diy linux server

Discover diy linux server, include the articles, news, trends, analysis and practical advice about diy linux server on alibabacloud.com

How to build a simple Linux Server

located instead of MBR during installation. Then, use the boot disk to start Linux, mount the Windows partition to/mnt/dos. Then run dd if =/dev/hda? Bs = 512 count = 1 of =/mnt/dos/bootsect. lin, so a bootsect is available in the Windows partition. lin file, which records the Linux partition boot information, and then in the Windows nt startup configuration file boot. add C: BOOTSECT to ini. LIN = "Red Ha

Build your own webmaster-WWW on a LINUX Server

Website administrator-LINUX Server SETUP-WWW-Linux Enterprise Application-Linux server application information. For more information, see the following section. ++ ++ Body ++ ++ If you are a Linux enthusiast, you may have master

Linux server security audit tools and procedures

Today, many Linux servers are not just deployed on new machines. Professional Linux system administrators perform regular maintenance. It technicians often have to take full responsibility for the security of their own servers. if your server is intruded, not only will all sensitive information be exposed, but the server

FAQs about FTP server deployment on Linux

Article title: FAQs about FTP server deployment on Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. The File Transfer Protocol (FTP) is a common method for transferring files

Linux Server adventure using lighttpd

Linux Server adventure: Use lighttpd-Linux Enterprise Application-Linux server application information. The following is a detailed description. I. Why lighttpd? Isn't apache acceptable? When only static objects are supported, such as video clips and files, Lighttpd is faste

SSH key login makes Linux vps/server more secure

As PHP becomes more popular, Linux vps/servers are used more and more, and Linux security issues need to be enhanced, if you install denyhosts and set up email reminders, you may be subject to several letters each day denyhosts The reporting will come to break the SSH password IP join/etc/hosts.deny. There are two types of Linux ssh logins: 1, the use of passwo

Improve VSFTP server security in Linux

Article Title: improve the security of VSFTP servers in Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. FTP is an old character in Internet applications, which facilitates file sharing among enterprise users. However, t

VNC Remote Management Linux Server Security Guide

Article Title: VNC remote management of Linux server security guide. Linux is a technology channel of the IT lab in China. Including desktop applications, Linux system management, kernel research, embedded systems and open source, and other basic categories in the Open Source Field, remote control technology is represe

Configuring a syslog server on Linux

A syslog server can be used as a log monitoring center in a network, and all the facilities that can send logs over the network (including Linux or Windows servers, routers, switches, and other hosts) can send logs to it. By setting up a syslog server, logs sent by different facilities/hosts can be filtered and merged into a separate location, making it easier fo

Competition among several major linux Server versions

Enterprises need reliability, stability, and compatibility. There is no doubt that enterprise owners favor this situation: this is also the goal of their efforts. Business owners who spend time looking for free and low-cost solutions can also find the right option for them. In terms of software, the Linux operating system topped the list. From the perspective of more than 100 available products, Linux 1. Re

Linux Server Security Configuration _linux

The first part: RedHat Linux Chapter 1. Overview Linux Server version: RedHat Linux as For an open operating system---Linux, system security settings include minimizing system services, restricting remote access, hiding important data, patching security vulnerabilities, adop

Building an efficient FTP server with Linux

the same direction, and the client initiates a connection to the server for data transfer. The client's connection port is the port to use when initiating the data connection request. When an FTP client accesses an FTP server outside the firewall, it needs to use the passive transfer mode. 3. Single port mode In addition to the above two modes, there is also a single port mode. The data connection reques

Use ten commands to check Linux server performance within one minute

Use ten commands to check Linux server performance within one minute If the load on your Linux Server suddenly surges and an alert message is sent to your mobile phone, how can I find out the Linux performance problem in the shortest time? Let's take a look at this blog post

SSH key logon makes Linux VPS/server more secure

As PHP becomes more and more popular, Linux VPS/servers are used more and more, and Linux security issues need to be strengthened. If you have installed DenyHosts and set up email reminders, you may receive several DenyHosts reports every day to add the IP address that is used to crack the SSH password to/etc/hosts. deny. There are two types of Linux SSH Logon: 1

Linux Server NIC Driver Installation and troubleshooting (figure)

Article Title: Linux Server NIC Driver Installation and troubleshooting (figure ). Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.    3. Set an IP address for the new Nic    An alia

Linux Server program specification

In addition to network communication, the server program must also take into account many other details of the problem, fragmented, but basically the template-style. ——— cited Linux server programs typically run in the background. Daemon is also known as the daemon process. It does not control the terminal and therefore does not accidentally accept user

Set up a DHCP server in Linux

Set up a DHCP server in Linux-Linux Enterprise Application-Linux server application information. For details, refer to the following section. Original: Actors I was studying how to set up a DNS server. I have been reading a DNS b

Check ten popular Linux Server releases

As you know, Linux is a hot Data Center server operating system. You also know that it can help you save on licensing and maintenance costs. However, in the face of the numerous Linux versions on the market, which operating system will you choose as a server? I listed ten popular L

Security Protection for Linux server platforms

Many enterprises and organizations on the Internet use Linux as the server platform. When these servers are connected to the Internet to provide application services, they will inevitably become the targets of attacks. This article discusses some basic knowledge about Linux System Security Configuration to help you protect the

Linux server security audit tools and procedures

Today, many Linux servers are not just deployed on new machines. Professional Linux system administrators perform regular maintenance. It technicians often have to take full responsibility for the security of their own servers. if your server is intruded, not only is all sensitive information exposed, but the server it

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.