Recent work is somewhat related to the Linux flow control. Since I knew about TC a few years ago and more or less understood its principle, I did not move it, because I do not like the TC command line, it is too cumbersome. iptables command line is also more cumbersome, but more intuitive than the TC command line, and the TC command line is too technical.Perhaps I have no understanding of the TC framework for the NetFilter framework. Yes, maybe. Iptab
Recent work more or less with Linux flow control a bit of a relationship, since a few years ago know have TC such a thing and some understand its principle, I did not move it, because I do not like TC command line, is too cumbersome, iptables command line is also more cumbersome, But the TC command line is more intuitive than the TC command line, which is too technical. Maybe I don't have a deep understanding of the NetFilter framework for the TC fram
as follows: 1) VI mytask.sh Enter the following command Date>>/home/mydate3 Cp/home/mydate3/root 2) Grant mytask.sh Execute permission chmod 744 MYTASK.S H 3) Crontab-e 4) Re-enter the command: * * * * * */root/mytask.sh. (3) How to terminate a task crontab-r means to terminate a task schedule. After the command is executed, the tasks in the crontab-e are removed. CRONTAB-L indicates which task schedules are currently in the list.2, the Linux proces
For more information about Linux technology and applications, use Ubuntu to connect to an isolated island. No practical desktop is an isolated island. With Linux, network communication, file sharing, printing and other functions are much easier to implement than imagined.
Using Linux to run a PC only solves half of the problem, because no computer is isolated. F
Author: redguardtoo)
Updated on: 4-11-29
Original time:
Taste is quite small. If you use a famous free software package that hundreds of millions of working people love, you don't have to read this article.
My software selection criteria are:
Powerful functions (programmable, supporting plug-ins)
Excellent Performance (with no graphic interface, written in C, general performance is acceptable)
Honest and reliable (it is best to open the source. if the source is closed, developers should have
HTTP://WWW.IBM.COM/DEVELOPERWORKS/CN/LINUX/L-LSM/PART1/1. Related background: Why and whatIn recent years, Linux system has been widely concerned and applied by computer industry because of its excellent performance and stability, the flexibility and expansibility of open Source feature, and the lower cost. But in terms of security, the Linux kernel only provides
Deploy War packages for Linux tomcat, deploy JavaWeb projects for Linux Tomcat, deploy War packages for Linux, and deploy tomcatjavaweb
Deploy the War package for Linux tomcat, deploy the JavaWeb project for Linux Tomcat, and deploy the War package for
Create a small Linux with network functions
First, copy the required basic network commands to a Linux instance.Copy Ping and ifconfigTo add a network function, you must be driven by the NIC. The NIC Driver is pcnet32.However, pcnet32 has a dependency module that is MII, and MII has no dependency module,So we only need to copy the two modules to ourIn Linux, chec
[Blog recommendations] Analysis of the principles of the Linux TC (Traffic Control) Framework
This blog post is from the Bkjia blog dog250 blogger. If you have any questions, go to the blog homepage for an interactive discussion!Blog: http://dog250.blog.51cto.com/2466061/1568267
Recently, my work is more or less related to Linux throttling. Since I learned about TC a few years ago and
Never use Linux commands! | Linux China, linux ChinaYou only need a stupid move. You can even destroy a company worth billions of dollars, Just Like Apache Struts without patching. -- Steven Vaughan-Nicolas
In this article, navigate to rm-rf/11% faster fork bomb 39% faster junk data rewrite hard disk 47% faster erase hard disk! 54% Bytes/dev/null loss 63% bytes f
How to configure point-to-point VPN and linuxvpn on Linux
A Traditional VPN (such as OpenVPN and PPTP) is composed of a VPN Server and one or more clients connected to this server. When any two VPN clients communicate with each other, the VPN Server needs to relay the VPN data traffic between them. The problem with such a central radiation VPN topology is that when the number of connected clients increases,
Sharp speed There may be many friends have not heard, not only can speed up Web Access, the official note for the sharp speed (serverspeeder) acceleration software is a ZETATCP acceleration engine software, can play a significant acceleration of the TCP acceleration technology, enhance the stability of vps/server connection, and effectively improve the bandwidth utilization of the server. But a lot of friends are based on Linux system CentOS 6.8, some
ifconfig.
Create an iptables file in the/etc/network/if-up.d/directory with the following content:#! /Bin/sh
Iptables-restore Add the execution permission to the script:Chmod + x/etc/NET/if-up.d/iptables
Modify/etc/sysctl. the conf content is as follows: There are two items not listed above. You can simply add them directly. Other projects mainly remove comments. In fact, you can directly copy the following content to the configuration file:Net. ipv4.ip _ forward = 1
Net. ipv4.conf. all. send_r
[Reprinted] Linux Startup Process details-Section 8 of "do not worry about Linux programming" and linux Startup Process details
This original article belongs to the "Linux greenhouse" blog, blog address for http://roclinux.cn. The author of this article is rocrocket.To prevent negative reprinting on some websites, we r
Linux disk partition fdisk partition and parted partition disk physical structure track 63 sector sectors (sector) 512-byte cylindrical (cylinder) head partition: primary partition extended partition logical partition MBR (MasterBootRecord) primary boot record 4 primary partitions... linux disk partition fdisk partition and parted partition disk physical structure track 63 sector sectors (sector) 512-byte c
How to Use n2n to configure a practical and free VPN solution on Linux
A Traditional VPN, such as OpenVPN or PPTP, is composed of a VPN Server and one or more clients connected to this server. When any two VPN clients communicate with each other, the VPN Server needs to relay the VPN data traffic between them. The problem with such a central radiation VPN topology is that when the number of connected clien
Http://www.cnblogs.com/heidsoft/p/3525646.html?utm_source=tuicoolutm_medium=referral
The Tun/tap driver realizes the function of the virtual NIC, Tun means the virtual point-to-point device, tap means the virtual Ethernet device, the two devices implement different encapsulation for the network package. With Tun/tap Drive, the TCP/IP protocol stack can be transmitted to any one of the tun/tap-driven processes, which is processed and then sent to the physical link.Open source Projects
domain CORP via rpc cils succeeded
# Wbinfo-g # Read domain user group information
# Wbinfo-u # Read domain user information
# Wbinfo-m # Check the added domain
BUILTIN
PPTPD-VPN
CORP
Set startup
# Chkconfig winbind on
# Chkconfig nmb on
# Chkconfig smb on
CentOS 6.2 PPTPd installation experience
Configure Linux pptp vpn Public Network VPN
Build and configure PPTP and OpenVPN in CentOS5-based
installation, this file downloads additional plug-ins and stores them in a hidden encrypted file system. These plug-ins allow attackers to use newly infected servers to attack and infect other websites.
In February July, Yandex researchers estimated that the botnet had approximately 1400 infected servers linked to two independent command control servers.
Researchers from the independent research company Malware Must Die (MMD) reported earlier this week that Mayhem writers have added the Shellsh
adopted this statement, admittedly, the argument is not important, the key is to facilitate people to understand. So I try to explain it in a different way, essentially the same, just a little bit more verbose.As I have always said, this article will not go to large sections of the analysis of the source code, that is, do not go to the source annotated work, but hope to draw a blueprint on this topic, as before the analysis of OpenVPN and NetFilter.1
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.