In the open cloud host or VPS will provide you with remote information, remote information including cloud host IP, cloud host system user name and password, Windows system can use MSTSC for remote graphical page operation, Linux system can use SSH remote command form to operate, Linux needs to have a good foundation.
The following is an example of a mstsc.exe connection to a Windows 2003 server
General P
Installing rsyncPerform the following command installation:Apt-get install-y rsyncYou can then use the following command to see which files are installed:Dpkg-l rsyncConfiguring RsyncModify the corresponding content in the configuration file/etc/default/rsync as:Rsync_enable=trueAdd the configuration file/etc/rsyncd.conf, as follows:Port = 873UID = rootGID = rootUse chroot = yesRead Only = yesHosts allow=204.74.0.0/255.255.0.0Hosts deny=*Max connections = 5Log file =/var/log/rsyncd.logLog format
You can also set access permissions on the server for specific platforms, directories, and files. These permissions apply to all users regardless of the user's original access rights. For example, if you are updating the contents of a platform,VPS host then you can temporarily stop the platform Read permission to prevent users from accessing. If the user tries to access it, the
.conf.default.send_redirects = 1net.ipv4.conf.all.send_redirects = 0Net.ipv4.icmp_echo_ignore_broadcasts=1Net.ipv4.conf.default.forwarding=1
To bring into effect:
Sysctl-p
Reboot system
Reboot
Uname-r
If the installation is normal, it should appear as:
2.6.18-164.15.1.el5.028stab068.9
4. Installation vtonf
Yum-y Install vzpkg expect
wget http://mesh.
virtual devices.
Making Mirrors
Create a folder, such as d:\2008\win2008,2008 image decompression put this inside, and then build a virtio in the win2008 (D:\2008\win2008\virtio), the virtio of the image extracted into the inside.
Open ImgBurn, select the Mode-->build in the menu bar, and select the source folder and destination ISO address.
Modify the contents of the Options tab to change the file system value to UDF.
Start and stop of the IIS service:Click Start-Run, you can use the command to implement the control of IIS:IISReset restarting the IIS serviceIisreset/stop Stopping the IIS serviceIisreset/start starting the IIS serviceStart and stop of MySQL service:Click Start-Run, enter Services.msc, in the pop-up service window, find the MySQL service, directly click on the left side of the corresponding can be.You can also restart the command by using the same method as the command method for IIS:NET Stopmy
For its users and applications, each VPS platform runs and manages exactly the same as a stand-alone host, because each VPS can be restarted independently and has its own root access, user, IP address, memory, process, file, application, System function library, and configuration file.
VPS Server is the most important
cannot log on from a computer that does not have a key. Setting this option to "no" will prevent the "root" user from logging in, and can only use the "su" command to convert from ordinary users to "root".Passwordauthentication no #是否启用口令验证, setting this option to "No" only allows users to log on using a key based method. This, of course, brings trouble to users who often need to log on from different hosts, but this can improve the security of the system to a large extent. Password based logon
Web site Environment
LAMP. What is LAMP? It is Linux + Apache + MySQL + php/perl abbreviation, is a concise, strong, widely supported site environment. At home there seems to be a lot of people recommend to change A (Apache) to N (Nginx), but I do not recommend this, because Nginx relative to Apache, the support of PHP is worse, and lack of. htaccess directory-level configuration file support, rewrite function is not very Good. Most of all, LAMP is also an official recommended website environme
Then we manage the server when the WINDOSW system is more intuitive, how much CPU use, how much bandwidth memory used, etc. as long as in the Remote Desktop Task Manager at a glance. But in the Linux environment is not so easy, especially the server or VPS running is a large web site, if you can not find the server per
Every day, a series of data files are generated on the server, some of which are of great importance, but if we simply move the files, it will not be very good backup, here, we use Python to implement the cloud backup of the file.This program I use Python to write, borrowed the Sevencow library file, the use of the program is very simple.
First we can download this code file from GitHub, and we can take advantage of the git clone command.https:/
Detailed description of centos Nic configuration under the VPS server automatically activates the NIC and installs CENTOS 6. after X, you need to manually activate the NIC every time you start the system. The following methods can be used to automatically activate the NIC after the system starts. Cat/etc/sysconfig/network-scripts/ifcfg-eth0 DEVICE = "eth0" HWADDR = "00: 0C: 29: FC: 1C: 72 quot; NM_CONTROLL
VPS Linux Centos6.3 build a VPN (pptpd) Server 1. find the software package: Run wget http://poptop.sourceforge.net/yum/stable/packages/pptpd-1.3.4-2.el6.x86_64.rpm in Centos System (it seems sourceforge.net this I can not open this campus network, or OpenShift to download) 2. check System Support and install the ppp and iptables package. The latter is usually installed by default. Use the local yum source
We need to do some basic security when we have a VPS or server that has a Linux system open.
There are probably several areas:1. Prohibit root account ssh, use custom account ssh;This way, the hacker must first guess the account number, then can guess the password;2. Prohibit account login, use PubKey login;3. For IP ACLs, allow only a few specific IP access;4. SSH port Migration, change the default 22 por
Tags: systemPing tool can detect more domestic and foreign nodes of the ping speed, to a certain extent, ping speed is also more important, you can see the server drops, as well as the speed. For example, when we choose the United States VPS host, generally can be in the 200 speed is good. Dance on the tahskb of the friend Storm Emperor, the end of the marriage risk 8rwRzE turn pit along the more not the sa
) in the creation of the site will be FTP, MySQL has been created, so you can see the FTP has an account, if we need to create a look at the map alone to create users and point to the specified directory.
3. Create MySQL Database
Similarly, we can set up database users individually, or the site database is added when adding sites.
4. File Manager
The role of the file manager is relatively large, you can directly package the panel, extract files, improve efficiency.
5, fire
When the page opens, it appears if an error occurs. Processing method. Or shortly after landing, frequently returned to the login interface
Log in to server Error in '/' Application.
The code is as follows:
code is as follows
copy code
unable" to "the" Session "" "," "the Session state server. Please ensure this ASP.net state service are started and that the client and
confirm that the root has a scheduled task:sudo crontab -lIf a timed task already exists, you should back up the task by pipe:sudo sh -c ‘crontab -l > crontab.bad‘We can then edit this scheduled task:sudo crontab -eIf this is your first time running a scheduled task, it will ask which editor you want to open. If you don't have a custom editor, the Nano is a good choice.After opening the file, we can customize the tripwire of automation. Because we only need tripwire to run every day, we just ne
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.