Using OpenSSL to generate the Library and command program, in the generated command program includes the addition/decryption algorithm test, OpenSSL program, CA program. Use OPENSSL,CA to generate certificate files and CA files for the C/s mode.
This article translates from Digitalocean's Introduction to securing your Linux VPS, which is recommended to read the original. Previously posted in the OSC translation area, has been audited, had to publish to the blog this
ObjectiveTaking
1. What is a command promptCommand Prompt is the CLI (command-line interface, command line interface) in the process of human-computer interaction prompts the user to be able to enter the command of the special symbol, in Linux, the average user
Domain Registration InformationWhen you know the target domain name, the first thing you have to do is to query the domain name registration information through the Whoist database, whois database is to provide the domain name registrant information,
Explain the output of the free command on Linux.Here is the result of the free run, with a total of 4 rows. For convenience, I added a column number. This can be seen as a two-dimensional array fo (free output). For example:FO[2][1] = 15402628 fo[3][
When writing application-level programs, sometimes you need to delay, what should I do?In the kernel code, we often see such a header file using # include , and thought of calling this directly is OK! But at the time of compiling, we found thatThe
often encounter some new Linux novice will ask how much memory consumption? In Linux often found that the free memory is very small, it seems that all the memory is occupied by the system, the surface of the memory is not enough to use, it is not.
Environment:192.168.2.10192.168.2.11Implementation: 2.10 SSH without password login to 2.11In 2.10 ssh to 2.11 machines, a password is required, which makes it inconvenient for some scripts to work because of the need for a password, which requires
I. On the SCP SCP is the abbreviation for the English secure copy program , which is used primarily to copy files over the network between two hosts. SCP uses ssh protocol for data transfer, and its authentication method and security are
Build an OpenVPN service environment using CentOS
I will not say much about the purpose of the OpenVPN environment, because friends who see this information should understand and need to use this tutorial. This tutorial has been prepared by @
Install OpenELEC on Raspberry Pi 2
The next Raspberry Pi 2 has finally arrived, with its small size and ultra-low power consumption. In combination with OpenELEC, it has become a good choice for domestic HD players and simple NAS. This article will
Use a Linux virtual machine to install CentOS6.4 in VMware vSphere Client
Requirements: Use a Linux Virtual Machine in VMware vSphere Client to install CentOS6.4
Preface: companies need to prepare virtualization to virtualize physical machines with
Open the Vi editor and the E325: ATTENTION solution appears.
Do not worry when the following prompt appears when opening the Vi EditorE325: ATTENTIONFound a swap file by the name "/etc/. profile. swp"Owned by: root dated: Wed Jul 14 10:01:10
Linux iptables firewall basic application tutorial
Iptables is a common firewall software in Linux, the following describes how to install and clear iptables rules. iptables only supports the specified port. iptables shields basic applications of
In Linux, how does one set RAID 10 to ensure high-performance and fault-tolerant disk input/output? (1)
RAID 10, also known as RAID 1 + 0 or image strip) array combines the features of RAID 0 and RAID 1 to provide high-performance, fault-tolerant
Enable the VMware ESXi virtual switch to support VLAN
Currently, virtualization is widely used. Generally, a physical host can create multiple virtual machines on a physical host after installing VMware ESXi or Hyper-V Virtual Machine Software, in
Vimdiff --- VIM comparison and merge tool, vimdiff --- vim merge
This article comes from the IBMDW http://www.ibm.com/developerworks/cn/linux/l-vimdiff/
Comparing and merging source program files (usually plain text files) has always been an
Install LAMP in Ubuntu Server 14.04
For many PHP beginners, setting up a LAMP environment for production is a must. This document uses Ubuntu Server 14.04 as an example to provide a tutorial for building a LAMP environment, for your reference.
LAMP
Configure PXE network startup server in RHEL/CentOS 7
PXE Server -- pre-start execution environment -- instructs the client computer to Start, Run, or install the operating system directly from the network interface, without burning a CD/DVD or
Docker learning Summary-Comparison of features between Docker and Vagrant
The following content is discussed in stackoverflow by Mitchell Hashimoto and Solomon Hykes. In this case, the two parties have elaborated on the characteristics and scope of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.