, configuration and advanced applications;5, Nagios Introduction, Advanced and high-level applications;6, integrate cacti, ntop and Nagios to build enterprise-level open source monitoring platform;7. Introduction of other monitoring toolsSeven, HTTP proxy accelerator and application server:1, the introduction of Nginx, advanced, tuning and LNMP implementation; Nginx implement Web reverse proxy, using Nginx to implement Web load balancing application;2. Tomcat architecture, installation configura
1. Configure the Java environment variables:This approach is recommended if your computer is used only as a development, because all user shells have the right to use these environment variables, which can pose a security issue for the system.• Open/etc/profile with a text editor• Add at the end of the profile file: Export Java_home=/usr/share/jdk1.6.0_14export path= $JAVA _home/bin: $PATHexport classpath=.: $JAVA _home/lib/dt.jar: $JAVA _home/lib/tools.jarUse Source/etc/profile for updates2. Co
proxy:apt-get install network-manager-openvpn-gnomeapt-get install network-manager-pptpapt-get Install network-manager-pptp-gnomeapt-get install network-manager-strongswanapt-get install network-manager-vpncapt-get install network-manager-vpnc-gnome/etc/init.d/network-manager restart Check all the options in the Advanced settings (this is the personal try mode)7. running the Metasploit Framework In accordance with the Kali Linux Network Service polic
routing board, LC ... Seven explosions! Dijkstra Shortest path, OSPF, ... I will not mention Nat,openvpn,tcp,ssl, ...Many people will be equipped with a CISCO/H3C router, I am so insolent, understand VPN? Do you know SSL? Do you know the TCP window? Nothing but the IP layer wandering around, pacing a few staggered pace just. We know that the content of the IP layer said much less, but on a single point is very simple, its complexity lies in the mix o
Date_time: Backup TimeBackup_dir: Back up to that directoryBackup_log: Backing up a successful log fileErr_log: Backup failed log fileAttention:1. Before backing up, CD to the parent directory where the target directory is located, then execute the zip command.2. log file should not be placed in the directory where the backup data is stored, because the last command is to delete the previous 15 files, the log file will be deletedThe script is as follows:#!/bin/bashdate_time= ' date+ "%y%m%d%h%m"
called recursive control, the so-called recursive control is controlled hierarchically, and for each level, the control mode is consistent. Familiar with the CFS dispatch know, for group scheduling and task scheduling are all using the same scheduling, but obviously the group and task are different levels, I drew the following diagram to briefly describe this situation:Not only the organization of control logic, even Linux in the implementation of the UNIX process model, but also the use of thi
as follows:
#cat/dev/net/tun
If the instruction shows the result to the following text, it means:
The code is as follows:
Cat:/dev/net/tun:file Descriptor in
All of the above two passes to install PPTP. Otherwise you can only consider OpenVPN, or ask your service provider to solve this problem.
2, the installation of PPP and iptables. By default, the complete CentOS is provided with these two components, but a compact version of the system may
Redhat Fedora Project has a Epel (Extra Packages for Enterprise Linux), Epel is the Fedora Software warehouse Rhel, add it, you can get a lot of support rhel/centos free software packages. For example, the current popular nginx, OpenVPN and so on, can be very convenient to install the update.
Epel (Http://fedoraproject.org/wiki/EPEL) is a project built by the Fedora community to provide high-quality software packages for RHEL and derivative distribut
Virtual network card function:
The virtual network card is mainly to establish the LAN between remote computers. Virtual network card link technology is VPN. For example, you can and other places with several machines, through the establishment of virtual hub to achieve VPN client link, so that is a few remote computers established between the LAN, but also with your machine to achieve the functions of the LAN. The most common is the LAN interconnection game. In this respect more commonly used
.
The basic idea is to establish a secure private network on the public network to transmit the internal information and form a logical network, thus providing the enterprise users with more low-cost and higher security resources sharing and interconnection services. The first step to build a VPN line is to build a VPN server through a router. Of these, PPTP is a fast and easy to use protocol for different VPN protocols. If your device does not support Open
before, often in the subsequent update of the Central Plains full state of resurrection, really let people spray blood, most people vomit disease, is a weak QoS function, ddwrt QoS function can only say better than nothing. Feature words to be quite a bit, PPTP OpenVPN QoS Access control MAC filtering and so on functions are very used, but also can adjust the official version of the wireless signal power generally not provided, of course, and relay,
too many CPUs, the proposed division Cgroup]4. Interrupt handling threading, kernel threading, multi core parallel CEO path, avoid switching jitter5. Thread internal, according to Ixa NP micro-modular thinking of the use of modularity (the scheme is not implemented, pending)Purpose:Reduce cache refreshes and TLB refreshesReduced protocol stack processing interrupted too frequently interrupt [either using intrate, or introducing interrupt priority]3. Optimized routing lookup algorithm1. Separati
EPEL (Extra Packages for Enterprise Linux) is a project built by the Fedora community to provide high-quality software packages for RHEL and derivative distributions such as CentOS. Loaded with Epel, as in Fedora, you can install a lot of software, common software, or some popular software, such as the popular Nginx, OpenVPN and so on, by using the Yum install package name. You can use Epel to install updates easily.Installing the Epel sourceUpdate:Cu
Learn these commands to share: Search data within a text filegrep -n -e pattern1 -e pattern2 file1-nThe search data shows the line number display-e pattern1Multiple matching modes can be selected by this parameter, and the multiple relationships are any match.Sort commandssort -t ‘:‘ -k 3 -n /etc/passwd-t ‘:‘ 按照冒号分割每行-k 3Sort the data in the third column-nThe sorted column data is converted to a numeric sort, which is sorted by string by default.Hanging in the ISO filemount -t iso9660 -o loop xx
CentOS 7 firewall-cmd Command
In CentOS 7
Open FTP Service temporarily# Firewall-cmd--add-service=ftp
Permanent Open FTP Service# Firewall-cmd--add-service=ftp--permanent
Permanently closed# Firewall-cmd--remove-service=ftp--permanentSuccess
Let the settings take effect# systemctl Restart Firewalld
Check that the settings are in effect# iptables-l-N | grep 21ACCEPT TCP--0.0.0.0/0 0.0.0.0/0 TCP dpt:21 ctstate NEW
Check firewall status# Firewall-cmd--stateRunning
# Systemctl Stop Firewalld
... No memcached ... Yes memory .... Yes mic ....... . No modbus ... no multimeter .... Yes, mysql ..... ..... Yes NetApp ... ... no netlink ... no network ... yes, NFS ..... .....-No, ..... . Yes Nginx ... No notify_desktop ... no notify_email .... No ntpd ... Yes Numa .....
Yes Nut ..... . No OLSRD ... Yes OneWire .... no openldap ..... No OpenVPN .... Yes, Oracle ... ... no perl ......... Yes PF ... . No Pinba ... No ping ..... No (dependency e
difficult to use?! Directly on the answer, the recommended intensity in order from small to large:1) Use Nginx to do reverse proxy, will be a public IP and port agent to ES service, use the end of the agent to turn off the nginx. Of course, Nginx itself is supporting the basic security account mechanism.2) Deploy a shadowsocks service on the server, open a client connected to the past, and then the ES access address (such as 10.0.0.10:9200) agent to the Shadowsocks client open agent (such as SO
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.