Shell simple iptables script Management

As the new colleagues are not very familiar with the script, to facilitate the management of iptables on the server, they decided to write a simple script, so that colleagues who are not very familiar with the script can easily manage the script.

Common CentOS Shell skills awk

Practical features of awk:Like sed, awk also scans files row by row. From the first row to the last row, it searches for the rows matching the specific template and runs the "select" action on these rows. If no action is specified for a template,

Script used to test the connectivity of the host in the specified segment

The question is as follows :#! /Bin/bash# Thescript 'snameis: ********** usetotestthehost *********# Theauthoris: Ro# Theversionis: Ro-4-10LetPIP = $1NetIP = '2017. 192. 1 .'If [$1-gt254]; thenEcho "thefistnumbershocould Elif [$2-gt254]; thenEcho

Monitor simple scripts run by Squid

#! /Bin/sh While sleep 30 Do SquidNum = 'ps-ef | grep squid | grep-v grep | wc-l' # HttpNum = 'netstat-an | grep 0.0.0.0: 80 | grep-v grep | wc-l' #80 Status If [$ SquidNum! = 3]; then /Etc/rc3.duid start Adddate = 'date + % Y-% m-% d' ""

Input/Output redirection in CentOS

Nux redirection refers to modifying some of the original default items and changing the default Execution Mode of the original system commands, for example, I don't want to see the output on the monitor. Instead, I want to output the output to a

Shell row-by-row File Reading Method

In Linux, there are many methods to read a file row by row. The most common method is the method in the script below, which is the most efficient and the most commonly used method. To give you an intuitive feeling, We will test the execution

Common System Monitoring command shell script

As system O & M personnel, it is necessary to monitor important system parameters in real time, such as zombie processes, CPU utilization, memory usage, disk space usage, and system load balancing, based on the latest information, we can determine

Shell Copies files in batches and replaces the File Content

Task Find the file names of all png files in the folder, and copy xxx.html as the file name. html Replace xxx in xxx.html with the file name. Ls | grep. png | sed's/\. png \ * // '|./cp. sh Cp. sh While read ip Do Sed's/xxx/'"$ ip"'/G'

Monitor VPS system resources using shell scripts

VPS was used a few months ago, with a traffic limit of GB per month, which is enough for convenient traffic. However, due to some malicious access, resources such as CPU and Memory consume a lot, as a result, the response time of a blog website on

Use iptables to prevent php-ddos packet Distribution

Recently, php-ddos flood, many web hosting service providers worry that their websites are implanted with php-ddos due to website permissions or vulnerabilities, and a large number of data packets are sent externally, this will cause unnecessary

MySQL security reinforcement practices

The group hired top security vendors in China to scan the security of enterprise information systems and found that the author's O & M system has the SQL injection vulnerability, database Elevation of Privilege Security Vulnerability, password

Centos website Server Security Settings

There are always a lot of boring people scanning the server password on the Internet. I have encountered this problem on one of my previous servers. Of course, the severity of this problem is still very high. If it is infiltrated, the harm is not

CentOS 6.5 system customization and encapsulation quick implementation script

Users who work in O & M for large enterprises or IDCs often have such requirements. Some people may not be very familiar with the advantages of Linux's secondary encapsulation, that is, when you need to perform one operation repeatedly, for example,

Shell usage and skills

Check whether the remote port is open to bash: echo >/dev/tcp/8.8.8.8/53 && echo "open" Transfer the process to the background: Ctrl + z Switch the process to the foreground: fg Generate a random hexadecimal number, where n is the number of

Centos 5.5 Server Security Configuration

CentOS Security Configuration 1. system security record files Recording files in the operating system are important clues for detecting network intrusion. If your system is directly connected to the Internet, you find that many people The system

Battle against Centos system password cracking

Centos system password cracking GRUB: On the boot loader menu, type [e] to enter the editing mode. You will face a list of pilot projects. Find the line with the output similar to the following: kernel/vmlinuz-2.4.18-0.4 ro root =/dev/hda2 press the

Security settings of the vsftpd service

In the process of building vsftp, service security is critical. check whether there is hacker intrusion in the log and whether to avoid the next hacker attack. Now I write the ftp security management, hope you can help. 1. Enable the log function of

Prevent independent ip addresses from being maliciously resolved by other domain names

Generally, websites can be accessed by domain names and IP addresses. Your website can be accessed directly through an IP address. This is no problem, but it may cause some risks: Because the search engine will also include the pages of your IP

Use iptables in CentOS to restrict access from specific IP addresses only

We often need to impose some security restrictions when configuring the linux server, such as only allowing specific IP address segments to access the specified port. For example, I have a server with dual-IP addresses that can be accessed from both

Prevents DDOS attacks in CentOS.

Squid mainly uses its port ing function to convert port 80, in fact, for general DDOS attacks, you can modify the parameters in/proc/sys/net/ipv4/tcp_max_syn_backlog. The default parameters are generally small and set to more than 8000, general DDOS

Total Pages: 1330 1 .... 878 879 880 881 882 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.