Linux VPS Server Security Configuration steps detailed

We need to do some basic security when we have a VPS or server that has a Linux system open. There are probably several areas:1. Prohibit root account ssh, use custom account ssh;This way, the hacker must first guess the account number, then can

Linux view SSH user login log and operation log

SSH User logon log The Linux login log is in the following directory: The code is as follows Copy Code Cd/var/log To view the login log for an SSH user: The code is as follows Copy Code

Linux VPS and server more secure settings putty SSH use key login _linux

In the previous article to ensure that Linux VPS and server more secure Xshell set key login article has been shared to Xshell use the key to login to our VPS server to ensure the safety of the machine, but many students are not like the old left

Linux kernel analysis-booting from Start_kernel to init process using GDB trace debug kernel

Name: Jiangid:fuchen1994Date of experiment: 2016.3.13Experimental guidance Open the shell with a virtual machine in the lab building CD linuxkernel/ Qemu-kernel linux-3.18.6/arch/x86/boot/bzimage -initrd rootfs.img

HDD Partition Memo (primary partition, extended partition and logical partition) and Linux hard disk partitioning tool parted introduction

Scene: Recently in the basic knowledge of Linux, the inevitable design to the Linux disk partition, before the summary, but the kind of summary is to copy someone else's article, summed up do not want to see the second time, so it is easy to forget!

Original Several types of file transfer commands in Linux sz RZ sftp SCP Introduction

Several types of file transfer commands in Linux sz RZ sftp SCP Introduction1.sftpSecure FTPis a file transfer management tool based on SSH security protocol. Because it is based on SSH, the user's password, data and other sensitive information will

Use cross-compilation on Linux hosts to port U-boot to Raspberry Pi

0 environmentLinux hosts os:ubuntu14.04 64-bit, running on WMware workstation 10 virtual machinesRaspberry Pi Version: Raspberry Pi 2 Type B.Raspberry Pi Os:debian Jessie Raspbian Jessie1 Raspberry Pi Start-up processThe boot process of the

An explanation of LDAP deployment under Linux

An explanation of LDAP deployment under Linux1.LDAP Server Installation[Email protected] ldap]# vim/etc/hosts #本地解析域名1.1.1.13 willow.comInstalling LDAP-related software :OpenLDAP, openldap-servers, openldap-clients[email protected] ~]# Yum

Teach you to mount Google Drive on Linux with Google-drive-ocamlfuse

If you're looking for a convenient way to mount your Google Drive folder on a Linux machine, Jack Wallen will teach you how to use Google-drive-ocamlfuse to mount Google Drive. Google has not yet released a Linux version of the Google Drive app,

One of Linux getting Started step-by-step installation system

1 Introduction 2 Pre-installation preparations download vmware workstation Download the files required for Gentoo knowledge points 1 We have downloaded a x86 architecture-based installation package

Linux under Rename Usage--Batch Rename

There are two versions of the Linux Rename command, one in C and one in Perl, and the earlier Linux distributions are basically in the C language, and it's hard to see the C language version, because of historical reasons, in the Perl language

Summary of common help man,whatis,info,help under Linux systems

1, manA interface to the on-line reference manuals, a query interface on the online reference manual, enables us to learn the process of China's longest one help command.GrammarMan [options] ParameterThe number parameter that follows the man command

Linux, kernel source, kernel compilation and configuration, kernel module development, kernel boot process

How is Linux composed?A: Linux is made up of user space and kernel spaceWhy divide user space and kernel space?A: For CPU architectures, each processor can have multiple modes, and Linux is a partition that takes into account the system'sSecurity,

Interesting Linux Command line Tricks and Tips Worth knowing

I passionately enjoy working with commands as they offer + control over a Linux system than GUIs (graphical User Interfa CES) applications, therefore am always on the look out to discover or figure out interesting ways and ideas to make Linux

MAC Address Spoofing on Linux

MAC Address Spoofing on LinuxGuideThe NIC manufacturer marks a 48-bit GUID on each NIC (NIC) when it leaves the factory. This GUID is the MAC address of the NIC, used to determine the identity of a network card. The 24-bit high MAC address is called

Run the MongoDB microservice on Docker and Kubernetes

Run the MongoDB microservice on Docker and KubernetesGuideDocker is an open-source application container engine that allows developers to package their applications and dependencies to a portable container and then publish them to any popular Linux

Shell script programming and file system Repair

Shell script programming and file system RepairGuideThe Linux Foundation has initiated the LFCS certification (Linux Foundation Certification System Administrator) Linux Foundation Certified Sysadmin, which is a brand new certification system, the

Design of a scheduled task using crontab in CentOS

Design of a scheduled task using crontab in CentOS The at command is for a task that only runs once and runs cyclically scheduled tasks. In linux, cron (crond) is the system service. The Linux system has a lot of planned work, so this system service

Implementation framework and Application of ethtool in Linux

Implementation framework and Application of ethtool in Linux A notable feature of Linux is its powerful network function. Linux supports almost all network protocols and provides a wide range of applications based on these protocols. The importance

Use Kubernetes to manage containers on centos 7

Use Kubernetes to manage containers on centos 71. Preface The previous section describes the Kubernetes system architecture, which gives you a preliminary understanding of Kubernetes. However, you may not know how to use Kubernetes. This article

Total Pages: 5467 1 .... 98 99 100 101 102 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.