Article Title: security settings for Linux operating systems. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open
FastDFS installationFastDFS currently supports Unix-like systems. It has been tested in Linux and FreeBSD. Ubuntu10.4 is used in this article. We recommend that you have a brief understanding of the principles of FastDFS before installation, this
Ldconfig is a dynamic link library management command to share the dynamic link library with the system.
Main uses of ldconfig:
Search for/lilb and/usr/lib by default, and the library files under the directories listed in the configuration
From: xumeng_1987 log
View the driver directory and find that ubuntu10.04 already has the Sis driver,
Wendy @ wendy :~ /Desktop $ ls/usr/lib/xorg/modules/drivers/sis
Early in the morning, a friend said that the dual Nic configuration in the Linux environment, sometimes get the IP address, sometimes cannot get the IP address to change the NIC speed, and now it is normal. But it cannot be used at the same time.
Each operating system is composed of thousands of different types of files. There are system files, user files, shared files, and so on. Sometimes we often forget where a file is stored on the hard disk. Searching for a file in Microsoft's Windows
The concept of SCAN (Single Client Access Name) is introduced in the Oracle 11g RAC cluster, that is, the Single Client Access Name of the cluster. SCAN provides a single host name for the client to access the Oracle database running in the cluster.
Execute the following configuration process on all nodes in the cluster!
Oracle 9.0.1 and 9.2.0.1 use a user space named watchdogd to monitor the background program to monitor the cluster status and restart the RAC node when a fault occurs. Starting
1. NIS server attribute settings
1. Modify the NIS Host Name
In Linux, you can run the hostname command to view and temporarily set the Host Name of the Linux system. The host name becomes invalid after the system is restarted. If you need to fix
The concept of SCAN (Single Client Access Name) is introduced in the Oracle 11g RAC cluster, that is, the Single Client Access Name of the cluster. SCAN provides a single host name for the client to access the Oracle database running in the cluster.
You don't have permission to access/on this server solution
The project is deployed on the Apache Http Server, and the configuration file is detected through apachectl-t. However, "you don't have permission to access/on this server" appears in the
Linux itself can act as a proxy firewall by adding a socket package, and it is free of charge.
What is proxy firewall?
The proxy firewall does not allow any direct network flow to pass through. Instead, it serves as the connection between the
RedHat provides an excellent way for administrators to change kernel parameters while the system is running without the need to reboot the system. This is achieved through the/proc Virtual File System. The/proc/sys directory stores most Kernel
1. Compilation and Connection
Generally, if the header file of the library is not in the/usr/include directory, you must use the-I parameter to specify the path during compilation. Because the same library may be located in different directories
DHCP server of ISC
To configure the DHCP server DHCPD, edit the DHCPD. conf sample file from the server directory and install it as/etc/DHCPD. conf20. At the same time, you must create an empty lease database file named/var/DB/DHCP. Leases and run
Each operating system is composed of thousands of different types of files. There are system files, user files, shared files, and so on. Sometimes we often forget where a file is stored on the hard disk. Searching for a file in Microsoft's Windows
Each operating system is composed of thousands of different types of files. There are system files, user files, shared files, and so on. Sometimes we often forget where a file is stored on the hard disk. Searching for a file in Microsoft's Windows
The Linux limits. conf configuration limits. conf file is actually the configuration file of pam_limits.so in Linux PAM (plug-in authentication module, pluggable authentication modules), and only for a single session.
The limits. conf format is as
1. Development environment 1.1. Package Download 1.1.1. JDKHttp://www.oracle.com/technetwork/java/javase/downloads/jdk8-downloads-2133151.htmlInstall to the D:\GreenSoftware\Java\Java8X64\jdk1.8.0_91 directory 1.1.2.
Installation: sudo apt-get install vsftpd
# VSFTP (Very secure FTP) is a very secure and fast-stable FTP server in Unix/linux
After installation, you may automatically generate an account "FTP",/home will also add a folder.
If you do not generate
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.