In Linux system security vulnerabilities, more security problems are caused by improper configuration, which can be prevented by appropriate configuration. The more services run on the server, the more opportunities for improper configuration, and
As the saying goes: "The treasure of a thousand miles is destroyed by the ant nest ." Once an attacker finds a small vulnerability, the final consequence may be the paralysis of the entire network. How can we discover security vulnerabilities in
It has been seven years since I calculated it as a technology. I have been studying for the past seven years. To be honest, I have worked harder than I did when I went to school. google is my best teacher. However, there are too many weak materials
When learning about the operating system, we all know that the file system is an important part of the operating system. There are many types of file systems, such as windows fat, fat32, Linux ext, ext2 or ext3, And FreeBSD ufs. During the use of
Name:SetledsPermission: Average userUsage:Setleds [-v] [-L] [-D] [-F] [{+ |-} num] [{+ |-} caps] [{+ |-} scroll] Note:Used to set the status of three LEDs on the top of the keyboard. In Linux, each virtual console has its own
Linux is an operating system imported from outside China. Because it does not support Chinese characters, many new users are afraid. The following uses Red Hat 7.0 as an example to create a Chinese environment.
Key factors in Chinese
· In the UNIX world, there has been no shortage of typographical and print tools for a long time. For example, the powerful behind-the-scenes typographical system TeX/LaTeX is used to preview, display, and print the file's graphical language
1. Install First, put the first disc into the optical drive, start from the disc, start from the Linux installation process, if you can identify your video card during the startup process, the installer automatically adjusts the screen resolution to
I checked the Internet for two days, UTF-8, Font, beautification, Chinese ...... These words have been searched hundreds of times. However, the font mechanism of X Window has not been quite clear yet.LINUX and XF86 have both become too fast, and
Grep (global search regular expression (RE) and print out the line, full search for regular expressions and print out rows) is a powerful text search tool, it can use regular expressions to search for text and print matching rows. Unix Grep families
The crontab command is used to submit, edit, list, or remove cron jobs.
Syntax
Crontab [-e [UserName] |-l [UserName] |-r [UserName] |-v [UserName] | File]
Description
The crontab command submits, edits, lists, or removes cron jobs. A cron job is a
This article is a "quick tutorial" on Linux file commands. It is provided for users who are new to the operating system or who only need to add this knowledge. It provides a concise overview of some more useful commands and guidance on their most
There is a requirement that doesn't know how to implement it.
Compression: tar czvf/data/backup/test.tar.gz/data/a/B/directory
Decompress: cd/data/test
Tar xzvf/data/backup/test.tar.gz
The problem is that the decompressed file is
◆ 1. How to Deal with the forgotten SolarisROOT Password
1. If you can log on with a common user, % df/etc, and confirm the device name that contains the/etc directory partition.
% Df/etc // dev/dsk/c0t0d0s0 ......
In this example, It is c0t0d0s0.
Using the uptime or top command, you can see the output of a load, such as load average: 0.00, 0.03, 0.00. What is this load? man's document is just a document, there is no specific definition of the load.
Load statistics must be completed by the
USB stands for "Universal Serial Bus", meaning "Universal Serial Bus ".It was proposed jointly by Compaq (Compaq), DEC, IBM, Intel, NEC, Microsoft, and Northern Telecom in November 1994, the main purpose is to solve the drawbacks of too many
Linux has its own complete startup system, which captures the context of Linux Startup. the Linux Startup Process will no longer be mysterious.
In this article, we assume that the init tree set in inittab is:
/Etc/rc. d/rc0.d
/Etc/rc.
If you have no time to read this article, beginners can use root partitions and swap partitions. Or you can divide the hard disk by my partition. I often set up file systems in the order of M/boot, 1g swap, M/var/tmp, 3g/usr, and leave the rest of
The kernel can pass a string command line at startup to control the kernel startup process, for example:
"Console = ttyS2, 115200 mem = 64M @ 0xA0000000"
The console is specified as the serial port 2, the baud rate is 115200, the memory size is 64
Generally, the root user can execute the lsof command. The common user can see the/usr/sbin/lsof command, but the normal user's execution will display "permission denied"
I will summarize the usage of the lsof command:
Lsof abc.txt displays the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service