To modify the idea of root: Add a new user, and then set the user as root, so that we can login ssh to use the new user, this user only we know, this increased the difficulty of guessing, so the security of the VPS host further improved.
First, add
Document directory
Introduction to important Linux MySQL directories and logon passwords
Introduction to important Linux MySQL directories and logon passwords
Before giving you a detailed introduction to Linux MySQL, first let you know about
Linux is a multi-user and multi-task time-sharing operating system.
UserYou must first apply for an account from the system administrator and then enter the system as this account. The user's account helps the system administrator
UserTracking and
Solve the Problem of root User ftp login and telnet login in Linux-Linux Enterprise Application-Linux server application information. The following is a detailed description. 1. Solve the Problem of root User ftp login in Linux
Generally, for
Linux is a multi-user multi-tasking time-sharing operating system, all of which use system resourcesof usersMust first request an account from the system administrator, and then enter the system as the ID of the account. The user's account can help
Linux is a multi-userTick Operations for tasksSystem, all one to use system resourcesof usersThe system administrator must firstApply for an account, and then enter the system as the account ID. The user's account can help the system administrator
OriginalLinux is a multi-userTick Operations for tasksSystem, all one to use system resourcesof usersThe system administrator must firstApply for an account, and then enter the system as the account ID. The user's account can help the system
Modify the ssh port in Linux and disable remote root logon.
Modify the ssh port and disable remote root login in Linux
We all know that the default ssh port number is 22. To change the port number to 9688, You need to edit the/etc/ssh/ssh_config and/
User and User group management for LinuxLinux is a multi-user multi-tasking time-sharing operating system, all users who want to use the system resources must first request an account from the system administrator, and then enter the system as the
Recently rented a vultr Tokyo computer room VPS, every day will generate a lot of abnormal log logs, suspected of scanning software violence, so Google a bit of server security knowledge.Needless to say, the following procedure is recorded:Note: The
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.