Although Linux is more secure than Windows, some simple security configurations are necessary.
There are a lot of tools on the Internet to scan your admin password with a dictionary, we can create some trouble and increase the possibility of being
1.
Install git:
The code is as follows:
sudo apt-get install Git-core Git-gui git-doc
2.
To https://github.com/to register an account, a while client login to use.
3.
Install SSH Key on the client to enable us to login securely on the client:
Imagine a scenario where our Linux system runs out of swap space, in which case we want to expand the swap space using the swap partition, but in some cases there is no free partition available on the disk, so we can't expand it.
Therefore, in this
The Apachectl command in Linux is designed to help administrators control the functionality of the Apache httpd daemon. The Apachectl script has two modes of operation. First, as a simple httpd front-end program, set all the necessary environment
Let's take a look at what is generally included in the ETC directory:
/ETC Directory
Contains a lot of files. Many network profiles are also in/etc.
/ETC/RC OR/ETC/RC.D OR/ETC/RC*.D
A directory of scripts or scripts that runs when the run level
Command 1: View file contents
"Cat filename" to view the contents of the file, the page stays at the end.
"More file name" Paging View file contents
Enter the next line
Space page
Q exit
"Head filename" to view the first few lines of the
In UNIX system maintenance, system engineers sometimes want to be able to record the process of a session. When testing a system function, the engineer would like to record the steps of the test. To use this data for follow-up analysis in the case
Firewalls Help filter access ports and prevent logon attempts to use brute force laws. I tend to use the powerful firewall of CSF (Config Server Firewall). It uses iptables, is easy to manage, and provides a web interface for users who are not good
First, edit the command
Ctrl + A: Move to the beginning of the command
Ctrl + E: Move to the end of the command line
Ctrl + F: Move forward by character (right)
Ctrl + B: Move back (left) by character
Alt + F: Move forward by word (right)
Alt +
The generation of files named at the current time is very useful for today's two major systems, using bat batch files and shell scripts to generate files that resemble "20110228_082905.txt" named "Month and Hour" in Windows and Linux operating
Linux can use the Hdparm tool to view the relevant information on the hard disk or the hard drive to speed, optimize, modify the relevant parameters of the hard disk settings. I mainly use this tool to test the speed of the hard disk.
Hdparm (hard
At run time it is possible to instantiate a template with several cells, the @ character is used to identify the relationship between the template and the cell file, the instantiation unit can be from another cell file (using the requires or wants
Connect VPS Enter First command
Netstat-anp |awk ' {print $} ' |sort|uniq-c |sort-rn
Here we look at Syn_recv these, see his connection number is not high, good hundreds of, it is possible to be DDoS
The next trace is from which IP emits syn
This is a text version:
System Information
#uname-a #查看内核/operating system/CPU information
#cat/etc/issue #查看操作系统版本
#cat/proc/version #包含GCC的版本信息
#cat/proc/cpuinfo #查看CPU信息
#hostname #查看计算机名
#lspci-tv #列出所有pci设备
#lsusb-tv #列出所有usb设备
#lsmod #
General Process:
1. Add header file Dirent.h
Declares the structure body pointer struct dirent * PTR;
Declares a dir pointer dir * FD;
2. Analysis command line
3. Open catalog File
Using the Opendir () parameter to parse the second parameter
1. Supports NTFS partitions
If your Windows partition is formatted with NTFS, you can do this by compiling the kernel in order to enable Linux to support NTFS, but the easiest way is to install the NTFS-enabled RPM package.
Right-click and
Types of attacks that Linux network systems may receive
"Denial of service" attack
The so-called "denial of service" attack means that hackers take destructive methods to block the resources of the target network, temporarily or permanently
Want to test the cache server to run 2G of traffic to see. Try to let your IP scheduler to the server on the original basis, add 20% weights, so the request will be more on the original base of more than 20% of the amount. Originally the whole
Linux under the PS command detailed
There are 5 states of processes on Linux:
1. Run (running or waiting in the run queue)
2. Interrupted (dormant, obstructed, waiting for a condition to form or receive a signal)
3. Not interrupted (Received
First, download a EasyBCD2.2 in the Win7, and then the following diagram process adds the partition of the Linux system to boot into the linux!
Here on it, I have been to win their own to delete so that only shows the Linux! Here to
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service