I. INTRODUCTION to SQL language DDL: tables, views, indexes, trigger operations, etc. CREATEALTERDROP statement DML: data operation. SELECTINSERTUPDATEDELETEDCL: permission settings. GRANTREVOKE database access different languages use different
Iptables firewall configuration 1. firewall introduction 1. Functions: 1) configure the firewall through the source port, source IP address, source MAC address, specific tag in the package, and target iptables
1. firewall introduction
1. functions:
1
Step 2: log on to the centos system using ssh or the root user with the highest privilege on the local machine, run & ldquo; iptables-F & rdquo; and confirm. After the command is confirmed, no success prompt is displayed. Step 2: run the & ldquo;
System environment: This system is based on the system. [Root @ gjp ~] # Cat/etc/redhat-releaseCentOSrelease6.4 (Final) tool: dkms-2.0.17.5-1.noarch.rpmkernel_ppp_mppe-1.0.2-3dkms.noarch.rpmpptpd-1.3.4-2.rhel6.i386.rpmppp-2.4.5-17.0.rhel6.
System
This morning, the server was under ddos attack. Fortunately, the other party only used a computer without thousands of Trojans. Otherwise, the server would crash. I found a tutorial on the Internet and solved it successfully. So I recorded the
I. basic configuration
Configure two NICs for the Squid Proxy Server
WAN: eth0: 10.10.10.200 gateway and DNS must be configured to allow Internet access
LAN: eth1: 172.161.254 do not need to configure gateway or DNS
Clinet: 172.16.1.2/24 gateway and
1. Check whether Samba is installed on CentOS.
# Rpm-qa | grep samba
Note the version number. If the main installation package of samba is missing, you need to download and install the main installation package based on the installed version, or
IPTABLES rules: deny all links first.
Available IPTABLES operations
(1)-L: first, all the policies in the selected chain are IPTABLES-t filter-L
(2)-A: (chain name): Add A new policy to the end of the selected chain.
For example, IPTABLES-t filter-a
The iptables Operation Command netfilter (iptables) netfilter works in the kernel software to implement fpihiptables of data packets. It is used to control the netfilter packet filtering Firewall (layer-4 TCP/IP. the application layer provides
Article Title: configuration of squid service on Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
The
Installation and configuration of Tomcat on RedHat Linux
The following Linux versions are used: RedHat Enterprise Linux 7.0 x86_64 and Tomcat-7.0.54.
1. Download JDK and
Use iSCSI Target to create centralized security storage (1)
ISCSI is a block-level protocol used to share original storage devices through TCP/IP networks, you can use an existing IP address and ethernet address, such as a nic, vswitch, or vro, to
Getting started with Linux: Enable the port on CentOS or RHEL Firewall
Q: I am running a web page or file server on CentOS and want to remotely access the server. Therefore, I need to change the firewall rules to allow access to a TCP port on the
Deploy VNC Server in CentOS6
VNC (Virtual Network Computer) is short for Virtual Network Computer. VNC is a free open-source software based on UNIX and Linux operating systems. It has powerful remote control capabilities and is highly efficient and
General Production Environment Linux Server Configuration
1. Selection of the Linux server system version in the production environment
Select the 64-bit Linux operating system of CentOS6.5
CentOS (Community Enterprise Operating System) is one of
Build a VPN Server under CentOS6.2
1.Install using yumPpp:
$ yuminstallppp-y
2. Download and install pptpd. You can obtain it on this website.Http://poptop.sourceforge.net/yum/stable/packages/:
(Depends on the number of digits in the operating
Set the Linux security environment for running Java-general Linux technology-Linux programming and kernel information. The following is a detailed description. Enterprise Java expert Dennis Sosnoski elaborated on his point of view on how Java Server
Service iptables start does not respond;
[Root @ lt ~] # Service iptables status
Firewall stopped
[Root @ lt ~] # Service iptables start
[Root @ lt ~] # Service iptables status
Firewall stopped
For example, the configuration file is not
Disclaimer: This blog post from Baidu Experience http://jingyan.baidu.com/article/3c48dd34709e70e10be35835.html, thank you to share!1. Check the Linux versionCat/etc/issue 2. Check if Telnet is already installedRpm-qa | grep telnet The above
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.