Install and configure telnet in Centos (for full version, Centos 5.5)
1. Check whether telnet is installed on the local machine (telnet is installed on centOS5 by default)
# Rpm-qa | grep telnet
If the result is:
Telnet-0.17-39.el5
Telnet-server-0
You can quickly complete the VPN Server configurations of pptp with several key points:
Ppp-Point-to-Point Protocol)
Pptpd-Point-to-Point Tunneling Protocol)
Iptables-set the packet Distribution Rules
Server guard
1. Determine whether ppp is
The FTP function in CentOS is provided by a software named vsftpd. In the Name, vs is short for very secure. Therefore, vsftpd features outstanding security and stability. Official site: http://vsftpd.beasts.org /.Vsftpd is not installed by default.
I. installation environment: System Version: Centos 5.3 64-bit here cacti: http://www.cacti.net/downloads/cacti-0.8.7g.tar.gz、official installation :* * LAMP environment deployment:
Here is how to install LAMP in yum in 5 minutes:
Yum install
1. Update yum Source
First you need to update the system's yum source, convenient tool: http://help.aliyun.com/manual? Spm = 0.0.0.0.zJ3dBU & helpId = 1692
2. Install vsftp
Use the yum command to install vsftp
# Yum install vsftpd-y
3. Add an ftp
Install OpenNMS
RPM of the installation information library
RMP: RedHatPackageManager (RedHat package management tool)
Run the putty.exe tool. Run the command "rpm-Uvhhttp: // others" as the root user after the login name and password.
Prepare
By default, the Linux system uses the/etc/inittab file to control whether reboot or shutdown is performed when the system simultaneously presses the -- combination key before the system terminal. If you want to, you can completely disable this
File Management commands
First, I would like to sum up some commands for file management: ls, cd, pwd, mkdir, rmdir, cp, rm, mv, touch, cat, more, less, head, tail, etc, next we will give a detailed description (only common, not all commands)
(1).
Summary of linux File Permission management! (4W1H Mode)
1. For example
(Fig. 1.1)
You are familiar with this figure. Let's talk about permission management!
2. File Types and permissions
Let's take a look at section 1.1 first. Let's look
SSH is short for Secure Shell, developed by the Network Working Group of IETF. SSH is a security protocol built on the application layer and transport layer.Traditional network service programs, such as FTP, POP, and Telnet, are inherently insecure
Linux has a pam_tally2.so PAM module to limit the number of Logon failures. If the number of Logon failures reaches the set threshold, the user is locked.
Compile the PAM Configuration File
# Vim/etc/pam. d/login
#%PAM-1.0
auth required
To improve work efficiency, we use version control software to manage projects, such as svn and git. Next we will take svbversion as an example to talk about how to install svn and deploy the project.
1. Install the svn server and use anonymous
NetCat is known as "Swiss Army Knife" in network tools, and has Windows and Linux versions. It is designed as a simple and reliable network tool because it is short (1.84 is only 25 kb, earlier version or even smaller version) and has practical
The Linux server allocates real and virtual memory to the processor and manages memory usage through swap. Understanding the Linux memory type and how the processor shares memory helps optimize memory usage.
Memory is allocated from the Linux kernel
I. concept and classification of processes1. Process ConceptLinux is a multi-user and multi-task operating system. Multi-User means that multiple users can use the same linux system at the same time. Multi-task means that multiple tasks can be
Tailf of Linux commands I have used-tracking log files/better tail-f versions
Description
The tailf command is almost equivalent to the tail-f command. It should be more similar to the tail -- follow = name command. After a file is renamed, it can
The content is reprinted and the copyright belongs to the original author.If you are in a hurry to shut down or restart, shutdown is init 0, and restart is init 6 or reboot.Common shutdown and restart commands in Linux include shutdown, halt, reboot,
Ifup and ifdown: linux commands
You can use ifconfig to manually modify Network Interface Parameters in real time, that is, if you start the ifcfg-ethx and other file setting parameters in/etc/sysconfig/network-scripts, You need to implement ifdown
In linux, we often use commands such as cd, grep, and vi. Sometimes we need to find the location of these commands. How can we do this?
In linux, there are two commands to complete this function: which, whereis
Which is used to view when
The path
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service