During Linux security, we made the following steps:
4. Password File
The chattr command adds unchangeable attributes to the following files to prevent unauthorized users from obtaining permissions.
# Chattr + I/etc/passwd# Chattr + I/etc/shadow#
In the Internet age, information security incidents have become common. Even the senior security company hbgary federal, working with the US military, can be hacked. Surfing the Internet means that you expose yourself to a large number of hackers
Here is a complex example: how to use the command line to decrypt a fusion drive encrypted with filevault 2.
This is a bit complicated. For general file vault 2 disk encryption, we can directly use diskutil CS revert for decryption, however, in the
The NTFS system supports the hardlink technology. The so-called hardlink is actually to create a hard link for a file, the two files enjoy the same file content. Delete any one of them, and others still protect the original data. This is obviously
Luks (Linux unified key setup) provides a standard for Linux hard disk encryption. It not only applies to different Linux Release versions, but also supports multiple users/passwords, because its encryption key is independent of the password, even
These two commands are used to view and change the file and directory attributes. Compared with the CHMOD command, chmod only changes the read/write and execute permissions of the file, the underlying property control is changed by chattr.
Usage of
Recently, a background management system has been improved. The requirements of superiors are security, and sweat ...... I also know how important the security of a system is. The following are ten important protection measures taken online. To sum
Since smart cards started to enter people's daily lives, everyone is optimistic about the security of smart cards, but there are also many differences in the implementation of security mechanisms of smart cards in different companies. For smart card
The input method is something we usually see every day, likeX-ForceThere should be no fewer people who like the sogou Pinyin input method. BecauseSogou PinYin Input MethodIt supports skin replacement, so there are a lot of beautiful skins available
Have you ever been or are you worried about how to modify a website containing thousands of pages in the shortest time? So you can take a look at the introduction of this article, which may be helpful to you.What is SSI?SSI is the abbreviation of
Especially when I cannot find my. cnf, I should take it seriously.Author: Fan guanqunAfter a few days of desperate Baidu and continuous experiments, I finally solved the problem of Mysql 5.0.22. Online articles are neither too long nor too important,
Introduction to the Linux File lock Protection Command chattr,
Chattr command usage: Chattr [-RV] [-v version] [mode] files...The most important part is in the [mode] section. The [mode] Section is composed of the +-= and [ASacDdIijsTtu] characters,
13. Security Settings for xcopy files that can be copied in WIN2000
If you copy a file elsewhere in nt4.0, the acl of the file will be lost. You must use the scopy.exe program in resource kites. The xcopy program under WIN2000 has several more
Samba is a free software that implements the SMB protocol on Linux and UNIX systems. It consists of servers and client programs. Experimental environment: according to the company's informatization construction requirements, a file server needs to
Compiling Servlet and JSP is easy, but we usually face many security problems. Of course, we will add a lot of security code to the program to solve this problem, but adding such security hard code will make the program inflexible and difficult to
During PHP compilation, PHP parsing support in CLI mode must not be compiled unless otherwise required. You can use-disable-CLI during compilation. Once PHP in CLI mode is compiled, attackers may use this program to create a WEB Shell backdoor
File Servers are one of the most widely used application servers. Because the file server can back up, access control, and permission management of important enterprise files on a unified platform, it can comprehensively improve the security of
@echo off:: Set Service NameSet Service_name=servicemanagement:: Set Service descriptionSet service_description= file Security upload Service:: Set the service program pathSet Prog_path=%cd:\=\\%\\servicemanagement.exe:: Set startup mode for service
Full parsing of dangerous functions in PHP. During PHP compilation, PHP parsing support in CLI mode must not be compiled unless otherwise required. You can use-disable-CLI during compilation. Once compilation generates CLI mode P, PHP parsing
During PHP compilation, php parsing support in CLI mode must not be compiled unless otherwise required. You can use-disable-cli during compilation. Once PHP in CLI mode is compiled and generated, it may be attacked.
Use this program to create a WEB
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.