We need to do some basic security when we have a VPS or server that has a Linux system open.
There are probably several areas:1. Prohibit root account ssh, use custom account ssh;This way, the hacker must first guess the account number, then can
SSH User logon log
The Linux login log is in the following directory:
The code is as follows
Copy Code
Cd/var/log
To view the login log for an SSH user:
The code is as follows
Copy Code
In the previous article to ensure that Linux VPS and server more secure Xshell set key login article has been shared to Xshell use the key to login to our VPS server to ensure the safety of the machine, but many students are not like the old left
Name: Jiangid:fuchen1994Date of experiment: 2016.3.13Experimental guidance
Open the shell with a virtual machine in the lab building
CD linuxkernel/
Qemu-kernel linux-3.18.6/arch/x86/boot/bzimage -initrd rootfs.img
Scene: Recently in the basic knowledge of Linux, the inevitable design to the Linux disk partition, before the summary, but the kind of summary is to copy someone else's article, summed up do not want to see the second time, so it is easy to forget!
Several types of file transfer commands in Linux sz RZ sftp SCP Introduction1.sftpSecure FTPis a file transfer management tool based on SSH security protocol. Because it is based on SSH, the user's password, data and other sensitive information will
0 environmentLinux hosts os:ubuntu14.04 64-bit, running on WMware workstation 10 virtual machinesRaspberry Pi Version: Raspberry Pi 2 Type B.Raspberry Pi Os:debian Jessie Raspbian Jessie1 Raspberry Pi Start-up processThe boot process of the
If you're looking for a convenient way to mount your Google Drive folder on a Linux machine, Jack Wallen will teach you how to use Google-drive-ocamlfuse to mount Google Drive. Google has not yet released a Linux version of the Google Drive app,
1 Introduction
2 Pre-installation preparations
download vmware workstation
Download the files required for Gentoo
knowledge points
1 We have downloaded a x86 architecture-based installation package
There are two versions of the Linux Rename command, one in C and one in Perl, and the earlier Linux distributions are basically in the C language, and it's hard to see the C language version, because of historical reasons, in the Perl language
1, manA interface to the on-line reference manuals, a query interface on the online reference manual, enables us to learn the process of China's longest one help command.GrammarMan [options] ParameterThe number parameter that follows the man command
How is Linux composed?A: Linux is made up of user space and kernel spaceWhy divide user space and kernel space?A: For CPU architectures, each processor can have multiple modes, and Linux is a partition that takes into account the system'sSecurity,
I passionately enjoy working with commands as they offer + control over a Linux system than GUIs (graphical User Interfa CES) applications, therefore am always on the look out to discover or figure out interesting ways and ideas to make Linux
MAC Address Spoofing on LinuxGuideThe NIC manufacturer marks a 48-bit GUID on each NIC (NIC) when it leaves the factory. This GUID is the MAC address of the NIC, used to determine the identity of a network card. The 24-bit high MAC address is called
Run the MongoDB microservice on Docker and KubernetesGuideDocker is an open-source application container engine that allows developers to package their applications and dependencies to a portable container and then publish them to any popular Linux
Shell script programming and file system RepairGuideThe Linux Foundation has initiated the LFCS certification (Linux Foundation Certification System Administrator) Linux Foundation Certified Sysadmin, which is a brand new certification system, the
Design of a scheduled task using crontab in CentOS
The at command is for a task that only runs once and runs cyclically scheduled tasks. In linux, cron (crond) is the system service. The Linux system has a lot of planned work, so this system service
Implementation framework and Application of ethtool in Linux
A notable feature of Linux is its powerful network function. Linux supports almost all network protocols and provides a wide range of applications based on these protocols. The importance
Use Kubernetes to manage containers on centos 71. Preface
The previous section describes the Kubernetes system architecture, which gives you a preliminary understanding of Kubernetes. However, you may not know how to use Kubernetes. This article
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.