Linux UsersLinux is a multi-user task system. Each user account can belong to one or more groups. In the/etc/passwd. Store user account information[Email protected] ~]# HEAD/ETC/PASSWDRoot:x:0:0:root:/root:/bin/bashBin:x:1:1:bin:/bin:/sbin/nologinDaemon:x:2:2:daemon:/sbin:/sbin/nologinAdm:x:3:4:adm:/var/adm:/sbin/nologinLp:x:4:7:lp:/var/spool/lpd:/sbin/nologinSync:x:5:0:sync:/sbin:/bin/syncShutdown:x:6:0:sh
The common methods of server security setting for Linux system and the security optimization of server are introduced in detail to the security settings of Novice Linux system, security is no trivial matter, as a full-time system administrator, to build a secure Linux system is a basic quality of administrators, The following 15 are the Sinesafe for customers to deploy these security settings and optimization method, if you want to deep professional security settings Deployment Recommendations C
The first is to check whether the computer set up a shared file, the method is simple, start-run-cmd, and then enter, under the DOS command input: NET share can be, as shown in the following figure:
So how to disable it?
Use the following method to resolve.
Methods to disable network sharing by using Group Policy to prevent Domain users from sharing folders, and Group Policy to turn off shared files.
1.1 Create ADM configuration, as
1. View All Users:SELECT * from Dba_users;SELECT * from All_users;SELECT * from User_users;2. View user or role system permissions (System permissions that are directly assigned to a user or role):SELECT * from Dba_sys_privs;SELECT * from User_sys_privs;3. View the permissions that are included in the role (can only view the roles owned by the logged-on user)Sql>select * from Role_sys_privs;4. View User Object permissions:SELECT * from Dba_tab_privs;SELECT * from All_tab_privs;SELECT * from User
lines in the/etc/passwd file that begin with the RP[Loring test]# grep ^rp/etc/passwd3. Display the line in the/etc/group file that does not end with:[Loring test]# grep-v: $/etc/group4. Display blank line in/etc/rc.local file, require line number[Loring test]# Grep-n ^$/etc/rc.local6:5. Display only files of the file type directory in the/mnt/cdrom directory (provided that the disc is mounted and no find is used)[Loring test]# ll/mnt/cdrom/| grep ^d Two, cut: is the meaning of interception, it
Linux security and Optimization
Introduction:
We must understand: Minimum permissions + minimum services = maximum security
Therefore, whether it is to configure any server, we must disable unused services and set system permissions to the minimum level so as to ensure the maximum security of the server. The following is the CentOS server security settings for your reference.
1. Comment out unnecessary users and user groups.Note: It is not recommended to delete a user directly. If you need a use
),
Approximate round trip times in milli-seconds:
Minimum = 0 ms, Maximum = 0 ms, Average = 0 ms
The speed is not slow. The IP address is China Education Network's machine, and the TTL is estimated to be a Unix. Verify:
Bash $ telnet 202.202.0.8
Sunoperating 5.6
Login:
It's a SunOS 5.6 rotten machine. First, let's guess:
Login: adm
Password:
Login incorrect
Login: oracle
Password:
Login incorrect
Login: ftp
Password:
Login incorrect
^ C
Hateful! Toda
CentOS Server Security Settings
We must understand: Minimum permissions + minimum services = maximum security
Therefore, whether it is to configure any server, we must disable unused services and set system permissions to the minimum level so as to ensure the maximum security of the server. Below isCentOS server security settings for your reference.
1. Comment out unnecessary users and user groups.Note: It is not recommended to delete a user directly. If you need a user, it will be difficult to
Compile FFmpeg for Android and ffmpeg for android
FFmpeg is a useful audio and video library with powerful functions, but it is not very convenient to use. I have never wanted to use FFmpeg before, because it is too troublesome to compile, but it is time to use FFmpeg. I can't help it. Refer to the methods of the online experts and record them here for later viewing.I. EnvironmentUbuntu14.04Ii. NDK environment ConfigurationNDK download link: https://developer.android.google.cn/ndk/downloads/inde
CentOS Server Security SettingsGuideWe must understand: Minimum permissions + minimum services = maximum security. Therefore, whether it is to configure any server, we must disable unused services and minimize system permissions to ensure maximum server security.1. Comment out users and user groups that are not required by the system. Note: it is not recommended to delete them directly. It is very troublesome to add a user again when you need a user.
Cp/etc/passwd/etc/passwdbak # Back up vi/etc/
granted_role ADM def------------------------------------------------------------------Test_user connect No YesTest_user resource no Yes1. test_user has only the most basic connect and resource roles, and has no other table permissions.
Test_user @ test10gr2> select count (*) from V $ session;Select count (*) from V $ session*Error at line 1:ORA-00942: Table or view does not exist2. You cannot see the V $ session
Sys
You can perform Batch Management settings on outlook2010 by adding the ADM template file of outlook2010. For example, add a list of secure recipients. The method is as follows:
First download the ADM file of outlook2010 from the Microsoft website.
Prepare a secure Recipient List in TXT format and put it in a shared path to ensure that common users can read the list.
The most important step is to refer t
(sys), 4 (adm ), 6 (disk), 10 (wheel)
Uid 0 root administrator) gid 0 Administrator Group)
Uid 1-499 system user) gid 1-499 system group)
Uid 500-60000 general user) gid500-60000 general user)
Additional group: for example, if you are in a relative's home, you cannot leave it as casual.
Different shell operations are not the same, but there is no limit on shell:
Set the user to a non-interactive shell
/Sbin/nologin: the user name and password fl
/security/user file, in which each user has a set of control settings, one of which is admin, which is used to determine if the user is an administrative user and sets its value to True for the managed user.Second, the configuration file/etc/motd File: Every time users log on to the system, the display of some notification information, if you do not want users to see this information, you can create a. hushlogin file in the user's home directory, the file must be created by the root user.User--T
RAID array has been deleted:
Code:
# Raidctl
No RAID volumes found.
III. how to restore a hardware disk image
This process restores the hardware disk image configuration from the system.
1. confirm the faulty disk:
Code:
# Raidctl
RAID Disk
Volume Status Disk Status
----------------------------------------------------------
C1t1d0 DEGRADED c1t0d0 OK
C1t1d0 DEGRADED
Indicates that the disk image fails due to a fault on the disk c1t1d0.
2. perform the hot swapping operation on the
to the truth. Download the attachments in my blog. the attachment is the core of this article. Secondly, I would like to recommend that youDCInstall OnGpmcGroup policy management tools to help you troubleshoot group policy management.
Step 1: on the domain controller, click Start → run and enter "gpmc. msc" → Click OK to start group policy management.
650) This. width = 650; "border = 0>
Step 2: Open Group Policy Management, right-clickZhp.com→ Click "create and link (GPO)" → enter the Gr
message.
Let's take a look at the instances in the/etc/syslog. conf file:
......
*. Err; kern. debug; daemon. notice; mail. crit/var/adm/messages
......
The "action" in this line is the/var/adm/messages file that we often care about. The source "selector" output to it is:
*. Err-all common error messages;
Kern. debug-debugging information generated by the core;
Daemon. notice-daemon precautions;
Mail
Introduction: In the past, there was a saying on the Internet that when you put your finger on the keyboard, HJKL is closer than the arrow key, and the natural input efficiency is higher. It sounds quite reasonable. In fact, it is not. Let's take a look at the answer that Peter is Krumins found.
One day when I was reading something about Vim, I found out why it uses the HJKL key as the direction key. When Bill Joy created the Vi text editor, the machine he used was the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.