In view of the exposure of the msdn plaintext password problem, various websites are reflecting on their neglect of network security, and some shameless websites are using this list to add their registered users, opportunities and Risks coexist. By the way, users will also raise security requirements for various software systems based on this incident. The security of software systems in the future will als
network environment, and the consequences will be even worse. Therefore, it is of practical significance to restrict user root remote logon to ensure the security of computer systems. This article introduces some methods to restrict remote root logon.
◆Method 1:
In the/etc/default/login file, add a set command line:
CONSOLE =/dev/tty01
The setting takes effect immediately without requiring a reboot. Later
user, use the hyphen (-) to indicate that the SU program is not only the user, in addition, you need to obtain the user's environment when logging on to the system.
Defense methods:
In UNIX systems, computer security systems are built on the authentication mechanism. If the root password is out of password, the system will be compromised, especially in the network environment, and the consequences will be
[MVC Study Notes] 6. Use Memcache + Cookie to solve shared login status in Distributed Systems, mvcmemcache
To solve the bottleneck of Single-host processing and enhance the availability of software, we need to deploy the software on multiple servers to enable multiple second-level subdomains in a frequent manner, deploy websites on independent servers based on business functions, or share multiple channels
Two systems placed on the same server are thinkphp and now share the login status. What should be done.
No clue.
Reply content:
Two systems placed on the same server are thinkphp and now share the login status. What should be done.No clue.
There are several solutions:
Using the same root domain name, such a
登陆Restart sshd service /etc/init.d/sshd RestartAnd then in the SECURECRT.650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/71/71/wKioL1XQpAOgRMhHAAEghqafxiA883.jpg "title=" 1.png " alt= "Wkiol1xqpaogrmhhaaeghqafxia883.jpg"/>Click Properties to locate the private key file that you just downloaded650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/71/75/wKiom1XQoiGwmde7AAFESpC-Cyg240.jpg "title=" 2.png " alt= "Wkiom1xqoigwmde7aafespc-cyg240.jpg"/>Then you can log in by secret key,
command is used to modify file attribute permissions, will be described in detail later . 2) Create file /Root/.ssh/authorized_keys [[email protected] ~]# vim/root/.ssh/authorized_keys vim command is a command to edit a text file, which is also described in detail in subsequent chapters . 3) to open the generatedPublic keyFile, it is recommended to use WordPad to open, so look comfortable some, copy fromAaaaStart to“----END SSH2 Public KEY----“All the content on the line, paste it into the/root
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.