patching linux servers

Discover patching linux servers, include the articles, news, trends, analysis and practical advice about patching linux servers on alibabacloud.com

Reduce the number of TIME_WAIT sockets for Squid servers in Linux

For high-concurrency Squid servers in Linux, the number of TCPTIME_WAIT sockets often reaches two or 30 thousand, and the server is easily dragged to death. By modifying Linux kernel parameters, you can reduce the number of TIME_WAIT sockets on the Squid server. Add the following lines to vi/etc/sysctl. conf :... For high-concurrency Squid

Rsync+inotify implementation of real-time synchronization of files between servers in Linux system

, synchronous data and actual data will be different, and inotify can monitor the file system changes, when the file has any changes, trigger rsync synchronization, This just solves the real-time problem of synchronizing data.Specific people can refer to http://www.ibm.com/developerworks/cn/linux/l-ubuntu-inotify/index.html to learn.Next we will start the installation, configuration, and testing of rsync and inotify.The following is the structure of 2

Linux features three excellent servers

Linux features three excellent servers-Linux Enterprise applications-Linux server application information. The following is a detailed description. At present, there is no second operating system, and Linux has it. Low Cost Linux

Introduction to setting up Mail servers in Linux

Article Title: How to set up Mail servers in Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. We use Red Hat Linux 9.0 as an examp

File sharing between multiple servers in Linux

192.168.0.0/24--dport 111-j ACCEPTIptables-a input-i eth0-p tcp-s 140.0.0.0/8--dport 111-j ACCEPTIptables-a input-i eth0-p udp-s 140.0.0.0/8--dport 111-j ACCEPT3, in order to prevent possible Dos attacks, it is necessary to set the NFSD copy number reasonably.4, modify/etc/hosts.allow and/etc/hosts.deny to limit the purpose of the client/etc/hosts.allowPortmap:192.168.0.0/255.255.255.0:allowPortmap:140.116.44.125:allow/etc/hosts.denyPortmap:ALL:deny5. Change the default NFS portNFS uses 111 por

How can we solve the problem of Linux malware plaguing servers?

How can we solve the problem of Linux malware plaguing servers? Linux may not have the same malware problems as other platforms you are familiar with, but there are still some problems that plague Linux administrators. What is the best open-source software for monitoring malware on

How to Configure NFS servers for two LINUX systems

How to Configure NFS servers in two LINUX systems-Linux Enterprise applications-Linux server application information. For more information, see the following. I. Installing an NFS server Check whether two software packages nfs-utils and portmap are installed in linux (the t

How to Configure NFS servers in two Linux systems

Article Title: how to configure NFS servers in two Linux systems. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. I. Installing an NFS server Check whether two software packages nfs

Source code for various TCP network servers in Linux

Everyone knows the compiling steps of various network server programs and knows that there are two types of network servers: cyclic services and concurrent services. Here is a summary of the source code.First of all, the process of Loop Network Server programming is as follows: This type of server model is a typical Loop Service. Without the multi-process/thread technology, the Service throughput is limited. As you can see, if the data of the previous

How to flat hacker attacks on Linux servers

At present, many users use Linux servers, but the current network environment is not very calm, and there are always malicious attacks. At ordinary times, some friends may encounter the problem of server hacking. After collecting and sorting out relevant materials, I have found a solution for Linux Server hacking, I hope you will have a lot to learn. If you have

Introduction to Security Detection for UNIX and Linux servers

In fact, every hacker has his own unique method. I have collected a lot of information about intrusions into the website server, but because of the actual situation, many methods are often ineffective. It can be seen that the situation of each website is different, and intruders need to treat it differently. Assume that the line in Shenzhen is much better than that in Beijing, which makes it easy for the dictionary to use, so that users in Shenzhen can use this advantage to attack passwords onli

Managing Linux servers in bulk with ansible: Configuring Inventory and Batch execution commands

"‘(51) Delete a scheduled taskansible web_server -m cron -a ‘name="a job for reboot" state=absent‘(52) Mount Partitionansible web_server -m mount -a ‘name=/data src=/dev/sdb1 fstype=ext4 opts=rw state=mounted‘(53) Unmount partitionansible web_server -m mount -a ‘name=/data state=unmounted‘(54) Ensure that a partition is mounted and mounted if it is notansible web_server -m mount -a ‘name=/data src=/dev/sdb1 fstype=ext4 state=present‘For more information on playbook, please continue to follow my

Common Linux Driver selection for Dell servers

Common Linux Driver selection for Dell servers-Linux Enterprise Application-Linux server application information. The following is a detailed description. The main driver is Nic and RAID card. Generally, you can use commands such as lspci, lsmod (module driver), and dmesg. 1. 1X50 series: 1750 RAID card Fusion MPT de

Gzip file compression method for Linux servers [go]

corresponding server-side caching rules, which can greatly improve the performance of the site. Therefore, for PHP programs that are deployed on Linux servers, we recommend that you turn on Use gzip Web compression when the server is supported.second, the Web server processing HTTP compression process is as follows:1. After the Web server receives the HTTP request from the browser, check whether the browse

Share How Linux servers Prevent medium Trojan

Everyone's windows machine may often install some anti-virus software or something to prevent poisoning, but on Linux how should we prevent these?We often encounter this kind of problem in the interview process, so what should we answer to appear to have both logic and depth?First identify the way we receive attacks, and what channels we use to attack our Linux servers:BecauseThe Trojan horse under

Using PSCP to implement remote copy files between Windows and Linux servers

for the password, after we enter the Linux server on the user's login password, the www.linuxidc.com file will be uploaded to the Linux server/home/hollyfee directory.Here's how:C:\Documents and SETTINGS\ADMINISTRATOR>PSCP E:\javaWP\new.txt [email protected]:/home/hollyfee[email protected] ' s password:New.txt | 0 KB | 0.0 kb/s | eta:00:00:00 | 100%C:\Documents and Settings\administrator>Two

Scp implements file transfer between Mac and Linux servers

Scp implements file transfer between Mac and Linux servers 1. upload files to Linux server on mac Scp file name username @ Server ip: target pathFor example: scp/Users/test/testFile test@www.bkjia.com:/test/ 2. Upload the folder to the Linux server on mac, which is more-r than uploading files. Scp-r folder director

Zabbix (2)--Simple monitoring of Linux servers

. 650) this.width=650; "Style=" background-image:none; border-right-0px; padding-left:0px; padding-right:0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px; padding-top:0px "title=" image "border=" 0 "alt=" image "src=" http://s3.51cto.com/wyfs02/M02/58/CA/ Wkiom1s8m0vxrn-kaabxpqveijw720.jpg "width=" 244 "height=" 193 "/> traggers: Used to flag which monitoring items need to trigger warning and problem thresholds, associated with corresponding monit

Linux iptables maps multiple Intranet ftp servers in nat

Let's take a look.Linux iptablesAdd multipleFtpThe specific method of server ing. The following two steps are involved: 1. First, convert the source addresses of the three ftp servers to those of the gateway. 192.168.0.254 is the gateway 10.0.0.0/24 is the network segment Iptables-t nat-a postrouting-s 10.0.0.0/24 -- sport 20, 21-j SNAT -- to-source 192.168.0.254 If the gateway is a dynamic IP address Iptables-t nat-a postrouting-s 10.0.0.0/24 -- spor

Statistics on linux servers

Statistics on linux servers: 1) number of port 80 connections: www.2cto. comnetstat-nat | grep-I quot; 80 quot; | wc-l12) count httpd protocol connections ps-ef | grephttpd | wc-l13), statistics already... Statistics on linux servers: 1) number of port 80 connections: www.2cto.com netstat-nat | grep-I "80" | wc-l12)

Total Pages: 15 1 .... 7 8 9 10 11 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.