However, system administrators often cannot obtain and correct information in a timely manner, which gives hackers an opportunity. Compared with the security vulnerabilities of these systems, more security problems are caused by improper
1. Man helps explain familiar or unfamiliar commands. For example: man ls, you can view LS-related usage.
2. ls viewing directories or files
3. Copy files using CP
4. rm delete files and directories
5. Remove the directory or change the file
The command line format of FTP is: ftp-v-d-I-n-g [host name], where
-V: displays all the response information of the remote server;
-N indicates that FTP automatic logon is disabled;
. N etrc file;
-D. Use the debugging method;
-G
The latest version of rsync can be found at http://rsync.samba.org/rsync. Its features are as follows:1. images can be used to save the entire directory tree and file system.2. It is easy to maintain the permissions, time, and soft links of the
Therefore, I will define a 301 redirection for any Linux host to facilitate Seo. I uploaded htaccess to the server as shown in the following example yesterday. I did not expect the website to be inaccessible after it was uploaded, And it will return
This document assumes that you have installed Linux (the Linux version in this article is fedora core3) and have the root permission.
1. install Apache First download the latest version of Apache HTTP Server to the Apache home page, the address is
CAT/etc/passwd view Linux Users
Root permission is required for CAT/etc/shadow to view user passwords
CAT/etc/sysconfig/network-scripts/ifcfg-ethn n indicates the network card number to view the IP address of the network card.
Ifconfig
CAT/
1. system security record files
Recording files in the operating system are important clues for detecting network intrusion. If your system is directly connected to the Internet, you find that many people try to telnet or FTP your system, you can
Grub is to configure the/boot/GRUB/grub. conf file.
First, let's talk about the benefits of grub encryption.
1. users who do not know the password cannot start the system.
2. prevent others from modifying startup parameters.
###############
Install the memcache server in LinuxThe server is mainly installed on the memcache server, the latest version is memcached-1.3.0.Download: http://www.danga.com/memcached/dist/memcached-1.2.2.tar.gzIn addition, memcache uses the libevent library for
Some Linux distributions provide GUI programs for System monitoring. For example, SUSE Linux has a great and professional tool YaST, and KDE's KDE System Guard is equally outstanding. Of course, to use these tools, you must operate in front of the
Part 1: RedHat Linux
1. Overview
Linux Server version: RedHat Linux
For an open operating system-Linux, system security settings include minimizing system services, restricting remote access, hiding important information, fixing security
If the backup data is not very large, compression is not recommended to prevent file corruption that has been compressed for multiple times.
Back up the database by backing up the DATA directory after the MYSQL service is stopped. During this
The options are described as follows:
-C comment specifies an annotation description.
-D directory specifies the user's main directory. If this directory does not exist, you can use the-m option to create a main directory.
-G User Group specifies
According to the phpinfo information, the iconv module has been correctly loaded.
Google. It turns out that the iconv method in linux is still a bit problematic.
The solution provided by a user on csdn is:
View sourceprint? One way is to change
file:///
Direct version library access (Local disk ).
http://
Configure the WebDAV protocol of the Subversion Apache server.
https://
Andhttp://Similar, but includes SSL encryption.
svn://
Check port usage in linux:
1.
Check which process occupies port 819:
Case9-sghfofo:/usr/local/cnbj/tomcat-bj/bin # lsof-I: 859Result After running:COMMAND PID USER FD TYPE DEVICE SIZE NODE NAMEJava 24907 root 31u IPv4 248905027 TCP *: 859
Disable ping command in LINUX
Enter the Linux system as root, and then edit the file icmp_echo_ignore_all.Vi/proc/sys/net/ipv4/icmp_echo_ignore_allChange the value to 1 to disable PING.Change the value to 0 to disable PING.
An error is prompted when
. Proftpd creates a hostuser/hostuser account. All users are mapped to this account.
The owner of the htdocs/hosts directory is also hostuser.
In this way, the property of the File Uploaded using FTP is hostuser (644 755 ).
Lock the FTP user in the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service