Detailed explanation of at commands in linux commands (one-time scheduled task)

In windows, windows provides the task scheduling function. Today, we mainly learn how to use the at command for one-time scheduled tasks in linux. In windows, windows provides the task scheduling function. in the control panel-> performance and

System security policies for preventing buffer overflow attacks in Linux

Buffer overflow attacks are currently one of the most common attacks by hackers. to cope with the emerging buffer overflow attacks, we have studied how to prevent buffer overflow in Linux, summarizes the security policies for preventing buffer

PPTPD implements simple VPN transit application

Author of vpn simple transit application service: linuxpf last Modification time: 2008.12.24 I will not talk much about the principles on the internet. when you encounter other problems, I often try to analyze the principles, we need to know the ppp

Use sudo to reinforce Linux system security

The so-called system reinforcement is to use manual configuration and related software to improve system security. This article describes how to use the open-source software sudo to control and audit Root permissions to reinforce Linux system

Use freebsd-update to upgrade freebsd

It is estimated that the localroot0day issued by fbsd a few days ago should have been published with a patch, and there is no time to verify it. if you need it, refer to the following operations. the advantage of freebsd-update is that it also

Hot swapping and online identification of SCSI hard disks in Linux

& Nbsp; when adding a SCSI hard disk to the server, the system can identify the newly inserted hard disk without stopping the server. the specific steps are as follows: Step 1: insert the new hard disk to the machine. Step 2: run the command

Putty: the best tool for Linux remote management

For linux remote management, I personally prefer putty. Because it is a short and concise tool that can fully meet your needs. SecureCRT has been heard more than once, and has been tried more than once: it was used when it was found to have the tag

Linux command line development practice (1)

This article describes how to write a Linux command line utility that is simple enough for end users. This article begins with an overview of reliable command line best practices and ends with a detailed study of an effective page selection

How to use Shell scripts in Linux to maintain Oracle

The roles and responsibilities of system administrators and DBAs are different. But in fact, this difference is usually not obvious. Many IT departments employ databases and operating systems. The roles and responsibilities of system administrators

New school: a variety of programming languages in Linux

◆ C: C helps us learn how to consider problems at the hardware system level. His best practice is resource efficiency and proximity to machine language. The worst thing is that its programming is actually the purgatory of resource management. ◆ C:

Five Misunderstandings of Linux operating system applications

It is difficult to develop applications and only applies to the network. these comments only refer to some people who do not know Linux. once you really know Linux, it will be attractive to Linux. It is difficult to develop applications, only

Experts help you resolve Linux file systems

Some users often ask about high-performance I/O Requirements & mdash; if they can use Linux systems instead of AIX or Solaris operating systems. But no one has ever asked Windows or NTFS Some users often ask about high-performance I/O-if they can

How small and medium enterprises choose Linux backup tools

Many Linux data backup products are constantly adding new features and starting to become more mainstream in the enterprise. Currently, most major storage management vendors (such as HP and Symantec) have managed their storage Many Linux data backup

Linux network monitoring tool ntop4.0 released

Similar to top monitoring system activity, ntop is a tool used to monitor network usage in real time. Because ntop has the Web interface mode, it is easy to get started quickly in a short time, regardless of configuration or usage. & Nbsp; this

"Wife" LAOP installation process

Haha, it's just a joke, just for your own memo. & Ldquo; wife & rdquo; refers to LAOP, that is, Linux + Apache + Oracle + PHP, the development and application environment of our company. & Nbsp; I chose Ubuntu6.10Server for Linux, which is easier to

By disguising a Linux system, hackers are given the illusion of a system.

Computers on the network can be easily scanned by hackers using tools or other means to find vulnerabilities in the system and then attack the vulnerabilities. By disguising the Linux system and setting system illusion for hackers, hackers can

Iptables configuration of openvpn in Ubuntu

Installing openvpn in Ubuntu is simple. apt-getinstallopenvpn is followed by buildkey and server and client configuration. for details about how to maintain the DNS on the openvpn Server, refer to/etc/resolv. after openvpn is installed in conf, save

CentOS5.4 + OpenVZ + Vtonf self-built VPS server

& Nbsp; Vtonf is a free web-based control panel (GPL-compliant) that manages virtual private servers (VPS) on OpenVz ). Using her or even a few professional users can easily create and manage virtual machines on OpenVZ. So far, Vtonf only supports

MLDonkey + VPS server to build an offline download environment

I have mentioned offline download for many times and have been sharing the offline download VIP account of Thunder. Offline download is mainly used to solve the problem of remote download for a long time. & Nbsp; currently, offline download is

CentOS build local YUM service

I think everyone is familiar with the YUM service in linux. I have previously written down the steps for building the YUM in linux redhat. today I mainly want to write about how to build the YUM in centos, although centos is a clone version of

Total Pages: 2732 1 .... 274 275 276 277 278 .... 2732 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.