We have disabled ssh root users to log on remotely. If you need it, refer to it.
1. Prohibit ROOT users from accessing through SSH remotely.Modify the/etc/ssh/sshd_config file. Find the following sentence:# PermitRootLoginYesAs
On the homepage, we can go to the renewal method.
1. If your xampp does not have a devel package, the compilation will fail. This is because the include php tutorial. h fails during compilation. Therefore, make sure that the devel packages of xampp
The usage of VM. htaccess does not have the Server Management permission.
Order allow, deny
Allow from all
Deny from 124.114.0.
Deny from 124.115.0.
You can use the following method to manage a server.
Options indexes
There are many methods for defining error codes in apache 404,301. htaccess is just a method for setting the website when you do not have server permissions. The code is very simple and there is only one sentence.
1. Create a. htaccess file in your
For more information about how to implement. htaccess 301 redirection in linux, see this article.
Make sure to back up the. htaccess file in the corresponding directory before setting 301 redirection .. Htaccess 301 redirection settings are limited
Linux is not as simple as windows to directly view the file size. You need to use some commands. Next I will summarize how to view the file size and folder size in Linux.
For example, to view the size of the home directory:
Du-s/home
You can
The installed servers are not equipped with a firewall. Now let's assume we have set up ssh, Open Port 20, and no other settings. How can we do this simply and quickly? How can we quickly set apache access?
Use vim to open/etc/sysconfig/iptables.
This article describes how to set the proxy_cache cache and cancel the cache in Nginx in Linux. If you need it, refer to it.
Add the following sentence to the server {} of the configuration file:
The Code is as follows:
Copy code
The History command is mainly used to display the History Command records and issue commands in the History records.1> History command syntax:[Test @ linux] # history [n][Test @ linux] # history [-c][Test @ linux] # history [-raw]
Now more and more friends are using linux, especially when a large part of the server uses linux servers. Next I will introduce the entry-level linux shutdown and restart commands, including restarting apache, databases, etc.
Linux Shutdown
Shutdown
Rewrite pseudo-static can be configured in almost all server environments. The following describes how to configure the rewrite pseudo-static method in the lighttpd environment. For more information, see.
We have been recommending cheap VPS recently.
I have read a lot about how to attach a hard disk to VPS in the past, but it feels complicated. Today I am going to find a friend of mine to learn how to attach a hard disk to VPS. I will introduce it to you in a few steps.
Note:1. Attach the hard
This article introduces how to set IP addresses and DNS in Linux. For more information, see.
Open the Linux System interface and select "System"-"Administration"-"Network" To Go To The following interface. Double-click "Active" in the red area to
If the memory usage of a server is too high, the website may be slow to open. Next I will share with you how to use shell commands in linux to monitor the memory usage status of your server in real time and remind you
To make it easier to know the
Vagrant box is a lite version of ubuntu or centos in linux. It has a smaller size and better performance. However, it supports Chinese characters. Next we will introduce an example of how to fix Chinese characters.
The solution is as follows:
This article will introduce you to the super simple port scanner written in Linux C language. I hope this method will be helpful to you.
The Code is as follows:
Copy code
# Include# Include# Include# Include# Include# Include#
Sphinx is an SQL-based full-text search engine that can be used in combination with MySQL and PostgreSQL for full-text search. It provides more professional search functions than the database itself, this makes it easier for applications to
Netcat is the Swiss army knife in the network tool. It can read and write data in the network through TCP and UDP. By combining with other tools and redirection, you can use it in multiple ways in the script. What the Netcat command can do is
During product development, You can accurately evaluate the total memory size required by the product by counting the total memory consumption of the current system, so as to select an appropriate memory chip and size, reduce product costs. In case
Trojan and backdoor detection and removal are a long-term task for system administrators. The following describes how to configure and prevent Trojans and backdoors in the Linux system:
I. Web Server (using Nginx as an example)
1. To prevent
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service