Using OpenSSL to generate certificates under Linux

Using OpenSSL to generate the Library and command program, in the generated command program includes the addition/decryption algorithm test, OpenSSL program, CA program. Use OPENSSL,CA to generate certificate files and CA files for the C/s mode.

How to protect your Linux VPS

This article translates from Digitalocean's Introduction to securing your Linux VPS, which is recommended to read the original. Previously posted in the OSC translation area, has been audited, had to publish to the blog this ObjectiveTaking

How Linux modifies the command prompt

1. What is a command promptCommand Prompt is the CLI (command-line interface, command line interface) in the process of human-computer interaction prompts the user to be able to enter the command of the special symbol, in Linux, the average user

Information collection using Kali Linux in penetration testing

Domain Registration InformationWhen you know the target domain name, the first thing you have to do is to query the domain name registration information through the Whoist database, whois database is to provide the domain name registrant information,

The free command in Linux

Explain the output of the free command on Linux.Here is the result of the free run, with a total of 4 rows. For convenience, I added a column number. This can be seen as a two-dimensional array fo (free output). For example:FO[2][1] = 15402628 fo[3][

Notes Accurate delay under Linux, #include <linux/delay.h> call error

When writing application-level programs, sometimes you need to delay, what should I do?In the kernel code, we often see such a header file using # include , and thought of calling this directly is OK! But at the time of compiling, we found thatThe

On Linux memory management mechanism

often encounter some new Linux novice will ask how much memory consumption? In Linux often found that the free memory is very small, it seems that all the memory is occupied by the system, the surface of the memory is not enough to use, it is not.

Ssh-keygen+ssh-copy-id ssh password-free login access under Linux

Environment:192.168.2.10192.168.2.11Implementation: 2.10 SSH without password login to 2.11In 2.10 ssh to 2.11 machines, a password is required, which makes it inconvenient for some scripts to work because of the need for a password, which requires

Using SCP commands to pass files between Linux operating systems

I. On the SCP SCP is the abbreviation for the English secure copy program , which is used primarily to copy files over the network between two hosts. SCP uses ssh protocol for data transfer, and its authentication method and security are

Build an OpenVPN service environment using CentOS

Build an OpenVPN service environment using CentOS I will not say much about the purpose of the OpenVPN environment, because friends who see this information should understand and need to use this tutorial. This tutorial has been prepared by @

Install OpenELEC on Raspberry Pi 2

Install OpenELEC on Raspberry Pi 2 The next Raspberry Pi 2 has finally arrived, with its small size and ultra-low power consumption. In combination with OpenELEC, it has become a good choice for domestic HD players and simple NAS. This article will

Use a Linux virtual machine to install CentOS6.4 in VMware vSphere Client

Use a Linux virtual machine to install CentOS6.4 in VMware vSphere Client Requirements: Use a Linux Virtual Machine in VMware vSphere Client to install CentOS6.4 Preface: companies need to prepare virtualization to virtualize physical machines with

Open the Vi editor and the E325: ATTENTION solution appears.

Open the Vi editor and the E325: ATTENTION solution appears. Do not worry when the following prompt appears when opening the Vi EditorE325: ATTENTIONFound a swap file by the name "/etc/. profile. swp"Owned by: root dated: Wed Jul 14 10:01:10

Linux iptables firewall basic application tutorial

Linux iptables firewall basic application tutorial Iptables is a common firewall software in Linux, the following describes how to install and clear iptables rules. iptables only supports the specified port. iptables shields basic applications of

In Linux, how does one set RAID 10 to ensure high-performance and fault-tolerant disk input/output? (1)

In Linux, how does one set RAID 10 to ensure high-performance and fault-tolerant disk input/output? (1) RAID 10, also known as RAID 1 + 0 or image strip) array combines the features of RAID 0 and RAID 1 to provide high-performance, fault-tolerant

Enable the VMware ESXi virtual switch to support VLAN

Enable the VMware ESXi virtual switch to support VLAN Currently, virtualization is widely used. Generally, a physical host can create multiple virtual machines on a physical host after installing VMware ESXi or Hyper-V Virtual Machine Software, in

Vimdiff --- VIM comparison and merge tool, vimdiff --- vim merge

Vimdiff --- VIM comparison and merge tool, vimdiff --- vim merge This article comes from the IBMDW http://www.ibm.com/developerworks/cn/linux/l-vimdiff/ Comparing and merging source program files (usually plain text files) has always been an

Install LAMP in Ubuntu Server 14.04

Install LAMP in Ubuntu Server 14.04 For many PHP beginners, setting up a LAMP environment for production is a must. This document uses Ubuntu Server 14.04 as an example to provide a tutorial for building a LAMP environment, for your reference. LAMP

Configure PXE network startup server in RHEL/CentOS 7

Configure PXE network startup server in RHEL/CentOS 7 PXE Server -- pre-start execution environment -- instructs the client computer to Start, Run, or install the operating system directly from the network interface, without burning a CD/DVD or

Docker learning Summary-Comparison of features between Docker and Vagrant

Docker learning Summary-Comparison of features between Docker and Vagrant The following content is discussed in stackoverflow by Mitchell Hashimoto and Solomon Hykes. In this case, the two parties have elaborated on the characteristics and scope of

Total Pages: 5467 1 .... 159 160 161 162 163 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.