linux security best practices

Read about linux security best practices, The latest news, videos, and discussion topics about linux security best practices from alibabacloud.com

Linux Shared memory practices (1)

descriptionShmaddr is in Null,linux and will automatically connect to that memory for the process (recommended)SHMADDR is not null and SHMFLG has no shm_rnd tag, the SHMADDR is the connection address.SHMADDR is not null and SHMFLG sets the shm_rnd tag, the connected address is automatically adjusted downward to an integer multiple of Shmlba. Formula: shmaddr-(shmaddr% Shmlba)shmflg=shm_rdonly, indicating that the connection operation is used for read

Linux security settings-linux Security Configuration

Linux security configuration, linux System Security Settings suggestions, you may encounter linux system security problems when learning the linux operating system, here we will introdu

Linux load Balancing concepts and practices (II.)

Build Practice lvs+keepalived Load BalancingKeepalived Overview1.keepalived is a powerful auxiliary tool specifically designed for LVS, mainly used to provide failover and health check function-to determine the LVS load Scheduler, node server availability, timely isolation and replacement of the new server, when the failed host to rejoin the cluster after recovery.Overview of the 2.keepalived hot-standby principle keepalived uses the VRRP (Virtual Routing Redundancy Protocol) hot-standby protoco

Original: routing configuration practices interconnection between two LAN hosts VM linux and vmlinux

Original: routing configuration practices interconnection between two LAN hosts VM linux and vmlinux I believe that the network is essential for every O M personnel and developers. Today we want to talk about how to divide the three virtual machines in the vmvm into two local networks to implement different local networks. interconnection: the AC in the figure below communicates with each other through hos

Linux diskless workstation practices

I. Remote Start Principle Before the client is started, there is neither an operating system nor a boot floppy disk or hard disk. It only has the basic components of the computer, such as CPU, memory, and motherboard. But the most important thing is to have the nic and bootrom started. The client can only obtain the operating system through the network. The diskless remote start technology in Linux is different from that in Novell and WinNT. Inste

Super-Large files uploaded to Azure Linux virtual machine best practices

Azure CLI on Linux, see:http://cloudapps.blog.51cto.com/3136598/18421817. On a Linux virtual machine, download the compressed file uploaded to the blob storage directly using the CLI command from Azure, in the same region, at a speed of approximately 30MB, but the actual speed depends on the network condition and the current load:# Azure Storage blob download upload full0606.zip.650) this.width=650; "Src="

C language basics Lesson 1 Linux environment configuration practices: httpserver and linuxhttpserver

C language basics Lesson 1 Linux environment configuration practices: httpserver and linuxhttpserver C language basics Lesson 1 Linux environment configuration small practice httpserver The first environment requires the redhat virtual machine operating system Enable redhat Firewall 2. Check WWW (HTTP) 3. Click apply. Click Yes. 4. Switch to the

Linux Common Comment in practices

standardGcc-o Test Test.c-lm-std=c99Convert the source file test.c to the appropriate assembler source file Test.sGcc-s test.c20. Time commandThis command is used to measure the execution time of a command (that is, a program). It's very simple to use, just like you would normally enter a command, but add a time to the front of the command, for example:time ./process time ps aux After the program or command has finished running, it outputs three times at the end, respectively:User: CPU time,

Linux System Management Practices (in): syslog System Log Configuration __linux

.*;/# news.=crit;news.=err;news.=notice;/# *.=debug;*.=info;/# *.=notice;*.=warn/dev/tty8 # Named pipe/dev/xconsole is used for Xconsloe tools. In order to use it, you must take the-file option to invoke the XConsole # $ xconsole-file/dev/xconsole [...] # Note: Adjust the list below, otherwise if you have a fairly busy site, you will get mad daemon.*;mail.* ;/news.err;/*.=debug;*.=info;/*.=notice;*.=warn |/dev/xconsole Some applications also log their health to a specific log file, which is not

Socket programming practices in Linux (7) I/O multiplexing technology-select model

Socket programming practices in Linux (7) I/O multiplexing technology-select model Before entering the topic of today's select model, let's take a look at the five I/O models: (1) blocking I/O (this method is used by default) In server socket programming, our common accpet and recv functions are blocked. Taking recv as an example: When the upper-layer application calls the recv system call, if the peer doe

Daily Docker practices under Linux

ContainerHello-world:1.docker Run Hello-world2. No image will automatically pull the image and then runRun Ubuntu in the Ubuntu Docker1.docker container run-p 6666:80-it dc86b7b90238 Bash//port map outside of 6666 to inside 802.docker container exec-it 3ce8952ce68d Bash//execute commands in a running container,-IRun CentOS in the Ubuntu Docker1.docker Pull Centos:62. Map the local port to the running container1) Docker commit 6e54eac36507 centos_image1//commits the container in the run as a mir

Linux Principles and practices

the input class number 4th ruleIptables-f Clear All RulesTopCommon operations:P: By CPU usage, M: Sort by memory usage, H: Show Help, Q: Exit1: Multi-CPU display, K: Kill Process, R: Set process nice levelView System health Status$ cat/proc/cpuinfo$ cat/proc/loadavgSoftware InstallationYum InstallationRPM InstallationSource Code Compilation InstallationCrontabCrontab: Perform tasks regularlyCrontab-e set up timed tasks:Basic format:      * CommandTime-sharing Week(0-59) hours (0-23) days (1-31)

LINUX-LN Command Best Practices

link will not copy the original file, it will only occupy a very small amount of disk space.2. Parameter description-F: Delete the file with the Dist file name at the end of the link-D: Allow system managers to hard-link their own directories-I: Ask before deleting the file with the Dist file name-N: When making a soft link, treat the dist as a generic file-S: Soft junction (symbolic Link)-V: Displays the file name before the link-B: Files that are overwritten or deleted at the time of the link

Read linux source code and practices

Read the linux source code and practices-general Linux technology-Linux programming and kernel information. The following is a detailed description. Next we will look at a piece of code: this code will be the beginning of an operating system. BOOTSEG = 0x07c0 Entry start Start: Jmpi go, BOOTSEG Go: mov ax, cs

Linux signal programming practices (1)

Linux signal programming practices (1)Interrupted Interruption is the system's response to asynchronous events. During code execution, the process can be interrupted at any time and then run the exception handling program; Computer System interruption scenario: interrupt source sends interrupt signal-> CPU determines whether the interrupt is blocked and protects the site-> CPU (query the interrupt vector ta

2016 edition of "Linux Cluster principles and practices" video tutorial online!

construction of Web cluster based on DRBD+GFS2 active/activePlanning and DesignPhase 1: Operating system InstallationPhase 2: Cluster component InstallationPhase 3: Cluster node preparationInstalling Apache ComponentsDual Master DRBD Resource PreparationConfigure StonthTo add a DRBD resource to a clusterTo add a clustered file system resource to a clusterTo add a VIP resource to a clusterAdding Apache resources to the clusterCluster testing9th chapter: Cluster resource managementConfiguring clu

Socket programming practices in Linux (2) introduction to basic socket programming APIs

Socket programming practices in Linux (2) introduction to basic socket programming APIs What is Socket? Socket originated from Unix, and one of the basic philosophies of Unix/Linux is "Everything is a file". You can use the "open-> read/write-> close" mode to operate. Socket is an implementation of this mode. socket is a special file, and some socket functions ar

Socket programming practices in Linux (5) solutions for setting socket I/O timeout

Socket programming practices in Linux (5) solutions for setting socket I/O timeout (1) Use the alarm function to set timeout #include unsigned int alarm(unsigned int seconds); Its main function is to set a signal transmission alarm. The signal SIGALRM is sent to the current process after the specified number of seconds in seconds. If the alarm function is called again within the scheduled uncomp

Linux practices-Weak passwords cause the server to be hacked

after the command is executed in the background. By these two points, it can be concluded that the server is black is sure, after that is a lengthy troubleshooting work. Delete the file, kill the process, check whether to set up automatic download, whether to add new users and so on. It took a while to delete the files, because an attack program was deleted and then rebuilt. It was almost like I was going to install the new system. Finally, I found a file that was exactly the same as the point

Linux-lsof Command Best Practices

Lsof IntroductionLsof (list open files) is a tool that lists open files for the current system. In a Linux environment, everything is in the form of files, with files that not only access regular data, but also access to network connectivity and hardware. So, such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) sockets, the system assigns a file descriptor to the application in the background, regardless of the nature of the fi

Total Pages: 15 1 .... 5 6 7 8 9 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.