Linux Security Settings Manual "Turn"

By:kapil Sharma from Linux_month (a onine monthly Linux magzine) Translation: F@tfox This article describes how to make your Linux system reliable with basic security measures. 1. Bios Security Be sure to set the BIOS password to prevent booting

Linux uses logs to record the commands the user executes

At work, we need to record every command that the user executes and send it to the log server, and I have done a simple solution. This scheme sends every command executed by the user to the log daemon rsyslogd every time the user exits the login,

In-depth analysis of Linux log files

Overview The concept of a log file is well understood, which is what time, who, where, and what has been done. A program called Syslog (an extended rsyslog for Ubuntu) is responsible for collecting the information generated by the system, and then

Linux System network card binding tutorial

Brief introduction A port binding is the binding of multiple physical network cards to a logical network card; Depending on the pattern, the function of the NIC binding can be divided into two main functions of lifting throughput and hot backup,

The relationship between VSFTPD configuration file Chroot_local_user and chroot_list_enable under Linux

Chroot_local_user=yes #是否将所有用户锁定在主目录, YES to enable no disabled. (including comments off also for disabled)Chroot_list_enable=yes #是否启动锁定用户的名单 YES to enable no disable (including comment out also disabled) Chroot_list_file=/etc/vsftpd.chroot_list

Solve the problem of character display garbled in Linux

If you also encounter the same situation as North Street, please do not worry, because this is only the Linux system does not have the Chinese pack installed. Here to teach you to install the corresponding Package. 1. Install the following packages

Forget root user login password solution in Linux

1, on the Grub Boot loader menu, select the entry you want to enter, type "E" to enter the editing mode; 2, in the second line (similar to kernel/vmlinuz-2.6.15 ro root=/dev/hda2), type "E" into the editing mode; 3, at the end of the sentence plus

Automatic Update method of Linux SVN version Library

After you install SVN, the directory structure is as follows: The following are the main modifications to the contents of the Hooks directory: CD hooksVI Post-commit The code is as follows Copy Code #!/bin/shSVN

Linux sed Batch replacement string method detailed

For example, to modify the Zhangsan in all files below the directory/modules to Lisi, do this: Sed-i "s/zhangsan/lisi/g" ' grep zhangsan-rl/modules ' Explain: -I represents inplace edit, modifying files in place-R means searching subdirectories-L

Crontab in Linux does not perform properly

1 Crond Service not started Crontab is not a function of the Linux kernel, but relies on a crond service that can be started and can be stopped as well. If you stop and you can't perform any scheduled tasks, the workaround is to open it: Crond Or

Linux Tail command use method detailed

First, tail command syntaxtail [f] [-c number |-N number |-M number |-B number |-K number] [File] Parameter description: -F This parameter is used to monitor file growth.-c number reads the specified file from the number byte position-N number

Content in bulk replacement files under Linux

The grep command can find the contents of a single file or folder under a file. Use the parameter "R" or "R" to recursively find all the files under the specified folder; The parameter "L" lets the grep output the file name that contains the

Apache virtual host (website) configuration (linux/windows)

First look at the configuration diagramThe procedure is as follows:Linux Apache virtual host configuration methodRedhat Enterprise Linux (including CentOS Linux) is the most widely used Linux server. A large number of website applications are

Linux text display and processing tools & user and group management

1. List the usernames of all logged-on users on the current system. Note: Only one user can be logged on multiple times.~] # Who | cut-d ''-f 1 | sort-u2. Retrieve the information about the last logon to the current system.~] # Last | head-13.

Use supervisor to manage processes in linux

1. About supervisorWhen starting a service, such as nginx, we usually use service nginx start or/etc/init. d/nginx start, but when the system runs multiple services, it is very troublesome to start and stop one by one. When the service fails, manual

Linux Crontab

Basic format:* *** CommandHour, day, month, and Week commandsThe 1st column indicates minute 1 ~ 59. Each minute is represented by * or */1.The first column indicates the hour 1 ~ 23 (0 indicates 0 points)The 3rd column indicates the date 1 ~ 31The 4

Linux samba server configuration sharing tutorial

Target1. Provide shared files by department;2. All shared files are readable but cannot be written;3. Shared files are maintained by dedicated personnel and can be written;EnvironmentCentOS 7.2 amd64Samba-4.2Procedure1. Add a system userUseradd

Configuration of the Zabbix3.0.3 monitored domain name in linux

We know that the monitored IP addresses are usually pinged for judgment, or upper-layer service monitoring, or monitoring url, response returned, and page keywords.If one domain name is monitored and only one domain name is available, we can use

PhpMyAdmin installation and security settings in Linux

Install myadmin and set security in the php Tutorial in linuxPhpmyadmin is a set of programs managed on the server side through the browser interface. Therefore, it is very important to ensure the security of its directories. Otherwise, data may be

Linux zip unzip file decompression command set

Linux zip unzip file decompression command setZip is one of the common compression and compression commands in linux. After the file is compressed, it will generate another file ". zip "extension of the compressed file, because zip can be easily

Total Pages: 5467 1 .... 3899 3900 3901 3902 3903 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.