When the client has a data transfer requirement, turn on the random port y greater than 1024 again and tell the FTP
In winxp, securecrt logs on to the linux machine and displays Chinese garbled characters-Linux Enterprise Application-Linux server application information. For more information, see the following. The specific solution is:
1. modify the configuration of a remote linux mac
As we all know, network security is a very important topic, and servers are the most critical link in network security. Linux is considered to be a safer Internet server. As an open-source operating system, once a security vulnerability is found in Linux, volunteers from around the world on the Internet will actively fix it. However, system administrators often c
, allow anonymous users to upload, of course, in the case of Write_enable=yes. You must also create a directory that allows FTP users to read and write.Anon_mkdir_write_enable=yes, allow anonymous to create a directory with flowersChown_uploads=yes, anonymous users upload the file is the main conversion to other users, the general recommendation is root.Chown_username=whoever, change the whoever here to the owner to be converted, suggest rootChroot_list_enable=yes, use a list to limit which user
authentication;
. Integrate the Perl script programming language;
. Integrated proxy server;
. Custom server logs are available;
. Supports server-side inclusion commands (SSI)
. Supports Secure Socket Layer (SSL)
Tracking the user session process;
. Supports FastCGI;
Java Servlets is supported.
What is the reason for
VPN (Virtual Private Network) is an extension of a Private Network. It can simulate a point-to-point Private connection through a shared Internet or public Network connection, send data between a local computer and a remote computer.It has good confidentiality and is not subject to authorization, so that both parties can establish a free and secure point-to-point connection. The following describes how to quickly build a VPN Server.Install software1.
configuration) to execute all the steps from the beginning.
Save configuration changes?
Now, it allows you to apply the completed settings to the entire system. Click Apply Configuration to System (Apply the Configuration to the System ).
Complete
Then, click Close to Close the Bastille program. Bastille runs automatically, depending on your answers and reinforces your servers, just as secure as you want.
Restore Bastille settings
If you want to re
When the local area network needs to configure the agent, Windows can be configured through a browser, but Linux needs to modify the configuration file to achieveApply to global user, modify environment variable/etc/profile file, modify as follows:# Vi/etc/profileAdd the following in this configuration file:Http_proxy=http://username:[email protected]:8080https_proxy= $http _proxyftp_proxy=http://username:[email Protected]:8080no_proxy=*.cmcc;10.10.*e
Server security issues are not complex, and the following principles prevent the most common attacks.Experienced administrators know that as the number of servers and users increases, the cost of user management will be greaterThe following name takes Ubuntu for example, and other versions of Linux will be different.
passwd
First change the root password is very complex, because you do not need to remembe
the system and the resource consumption of each service such as Apache, MySQL, SSH, FTP, etc.
21. Check the log regularly
Moving logs to a dedicated log server prevents intruders from easily changing local logs. The following are the default log files for common Linux and their usefulness:
/var/log/message– records the system log or the current activity log.
/var/log/auth.log– identity authentication l
Linux server on a Windows PC?
To connect to a Linux terminal directly, use secure CRT to connect to linux through SSH.To connect to the graphic interface, install Xmanager in windows. For linux configuration, see the following we
Linux machines running in the office on a windows PC at home. VNC can be freely obtained and used by millions of people. They come from different aspects such as industry, academic and personal applications. For more information, please visit http://www.realvnc.com/is this software already available in my system?
Run the following command to check whether the VNC client and server have been installed in yo
"Connecting to a server via terminal software SECURECRT"Connection service: SSH (Secure shell) security coreConnect to the service agreement, go to port number 22ndSet SECURECRT:"Optical Drive Mount"In Windows, the CD-ROM is placed, and the system G-Drive will "automatically" connect to the disc.In the Linux system, the CD-ROM is placed into the optical drive, an
SSH service supports a security authentication mechanism, that is, key authentication. The so-called key authentication, in fact, is to use a pair of encrypted strings, one called the public key, which anyone can see its contents, used for encryption, and another called The secret key (private key), which only the owner can see for decryption. Ciphertext encrypted with public key can be easily decrypted using a secret key, but it is difficult to guess the key based on the public key. SSH's key a
product of mbedthis company created by Michael o'brien, GPL Commercial License. mob described it as mini-Apache. in the process of use, we can also feel this: Through appweb. the conf configuration file supports dynamic loading of modules. the above two Web servers are the first choice for most routers and other devices. The following describes the main features of these two Web servers:Appweb features (too lazy to translate ):Appweb is a standards-based embedded HTTP
Linux server security is important for protecting user data and intellectual property, while also reducing the time you face hackers. At work, the system administrator is usually responsible for the security of Linux, and in this article, 20 recommendations for hardening Linux systems are described. All of the recommen
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.