By:kapil Sharma from Linux_month (a onine monthly Linux magzine)
Translation: F@tfox
This article describes how to make your Linux system reliable with basic security measures.
1. Bios Security
Be sure to set the BIOS password to prevent booting
At work, we need to record every command that the user executes and send it to the log server, and I have done a simple solution. This scheme sends every command executed by the user to the log daemon rsyslogd every time the user exits the login,
Overview
The concept of a log file is well understood, which is what time, who, where, and what has been done. A program called Syslog (an extended rsyslog for Ubuntu) is responsible for collecting the information generated by the system, and then
Brief introduction
A port binding is the binding of multiple physical network cards to a logical network card; Depending on the pattern, the function of the NIC binding can be divided into two main functions of lifting throughput and hot backup,
Chroot_local_user=yes #是否将所有用户锁定在主目录, YES to enable no disabled. (including comments off also for disabled)Chroot_list_enable=yes #是否启动锁定用户的名单 YES to enable no disable (including comment out also disabled)
Chroot_list_file=/etc/vsftpd.chroot_list
If you also encounter the same situation as North Street, please do not worry, because this is only the Linux system does not have the Chinese pack installed. Here to teach you to install the corresponding Package.
1. Install the following packages
1, on the Grub Boot loader menu, select the entry you want to enter, type "E" to enter the editing mode;
2, in the second line (similar to kernel/vmlinuz-2.6.15 ro root=/dev/hda2), type "E" into the editing mode;
3, at the end of the sentence plus
After you install SVN, the directory structure is as follows:
The following are the main modifications to the contents of the Hooks directory:
CD hooksVI Post-commit
The code is as follows
Copy Code
#!/bin/shSVN
For example, to modify the Zhangsan in all files below the directory/modules to Lisi, do this:
Sed-i "s/zhangsan/lisi/g" ' grep zhangsan-rl/modules '
Explain:
-I represents inplace edit, modifying files in place-R means searching subdirectories-L
1 Crond Service not started
Crontab is not a function of the Linux kernel, but relies on a crond service that can be started and can be stopped as well. If you stop and you can't perform any scheduled tasks, the workaround is to open it:
Crond
Or
First, tail command syntaxtail [f] [-c number |-N number |-M number |-B number |-K number] [File]
Parameter description:
-F This parameter is used to monitor file growth.-c number reads the specified file from the number byte position-N number
The grep command can find the contents of a single file or folder under a file. Use the parameter "R" or "R" to recursively find all the files under the specified folder; The parameter "L" lets the grep output the file name that contains the
First look at the configuration diagramThe procedure is as follows:Linux Apache virtual host configuration methodRedhat Enterprise Linux (including CentOS Linux) is the most widely used Linux server. A large number of website applications are
1. List the usernames of all logged-on users on the current system. Note: Only one user can be logged on multiple times.~] # Who | cut-d ''-f 1 | sort-u2. Retrieve the information about the last logon to the current system.~] # Last | head-13.
1. About supervisorWhen starting a service, such as nginx, we usually use service nginx start or/etc/init. d/nginx start, but when the system runs multiple services, it is very troublesome to start and stop one by one. When the service fails, manual
Basic format:* *** CommandHour, day, month, and Week commandsThe 1st column indicates minute 1 ~ 59. Each minute is represented by * or */1.The first column indicates the hour 1 ~ 23 (0 indicates 0 points)The 3rd column indicates the date 1 ~ 31The 4
Target1. Provide shared files by department;2. All shared files are readable but cannot be written;3. Shared files are maintained by dedicated personnel and can be written;EnvironmentCentOS 7.2 amd64Samba-4.2Procedure1. Add a system userUseradd
We know that the monitored IP addresses are usually pinged for judgment, or upper-layer service monitoring, or monitoring url, response returned, and page keywords.If one domain name is monitored and only one domain name is available, we can use
Install myadmin and set security in the php Tutorial in linuxPhpmyadmin is a set of programs managed on the server side through the browser interface. Therefore, it is very important to ensure the security of its directories. Otherwise, data may be
Linux zip unzip file decompression command setZip is one of the common compression and compression commands in linux. After the file is compressed, it will generate another file ". zip "extension of the compressed file, because zip can be easily
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service