In Linux, each file and directory has access permission to determine who can access and operate files and directories.
File or directory access permissions are divided into read-only, write-only and executable. Taking a file as an example, the
Original article address
Linux diary system is monitored by system logsProgramSyslogd is composed of the kernel log monitor klogd. The two monitoring programs are both daemon and registered as system services. In other words, we can find the
Time and time zone settingsFirst, check whether UTC or local time is used.UTC (Universal Time Coordinated) = GMT (Greenwich Mean Time)Local time is the time on your watch
Traditional POSIX computers (Solaris, BSD, UNIX) use the UTC formatLinux
Rsync is a data image backup tool in Linux. It can be seen from the software name-Remote Sync. Rsync supports most UNIX-like systems, including Linux, Solaris, and BSD. The latest version of rsync can be found at http://rsync.samba.org/rsync. Its
Introduction
On the IBM eServer server that supports logical partitions, Linux and AIX should be run in different separate partitions. However, not all configurations support logical partitions, and sometimes all resources need to be available on
This article briefly introduces several Linux IDS intrusion detection tools, such as psad, Apparmor, and SELinuxu. First, let's take a look at the principles and practices of the intrusion detection system.
If you only have one computer, it is
This article introduces the security of Linux. It may not matter if many people do not know about the Linux system. After reading this article, you must have learned a lot. I hope this article will teach you more things. Many people know that Linux
NagiosThe device and setup of the remote monitoring software are as follows:
Figure-Nagios
As a system administrator, I'm most depressed when my main online systems stop or stop collecting services without my knowledge, in addition, it may take a
BKJIA exclusive Article] Editor's note: On the public network, intelligent DNS is used on most second-level domain names and some non-public network domain names. It has been operating quite stably for more than a year. Xiaohui summarized the
One linux Command every day (28): tar command link: One linux Command every day (1): ls command http://www.bkjia.com/ OS /201210/163049.html#linuxlinuxcommand every day (2): cd command serial (3 ): pwd command Export (4): mkdir command Export (5):
How to load the mobile hard drive and optical drive in Linux? For more information about loading the mobile hard drive in linux, see the children's shoes ~ 1. Mount the USB file and check the information. Follow these steps. 1. Log in 2. Create a
(1) restrict name server recursive query
Disabling recursive queries can enable the name server to enter the passive mode. When it sends a query request to an external DNS, it will only answer the query request for its authorized domain, instead of
It took me two nights to install and configure phpmyadmin in centos. If it was depressing, I couldn't do it. It was easy to configure phpmyadmin. I Just configured it when I was working. It went quite well. Five years later, it took me two nights
Date and Time
Asctime
Ctime
Gettimeofday
Gmtime
Localtime
Mktime
Settimeofday
Time
Asctime (represents the time and date in string format)
Related functions
Time, ctime, gmtime, localtime
Header file
# Include
Define functions
Char * asctime
How to modify the Ubuntu root password and prevent others from using the single-user mode to change the password after Linux is installed, there will be a Ubuntu root user. So how can I change the password of the Ubuntu root user without knowing the
System
# Uname-a # view kernel/operating system/CPU Information
# Head-n 1/etc/issue # view the operating system version
# Cat/proc/cpuinfo # view CPU Information
# Hostname # view the computer name
# Lspci-TV # list all PCI devices
# Lsusb-TV
After get_device_info is completed, we continue to go down the storage_probe step by step. Continue, This is the three functions we mentioned earlier, get_transport, get_protocol, and get_pipes. Once these three functions are completed, we will
We followed storage_probe () almost completely, and it seems that everything is about to end, but do you think you haven't understood how the device works so far? USB flash drives are not only USB devices but also "disks". They also need to comply
Declaration: A Brief Introduction to MRTG, cacti, nagios, ntop, and zabbix functions and advantages and disadvantages. Refer to some articles on the Internet and other blogs, including image cutting, I just made a porter myself. It is not completely
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.