At work, we need to record every command that the user executes and send it to the log server, and I have done a simple solution. This scheme sends every command executed by the user to the log daemon rsyslogd every time the user exits the login,
I/O problem is always a difficult problem to locate, today, the online environment encountered I/O caused by the CPU load problem, see the following this relatively good article, after dinner I still in and tomatoes and cucumbers on the road to lose
mkdir commands that we use a lot more when we operate Linux operations and Web deployments, primarily to create a directory folder that you specify. For example, Chiang Kai-shek in the previous blog article mentioned in the download data hard disk,
Grammar free (options) 1. Command format: free [parameters] 2. Command function: The free command displays the system's use and idle memory, including physical memory, interactive area memory (swap), and kernel buffer memory. Shared memory will be
Explain if you are configuring your network.
[Root@arch ~]# ls/sys/class/net/#查看有哪些可用网络eno16777736 Lo[Root@arch ~]# ip addr add 1.1.1.21/24 dev eno16777736 #给接口eno16777736配置ip为1.1.1.21 Subnet Mask bit 255.255.255.0[Root@arch ~]# IP link set eno16777
Method one, with parameters directly behind the command
Use the wget command to set up an HTTP proxy
wget http://www.baidu.com/-E use_proxy=yes-e http_proxy=yourproxy.com:port
Other additional parameters are necessary for downloading HTTPS files.
The first type of wget direct download: Run the CRONTAB-E command on the remote server to add a timed task 7 * * * * cd/home/backup/&&wget http://Source server ip/xxx_$ (date +%y%m%d). tar.gz (Automatically download to backup directory at 7:30 every
Linux Default login mode is the account and password login, if you change to use a key to log in will be relatively safe, but the key to landing a good and bad, want to login VPS must carry a key file, if modified the default root username also need
Today there is nothing to say to everyone about Linux installation SSH2 expansion, want to install under the WinDOS but PHP expansion can not find, tears running ...So I can only do experiments in Linux, but all the same,,,,
Download Address
wget
Today, my varnish carried out a small pressure test, 40s 8000 concurrency, no failure, an estimate can withstand a greater concurrency, not to mention varnish, I recently found a high percentage of squid profile, of course, squid3.0 configuration
RPM Execution Installation package
Binary package (Binary) as well as source code package (sources) two. The binary package can be installed directly on the computer, and the source code package will be automatically compiled and installed by RPM.
Another disadvantage of "Postfix", which is widely used in mail services, is much less, or it is designed to address the shortcomings of sendmail. Corresponding to the shortcomings of SendMail, it is also relatively mature in all aspects. Therefore,
SignatureA long time ago, I used a CMS to build a site, collected some content, then did not care, became a no one maintenance of the garbage station. Yesterday, occasionally found that the site did not know when the black chain was hung, the site
If there is no FTP prompt:-bash:ftp:command not foundPlease install the FTP application first: Yum install FTP#ftp 127.0.0.1 21 Enter the FTP IP and port number of the remote space, carriage returnThen enter the user name and password according to
I. Introduction to Chakra Linxu
Chakra Linux is a user-friendly, powerful release and bootable CD-ROM, based on Arch Linux. Features include a graphical installer, automated hardware detection and configuration, the latest KDE desktop, and a wide
Use Iptables to set the maximum number of connection requests within a specified time for a single client, exceeding the restricted direct drop
The code is as follows
Copy Code
Iptables-a input-p tcp–dport 80-m
Guessing the man handbook should have these three-time instructions, so try man atime, and man st_atime have no relevant documentation. After
To think of stat can see the file of these three time, use the man stat lookup, although there are
1. Allow to pass through a port at one end
Vi/etc/sysconfig/iptables
-A input-m state--state new-m tcp-p TCP--dport 80-j ACCEPT (allow 80 ports through the firewall)
/etc/init.d/iptables restart
#最后重启防火墙使配置生效
Allow only specific IP access to a
I. Introduction (do not want to see directly can skip)Migrate Emos servers, the new server has been completed after the test, and then very important work is to complete the old mail system in the mail data migration, the choice of copy of the way
using the Extundelete plugin
Suppose the deleted file is located in the/media/backup, and the mounted device is/DEV/SDA3.
First, mount the current disk again.
Then install the Extundelete dependent package,
The code is as follows
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service