Today, many Linux servers are not just deployed on new machines. Professional Linux system administrators perform regular maintenance. It technicians often have to take full responsibility for the security of their own servers. if your server is intruded, not only will all sensitive information be exposed, but the server itself may cause a larger scale in the hands of attackers.
Today, many
vulnerabilities will always be discovered, although they may not be the most serious and have the worst impact. this situation actually proves a popular theory: any resource or service project exposed to the public should be considered as a potential security risk and should be monitored closely. this is exactly what security audit will do next: Check logs and scan files.Check logsCheck the server log file to provide detailed reference information for security events. if you have correctly conf
loss is not an effective solution. If the application is abnormal result in CPU, memory, IO too high, please locate the abnormal application and repair in time, if the resources are not enough, monitoring should be able to find and rapidly expand
For a large number of systems receiving or transmitting UDP packets, you can reduce the probability of packet loss by adjusting the socket buffer size of the system and program.
When processing UDP packets, the application should be asynchronou
New book Unix/Linux Log Analysis and traffic monitoring is coming soon
The new book "Unix/Linux Log Analysis and traffic monitoring" is about to release the 0.75 million-word book created in three years. It has been approved by the publishing house today and will be published soon. This book provides a comprehensive and systematic explanation of Various Unix/Linux
open them.Any service program does not run with the default identity to ensure that the service is configured securely. For example, when you are running Tomcat, do not leave unused web programs that are not maintained. Make sure that they do not run as root. The more restrictions you make on services, the more secure your machine is.Linux Security Tip 5: Manage your system logs, program logs.Once we have dealt with such a problem. A customer set up a very good log record but never look at the
Linux services)It is important for Linux users. Disabling unnecessary services can make Linux run more efficiently, but not all Linux services can be disabled. After installing centos Linux today, we found that many services were started when
Linux is the most commonly used operating system in server operating systems because of its high performance, high scalability, and high security, which has been sought after by more and more operators. But there are also a lot of security incidents for Linux server operating systems. The main methods of attack are weak password attack, remote overflow attack and other application vulnerability attack. My V
Linux-(2) Basic file operations in Linux, linux-linux
In linux, everything is files, directories are files, and hardware is files. Therefore, basic file operations are especially important.
1. List the contents of the directory:
Ls
Parameters:
-A: displays all files (includ
Logout Exit SystemGedit Text Editor ToolsUname–r View kernel version information, uname–a more detailsCat/proc/cpuinfo viewing CPUsCat/proc/meminfo Viewing memoryHostname Viewing host namesIfconfig eth0 view eth0 IP AddressAlias ls= ' ls–ll ' setting aliasesTo view the path of the current terminal: TTYView current Shell:echo $SHELLAll Shell:cat/etc/shells under the current systemView CentOS System hostname Format: Echo $PS 1Distinguish internal or external commands: Type CDWhich find the locatio
Introduction to the powerful Linux Command Awk in 20 minutesWhat is Awk?
Awk is a small programming language and command line tool. (The name is derived from the first letter of its founder Alfred Aho, Peter Weinberger, and Brian Kernighan ). It is very suitable for log processing on servers, mainly because Awk can operate on files and usually build lines with readable text.
I said it applies to the server because of log files, dump files, or terminat
.
As we all know,linux system everything is a file, so each process has its file descriptor, The Nginx process writes its own file descriptor to the Nginx.pid, and we need to tell Nginx to reopen a new log file (the configuration details of the log file can be seen here, simply by letting the log record what. So we need this directive:kill -USR1 `cat ${pid_path}`This instruction means: first cat to Nginx PID, is an integer, and then send the signal
What is awkAwk is a small programming language and command-line tool. (its name is from the first letter of its founder Alfred Aho, Peter Weinberger and Brian Kernighan's surname). It is well suited for log processing on the server, primarily because awk can manipulate files, often building lines in readable text.I say it applies to servers because log files, dump files, or any text-formatted server that terminates dumps to disk can become very large, and you will have a large number of such fil
Becoming a Senior Programmer proficient in Linux programming has always been the goal of many friends. According to statistics from chinacache, the monthly salary of Linux programmers in Beijing is 1.8 times that of Windows programmers, 2.6 times that of Java programmers, and 2.9 times that of Windows programmers. At the same time, the data shows that with the increase of work experience, the income gap bet
This series of articles summarizes Linux network stacks, including:(1) Linux Network protocol Stack Summary(2) Network multipart offload technology Gso/tso/ufo/lro/gro in non-virtualized Linux environment(3) QEMU/KVM Network multipart offload technology in virtualized Linux environment Gso/tso/ufo/lro/gro1.
1, what is Linux?
To be exact, the Linux kernel (the core program of the system), whose kernel copyright belongs to Linus Torvalds, is issued under the GPL (GNU general public License) Copyright Agreement, and anyone can copy (copy) and modify ( Change), package distribution (distribute), sales, but can not add any restrictions at the time of distribution, and all the original code must be public, so anyone
as follows: 1) VI mytask.sh Enter the following command Date>>/home/mydate3 Cp/home/mydate3/root 2) Grant mytask.sh Execute permission chmod 744 MYTASK.S H 3) Crontab-e 4) Re-enter the command: * * * * * */root/mytask.sh. (3) How to terminate a task crontab-r means to terminate a task schedule. After the command is executed, the tasks in the crontab-e are removed. CRONTAB-L indicates which task schedules are currently in the list.2, the Linux proces
After this period of time to learn, I also have a certain understanding of Linux, today this blog on the previous knowledge of a summary it.The previous Linux learning blog, from the top down is learning in-depth process, my blog link is as follows:First: Analysis of the Linux operating system how the computer starts and how it operatesChapter Two: Analysis of
HTTP://WWW.IBM.COM/DEVELOPERWORKS/CN/LINUX/L-LSM/PART1/1. Related background: Why and whatIn recent years, Linux system has been widely concerned and applied by computer industry because of its excellent performance and stability, the flexibility and expansibility of open Source feature, and the lower cost. But in terms of security, the Linux kernel only provides
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.