What can I do after the Internet? : Http://www.bkjia.com/Article/201405/304310.html, I do not know you have seen? You may also have heard about the hot-rising vro security vulnerabilities. Do you think your vro is still safe? :) the security of your
There are a lot of for loop usage in shell. I always want to summarize it. Today I saw a summary of for loop usage on the Internet, which is very comprehensive. So I will turn to research and study...1. for (I = 1; I 2. Commonly Used in shell is for
1. $ # number of parameters passed to the script2. $ * display all parameter variables passed to the script with a single string. Different from location variables, this option can have more than 9 Parameters3. $ ID of the current process running
I. Preface:
This article mainly describes the initial file and the reading sequence of each file during BASH ShellScript, user LOGIN, and end-to-end software startup, and details the content of the initial file.
Ii. Overview:
The standard Shell in
The common code for linux shell to read files cyclically by line is as follows:
#/Bin/bash printf "********************************* * *** \ n "echo" cat file whiel read line "cat test.txt | while read line do echo $ line; done printf "***********
Michael Stutz, author of The Linux Cookbook, has summed up 10 good habits based on his years of UNIX experience. I personally think it is really useful. The following is a summary of this article.1. Create a hierarchical Directory: Use the-p option
Arrays, as a special data structure, have a place in any programming language. Of course, bashshell is no exception. This article makes a small summary of the shell array.Here we will only discuss the situation of one-dimensional arrays, with regard
Use the Shell command in the pipeline to obtain the system running data:
1. output the five commands that occupy the most memory in the current system:#1) run the ps command to list all processes running on the current host.#2) The fifth field is
1. display the 10 processes that consume the most memory/CPU ps aux | sort-nk + 4 | tailps aux | sort-nk + 3 | tail2. view the processPs-e-o "% C: % p: % z: % a "| sort-k5-nr3. sort ps-e-o" % C: % p: % z by cpu utilization from large to small: % a "|
DDoS Deflate can prevent a small amount of DDoS and CC attacks, and it takes less time. We recommend that you use it.
1. Check whether iptables is running
service iptables status
If "iptables: Firewall is not running." is displayed, iptables is
Use semicolons for continuous execution
Sometimes we want to write multiple commands under the command line. In this case, how can we perform this operation. As follows:
#ls /tmp/xxxx ; echo '/tmp/xxxx'ls: /tmp/xxxx: No such file or
Nowadays, the Internet is very insecure. Many people use some scanners to scan the ssh port and try to connect to the ssh port for brute-force cracking (brute-force scanning). Therefore, we recommend that you use the vps host space, set a complex
Firewalls can be divided into several different security levels. In Linux, because there are many different firewall software options, the security can be low and high, and the most complex software can provide almost no penetration protection
This article introduces fail2ban, a software used in linux to prevent brute force password cracking through monitoring logs. Fail2ban supports common services, such as sshd, apache, qmail, proftpd, sasl, and asterisk for password verification
This article describes how to use the log subsystem and Its commands in Linux to better protect system security.
The log sub-system in Linux is very important for system security. It records various daily events of the system, including those users
This article talks about two rights management problems that are easily overlooked and occasionally popped up, causing us trouble When configuring servers.
1. Too wide Permissions
Some services require a certain range of permissions. If it is small,
Part 1: Top 10 basic rules
Rule 1: Most people overestimate the difficulty of deciphering passwords and underestimate the risks of their own passwords. Therefore, they often regard those who can crack passwords as mysterious characters, at the same
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.