Sometimes we need to create a user-defined account. Generally, the newly created account can log on to the server using the ssh tool. To improve security, we must disable the SSH Login permission for this account.
1. Create an account and
The default Administrator name in Linux is root. You only need to know the ROOT password to directly log on to SSH. Preventing Root users from logging on directly from SSH improves server security. After performing the following operations.
This
When using a system, we must look at the system configuration, while the CentOS system looks at the configuration, it is not as intuitive as windows. You can only view them one by one. Many people are overwhelmed by how to view the CPU Of The CentOS
The shortcut keys used in the terminal (required for server admin)
!! Run the previous command
! Abc executes the latest command starting with abc
! N: The Nth command in the execution history
Alt-> last historical item
Alt-
ALt-f move the
Currently, many websites can assign users a custom second-level domain name, for example, myname.netingcn.com. But the actual access address may be www.netingcn.com/user.php? Uid = myname. To make it work properly, configure wildcard domain name
In Centos, you can configure crontab to regularly execute tasks. The execution body can be a system command or a script written by yourself. You can also assign users to execute tasks. You can configure crontab in two ways.Method 1: Use the crontab
It is essential to use the command line in linux. Mastering the shortcut keys can help you get twice the result with half the effort. The most commonly used key should belong to the Tab key, and the function is automatically completed. It is mainly
Basic rsync command syntaxRsync Command Option source directory target directory
If the source directory is/var/www/, all the files in the directory will be synchronized to the target directory. If it is/var/www /*, the hidden file in the current
First, open the terminal and enter route-e in the terminal to display the current route table of the host.
If you want to add a route table entry whose destination network is 10.0.2.0/24 and whose next hop IP address (GATEWAY) is 10.0.1.1, enter:
When a CentOS 5.6 machine needs to upgrade the memory to 6 GB, the system is found to be 32-bit, so the search can enable the 32-bit system to support 4 GB memory or above.
How does one enable 32-bit linux/Centos to support 8 GB memory? The
Crontab Introduction
Crontab commands are common in Unix and Unix-like operating systems and are used to set periodically executed commands. This command reads commands from the standard input device and stores them in the crontab file for later
In the SMP system, our applications often use multithreading technology. How can we view multiple threads of a process in Linux?
This article describes how to view the Linux threads (LWP) by using three commands:
In my system, I started an SMP Guest
This section describes how to automatically start SVN when Linux is started. In the previous section, we will explain how to automatically start the SVN service when Windows is started. Through this section, you can make a comparison, let's take a
Route
Function Description: The route command in linux can be used to display and operate IP route tables. It is mainly used to create a static route for a specified host or network to pass through a network interface, such as eth0. When the "add"
Ifconfig
Function Description: The Ifconfig command can be used to obtain the network interface configuration information of a device and modify the configuration. However, after the device is restarted, the information will be cleared. If you want
Alias command
Function Description: Some commands that we often use but are very long at system management. Then we can create an alias for these long strings of commands. This long string of commands can be directly replaced by an alias. The system
#! /Bin/sh
# Set Variables
Bak_path =/root/bak_linux
Date = $ (date + % Y % m % d)
Log_file = $ bak_path/$ date # log. log
# Write the execution result to the log
Exec 1> $ log_file 2> & 1
# Package the directory to be backed up in the $
In linux system management, we sometimes need to end all processes of a user. Beginners usually first query all the user's PIDs, and then kill them one by one, or write a script. In fact, there are many methods to end. The bloggers summarize the
By default, Linux reserves a lot of space for caching (almost all) for accelerating file IO. When a large number of reads and writes occur in the system, the page cache often consumes physical memory. Although there is no danger of swap to the hard
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service