Article Title: Create ?? Secure Linux server? Ops? Inux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
To create a Secure Linux server, you must first understand the meaning of the confi
Secure Management of your remote Ubuntu server-Linux Enterprise Application-Linux server application information. See the following for details. To securely manage your remote Ubuntu server, you need to install the SSH server. SSH provides you with an encrypted channel to lo
How to build a Secure Linux ServerTo create a Secure Linux server, you must first understand the meaning of the configuration files related to network services in the Linux environment and how to configure security. In Linux, the TCP/IP network is configured through several text files. You may need to edit these files to complete networking, however, most of thes
/nginx/html-user Nginx
Make sure you have more ownership of root or other users, a typical permission setting
/usr/local/nginx/html/
Ls-l/usr/local/nginx/html/
Example output:
-rw-r–r–1 root root 925 Jan 3 00:50 error4xx.html
-rw-r–r–1 root root, Jan 3 10:00am error5xx.html
-rw-r–r–1 root root 134 Jan 3 00:52 index.html
To delete a backup file created by vi or another text editor:
# Find/nginx-name '.? * '-not-name ht*-or-name ' *~ '-or-name
-name ‘*.old*’Delete these files by using the-delete option of the Find command.10, limit the Nginx connection outgoingHackers will use tools such as wget to download your server's local files. Use Iptables to block outgoing connections from Nginx users. The Ipt_owner module attempts to match the creator of the locally generated packet. In the example below, only user users are allowed to use the 80 connection outside.# /sbin/iptables -A OUTPUT -o eth0 -m owner –uid-owner vivek -p tcp –dport 80
Article Title: Use SRP to establish secure LinuxTelnet Server 2. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
(8) The PAM Authentication Module provides authentication information to applications through the PAM library.
(9) after the authentication is completed, t
You may try to access this website from a secure browser on the server. Enable the script and reload this page.You may try to access this website from a secure browser on the server. Enable the script and reload this page. I use an account in the Admin group to log on to the SharePoint2010
This blog is primarily for Eclipse-C, C + + open an existing project, and for use with the FileZilla and secure CRT.Open an existing project for the Eclipse for C, C + +1. In the menu bar file drop-down box, select "Import", it can be implemented to open an existing project. As shown in.Finally, click "Apply" and "Finish".Eclipse for C, C + +, and FileZilla are used in conjunction with the secure CRT.Compil
As we all know, network security is a very important topic, and servers are the most critical link in network security. Linux is considered to be a safer Internet server. As an open-source operating system, once a security vulnerability is found in Linux, volunteers from around the world on the Internet will actively fix it. However, system administrators often cannot obtain and correct information in a timely manner, which gives hackers an opportunit
Like other large software, the BINDDNS server also has many problems due to its large size and complicated functions. Therefore, the number of system intrusions targeting the BIND Security Vulnerabilities is also greatly increased, and the most serious one can even obtain all remote control of the target host. Because the DNS server host has a great impact on the network system, it is also crucial to avoid
As Linux small white, only learn a little bit to remember:When deploying a server, it is often necessary to view the console output as if it were local, to be able to view log output overrides on Linux, and, of course, to have the logs displayed in real time in the Command window by command, which is useful for me that is used to Windows:Tail Command:function: The tail command is used to display the end lines of a text file. examples are as follows:Ta
In the previous article to ensure that Linux VPS and server more secure Xshell set key login article has been shared to Xshell use the key to login to our VPS server to ensure the safety of the machine, but many students are not like the old left with Xshell, There are still a lot of use putty login ssh, so a separate article to share with Putty set the key to lo
Tags: Step access default port server handles archive throttling security commands1, point SQL Server error log, right-click, configure, limit the number of error logs, such as 6 limit log growth2. Then run the command:EXEC Sp_cycle_errorlog;The purpose of this command is to archive the current log, and then create a new log. Because the number of logs is limited to 6, the old log is recycled as long as you
: This article mainly introduces how to use PHP to implement an efficient and secure ftp server (1). If you are interested in the PHP Tutorial, refer to it. Abstract:
This article mainly describes how to use the swoole extension of PHP to implement ftp servers, while also extending the ftp server's personalized functions and security. Implement an ftp server tha
Use rssh to create a secure file server
At present, the company needs a Linux server as a file server, but based on security considerations, I do not want to use ftp or samba, but must allow users to upload files. What should we do?
Because it is a Linux server, you can use
concerned about the likelihood that other users on that machine will have access to the data directory.
Here's what you want to protect:
Database files. It is obvious that you want to maintain the confidentiality of databases maintained by the server. The owner of the database usually takes into account the proprietary nature of the database content. Even if they do not consider it, the most important is to make the content of the database public,
socket '/var/run/mysqld. Sock' (2) in/var/www/MySQL. php on line 2
However, we can see that mysqld exists under/var/run/mysqld. the sock file is actually because we already have chroot Apache. He can only access the items in Apache Root jail, that is, the items under/var/chroot/Apache, and mysqld. sock is obviously outside jail, so it is normal that the connection fails. The solution to this problem is also very simple. Just make a hard connection.[Root @ Debian/Apache/var/run/mysqld] ln/var/ru
|+-conf|||+-config.php//ftp configuration file|+-SSL.CRT//SSL Certificate|+-ssl.key//ssl Key|+-inc|||+-csmtp.php//smtp e- Mail class for FTP password sending and resetting|+-sharememory.php//Shared memory operation class|+-user.php//user management, file Rights Management, IP access control|+-logs//log file|+-reference//reference documents|+-web|||+-wwwroot//ftp Web Administration Web site|+-cwebserver.php//ftp built-in HTTP server|+-cftpserver.php//F
HTTPS Secure Communication Based on Nginx server and iOS9Introduction
In network communication, packet capture software can be used to analyze network requests and replay attacks. The replay attack solution generally uses a changed parameter, such as the RSA encrypted timestamp, however, considering the network transmission latency, the timestamp must have a certain error margin, so that it still cannot fun
) this.width=650; "src=" http://img.blog.csdn.net/20150724113917131 "alt=" here write a picture describing "title=" "style=" border:none; "/ >650) this.width=650; "src=" http://img.blog.csdn.net/20150724113926769 "alt=" here write a picture describing "title=" "style=" border:none; "/ >Then click "Add Monitoring Project", you can select the monitoring project for this server, for Linux server, monitoring Ba
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.