One case of DNAT and nic faults in Linux

Fault description: After the new Linux server configuration iptables enables DNAT, It is very slow for users to access the Intranet server through the public network. The download is only 1 kb/s, and loading the server webpage is quite slow...

Deep understanding of Linux File System

1. Why can the files in the rm-rf directory be recovered after being deleted? 650) this. width = 650; "title =" ind.jpg "src =" http://www.bkjia.com/uploads/allimg/131227/1F2493401-0.jpg "alt =" 105317164.jpg"/> First, create an empty directory test.

Relationship between setroubleshoot and audit in redhat linux 6

Linux selinux is not very familiar with setroubleshoot and audit recently. Find the following official explanation:

Substitutes for browsers in Linux

In Windows, many users are using IE browsers. But is there any replacement for IE in Linux? Actually, anyone familiar with Linux knows that there are many excellent browsers in Linux, and they have surpassed IE in Windows in many places. Next we

Top 10 most popular Linux browsers

According to foreign media reports, one or two Linux system browsers are commonly used by Linux users in February 5. In fact, there are still many options to choose from. The following sections describe and rank the top 10 most popular Linux

How to change the Linux yum source?

Background After CentOS6.3 is installed, you need to change the yum update source to avoid slow installation from a foreign site. Therefore, you can find a method to change the linux yum source from the Internet and share it with you. The principle

Linux Server-log (1)

BKJIA exclusive report] logs are very important for security. They record various events that occur in the system every day. You can use them to check the causes of errors, or the traces left by the attacker during the attack. The main functions of

Linux Disk Quota Management

Do you want to add a quota with the partition? This is acceptable.First, you need to modify your/etc/fstab file.:LABEL = // ext3 defaults 1 1Changed:LABEL = // ext3 defaults, usrquota 1 1Or change:LABEL = // ext3 defaults, MAID 1Usrquota is based on

Grub installation, configuration, and usage

(1) install grub during linux installation.When installing redhat linux, you will be prompted to install the boot program. If grub is selected as the boot program, it is recommended to install grub to the boot sector MBR of the hard disk. grub can

Use the Chinese TrueType font library for non-XFree86 X Servers

Due to the lack of relevant technical information, XFree86-3.3.3.1 on the current market more popular new display card can not provide the corresponding support. these display cards include the i740 chip-based AGP display card. fortunately,

How does one display the Chinese character file name in the FAT partition in Linux?

Since the release of redhat, no matter which version you connect to the windows partition, the Chinese file name cannot be correctly displayed, Which is troublesome for most friends who use redhat. After the installation, not only will the widows

Dual-machine solutions for IBM in Linux

Cluster system is an effective way to provide high availability, improve performance, and enhance the manageability of enterprise application software. As Intel-based servers have become the mainstream servers for key services and applications,

Unlimited server hardware maintenance (2) Fire Prevention and moisture prevention (1)

Fire Prevention and moisture preventionCurrently, the construction of data centers for many storage servers is not standard, and there are many physical security risks. fire and flood incidents often occur in data centers. Each server system is

Create multi-Web Server backup (1)

When important Web services work normally, a corresponding backup system must be established to ensure data security and non-interconnectivity. The accident mainly refers to power interruption, natural damage to server hardware, and crash of server

Using Squid in Linux to build a high-speed Proxy Server

1. What is Proxy Server? The role of Proxy In the real world, we often help people to do things, such as pay for electricity or something. In this case, you are not the electricity meter owner, but the agent) identity. In the online world, Proxy is

Configure a "Ten Thousand five strokes" based on the SCIM Input Method"

I often use strokes in WINXP, but now I don't know what to do in linux. I didn't know how to use strokes in linux before using ubuntu, but now I know that some experts have actually been able to use in linux. First of all, I would like to thank them

Nginx pseudo-static configuration and nginx restart in Linux

I used nginx to create a site! Dzx1 installedThe method is as follows:1. Create a New. htaccess file in the directory where you need to use the. htaccess file,For example, in my Discuz Forum directory:Vim/opt/wwwroot/discuz/. htaccess2. Enter a rule

Linux system logs

1. Linuxwendang/index.html '> log OverviewLogs are very important for security. They record all kinds of things happening in the system every day.He checks the cause of the error or traces left by the attacker when the attack occurs. The main

Enable route forwarding in linux

In linux, the route forwarding function is enabled to allow linux machines to work as a router. My computer: 192.168.80.236 cannot ping 192.168.60.11 But 192.168.80.108 can be connected to 60.11 Solution: Add a route on 236 and set the gateway

Linux vpn Server ip tunneling jump to multi-ip Route direction shunting (real case)

In this article, the system Centos6.0; the vpn service here uses pptpd as an example; the underlying layer involves pptpd + freeradius + mysql authentication; Url: http://lansgg.blog.51cto.com/5675165/1225461 This article is a real case study. Most

Total Pages: 5467 1 .... 4513 4514 4515 4516 4517 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.