Install yum install iptables-services on Linux systems
Then Vi/etc/sysconfig/iptables
# generated by Iptables-save v1.4.7 on Sun Aug 28 12:14:02 2016*filter: INPUT ACCEPT [0:0]: FORWARD ACCEPT [0:0]: OUTPUT ACCEPT [0:0]-N Whitelist-A whitelist-s 8.8.8.8-j ACCEPT-A whitelist-s x.x.x.x-j ACCEPT
-A whitelist-s x.x.x.x-j ACCEPT
-A whitelist-s x.x.x.x-j ACCEPT
-A whitelist-s x.x.x.x-j ACCEPT
-A whitelist-s x.x.x.x-j ACCEPT-A input-m state--state related,es
When looking at the Linux kernel source code, the struct List_head structure is often seen in some structures. Look for the source code, in the List.h, there is a definition of this structure, this is the Linux kernel of the linked list structure.With a closer look at the structure, you can see that it is quite different from the
Log listDescribes the log files and descriptions that are common to SUSE Linux operating systems.The list of log files common to SuSE Linux operating systems is shown in table 1.Table 1 SuSE Linux common Log list logDescription/var/log/boot.msgThe screen information that is
I'm using two sets . LinuxLinuxa IP : 192.168.10.101LINUXB IP : 192.168.10.102First, we are Linuxa Mount the optical drive and install FTP Serverthen install FTP server (on the same platform, i.e. Linuxa on)Modify FTP The main configuration file (add a word anon_root=/media/cdrom/packages )Last to configure LINUXB on the Yum Listinto the /etc/yum.repos.d/ this directoryModify (vi Centos-media.repo) fileHere I'll talk about where to modify! (First change the baseurl back to:baseurl=ftp://ftp 192.
Tags: default specify binary Change subdirectory-system Administration topic reserved? A user is a collection of permissions that can obtain system resources. Users in Linux can be categorized into three categories:1. Root user (Root): Users with full system privileges;2. Ordinary users: their access to the system is limited by a certain extent;3. System users: Also known as virtual users, is to protect the system operation of users, generally not thr
execution of the file. The user ID bit of the "u+s" setting file , "G+s" sets the group ID bit. T: Meaning to save the program's text to the swap device3. Changes to file permissions:Use command: chmod file permissions file name [-R]Two uses of the command:(1) Directly assign the appropriate permissions to the file is:[HTML]
chmod a+x Auth.log #含义为 giving the owner executable permission to the Auth.log file
chmod a+x auth.log (2) Use digital instead of permissions:Fo
Facl:filesystem Acess Control ListLinux (and other POSIX-compatible operating systems such as UNIX) has a permission-control method called access control lists (ACLs), which is a universal paradigm outside of the allocation of permissions. For example, by default you need to confirm 3 permission groups: Owner, group, and other. Instead of using ACLs to save additional access control with file extension attributes, you can add permissions to other users or groups, not just simple "other" or group
/aUthorized_keys Front plus # shield off, passwordauthentication no change to Yes on it. Third, if there is still a problem, that one in the following way to solve: With the command ssh-l username Hostname1are you sure the want to continue connecting (yes/no)? 1, this is SSH security authentication is a R SA certification. You must select Yes to connect here. After the first yes, he will ask if you permanently add this RSA authentication to the local, select Yes, and no more reminders will appea
The Linux kernel defines the list_head data structure. The fields next and Prev indicate the forward and backward pointer elements of the universal two-way linked list, respectively. List--head (list_name): Create a New linked list list_add (n, p): insert the elements pointed to by N into the specific elements pointed
Linux kernel code, a lot of online, such as http://docs.huihoo.com/doxygen/linux/kernel/3.7/include_2linux_2types_8h_source.htmlOrHttp://lxr.free-electrons.com/source/drivers/gpu/drm/radeon/mkregtable.cMost of the two-way linked list operations are basically defined in this file.Analysis of this file.First macro definition, gets the offset of a member variable in
Also, let's take a look at my Linux toys list.
By:
Wu Yin
Date:
2008-01-31
Homepage:
Http://blog.csdn.net/wooin
Email:
Lazy_fox # msn.com
Copyright information:
This article is copyrighted by Wu Yin and his lovely wife. It can be freely transmitted and replicated for non-commercial purposes. For commercial purposes, any behavior in this article sha
List of Linux system boot processes
Load the BIOS hardware information and perform a self-test. Then the first bootable device is obtained according to the setup;
Read and run the boot loader of the first MBR (Master boot record, master boot partition) within the boot device;
Load Kernel,kernel to detect hardware and load drivers according to bootloader settings;
After the hardware driver suc
The Code referenced in this article comes from LXR, And the analyzed kernel version is v2.6.31.
The Linux kernel Implements similar operations on different types of cyclic linked lists by defining list_head and a group of operations on list_head. This avoids repeated operation functions for cyclic linked lists of different data types, the Code is fully used and is a very effective programming method.
List_head definition:
19 struct list_head {
20 stru
value of ECX is 0. The value of ECX is derived from eax, while the value of EAX is derived from ebp+0xc. Because the this pointer is placed on the ebp+0x8, ebp+0xc places the first argument.by Bits/stl_list.h:void Hook (_list_node_base * const __position);It is __position that the value of _prev is 0. So where did __position come from?Based on the functions in the stack and stl_list.h: void _m_insert (iterator __position, const value_type __x) { _node* __tmp = _m_creat
same situation occurs, so we need to modify the/etc/sysconfig/iptables-config file,[Email protected] soft]# Vi/etc/sysconfig/iptables-config# Load Additional iptables modules (NAT helpers)# Default:-none-# Space separated list of NAT helpers (e.g. ' ip_nat_ftp Ip_nat_irc '), which# is loaded after the firewall rules is applied. Options for the helpers is# stored in/etc/modprobe.conf.Iptables_modules= ""# Unload modules on restart and stop# Value:yes|
Telnet ==>[email protected]. ssh]# SSH 192.168.9.10warning:permanently added ' 192.168.9.10 ' (RSA) to the list of known hosts.Last Login:fri Sep 15:37:49 from 192.168.9.11Reported Warning:permanently added (RSA) to the list of known hosts errorbecause: when SSH is executed , the known_hosts file is not generated under the ~/.ssh of this machine . Solution:# Vi/etc/ssh/ssh_config// Note is the client se
Tags: GPO information routing port Get query virtual terminal attach receiveLinux Basic Network Command listOrganize the list of common network commands under Linux for quick access.Connectivity ofPing Telnet 7--echo Port25--SMTP, for sending mail79--finger provides information about other users on the network.ArpARP is used to convert an IP address to an Ethernet address. The root user can add and remove A
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.