Linux Security Review
First, the basic Linux command
1. File Management commands
Lvm
2. User Management commands
3. Network Management Command
4. Rights Management
General Permissions and Special permissions
Permission Command modification
5. Service Command
6. Software Installation Management Command
Yum Installation
PRM Package Installation
SOURCE Package Installation
7. Vim, cat, more, less file processing
8. Process Management
Top, PS, scheduled tasks, daemon management
9, RPM Package production (expansion)
10,/directory of the use of all directories
Main:/etc,/Var,/proc,/opt,/home,/root,/usr,/dev,/bin/lib,/tmp/mnt/media
Second, Linux services
1. Web Services
Apache Services
Principle
The protocol used
Operating mode
Strengths and weaknesses
Deployment Configuration
Reverse Proxy
Load Balancing
Lvs
KeepAlive (expansion)
Highly Available
Heardbeat
Security settings
Optimization
PV Filter
Log Management
Shell Scripting Automation Management
Case 1
Nginx Service
The difference between Nginx and Apache
Ditto
Case 2
Tocat Service
Ditto
Case 3
JBoss Service (expansion)
WebLogic Service (Extended)
2. DNS Service
Principle mechanism
Request and Response Process
Port
Agreement
Deployment and Configuration
Installation
Path
Master configuration file
Secondary master configuration file
Configuration
Master Service
Cache
Debugging
Test
Nslookup
Log Management
Shell Scripting Automation Management
Case 4
3. FTP Service
Principle mechanism
Operating mode
Difference
Pros and cons
Select mode for Scene
Deployment Installation
Anonymous User Login
Local User Login
Virtual User Login
Each login mode permission setting
Shell Scripting Automation Management
Log Management
Case 5
4. DHCP Service (optional)
Principle mechanism
Agreement
Deployment Configuration
Shell Scripting Automation Management
Log Management
Case 6
5. NFS Service
Principle mechanism
Permission settings
Deployment and Configuration
Log Management
Shell Scripting Automation Management
Case 7
6. mysql Database
Principle mechanism
SQL statements
Rights Management
Library Management
Backup
Disaster recovery
Log recovery
Master Service
Log Management
Hot standby (optional)
Read/write separation (optional)
Cache Service (optional)
Shell Scripting Automation Management
Case 8
Iii. cases 1, 4, 5 integration cases
Case 2, 4, 5 integration cases
Case 3, 4, 5 integration cases
Case 1 (2, 3), 4, 5, 7, 8 consolidation cases
Shell Scripting Automation Management
Iv. Process Management
Operating principle
A process starts to end the run process
Run permissions
Status Classification and precedence
Simple optimization
Process Management Commands
Running in the background
Backstage transfer to front desk
Scheduled Tasks
Daemon Management
Process Management Commands
Ps
Top
Kill
Five, hard disk interface type
Ide
Sata
Asa
Scsi
Fc
Ssds
Usb
Each class of principle, advantages and disadvantages, speed, size of the number of turns, the use of scenes and so on.
VI. RAID
Principle and operation mechanism
Definition, Rank
Implementation method
Soft raid
Hard raid
External memory raid
NAS Storage
Built-in raid
HP RAID Card
Del RAID card
Often RAID level
RAID 0
RAID 1
RAID 5
RAID 10
The advantages, disadvantages, the minimum number of disks, the redundancy function, the read and write speed, the ability to allow several pieces of disk to be broken, etc.
Each level of RAID should draw a sketch.
Linux Review Key Directory