My name Jiang Hao, after the old boy education 4-5 months of study, I must reach the salary of 12K, in order to achieve this goal I will take the following actions:1, multi-directional experienced people learn to ask!2, empty cup of mind, everything from zero start!3, do a good job of each lesson notes!4, working days on average at least 5 hours a day study time, weekend at least 8 hours!5, daily reasonable arrangement of time, less to do with the work of learning unrelated things!6, encountered
My name Yin Sihan , after the old boys education Viban 5-6 months of study, I must achieve the salary goal is 8 k, in order to achieve this goal I will take the following big action or plan: 1. strive for 3 hours of study per day for work reasons. 2. Review the notes every day, get into the habit of reviewing after class and previewing before class. 3. Follow the teacher's train of thought in class, listen carefully, look carefully, write. 4. do not ask for more questions until you understand
My name is strong, after the old boy education ops 5-6 months after the study, I must achieve the salary goal is 10000, in order to achieve this goal, I will take the following ten actions:1, on time class, not late, do not leave early2, carefully arrange their own time. 3, Pre-study before the preview4, make full use of classroom time, do not nap, do not wander5, after study to remember to review6, not playing computer games, dota,lol, etc.7, learn to affirm their courage to turn the lack into
Hello, teachers and classmates all good:I am the old boy education student Jingjing, is honored here and everybody acquaintance, hoped after the old boy education operation and maintenance class several months diligently study, can with everybody grows together progress together realizes the self-worth, I believe we in the old boy education led, One small step in IT operations can be a big step in the development of the IT industry, and what can we do to achieve such a meaningful goal and to emb
After the old boy education ops 5-6 months study, by the end of 16, the target salary is 8k-10k, in order to achieve this goal, I will take the following 10 actions:1, before learning to conduct self-analysis, clear learning purposes.2, correct learning attitude, change the past passive learning situation.3, listen carefully, remember good notes, not late, do not leave early.4, to do the pre-class preview, after class to ask the teacher for difficult questions.5, every night to ensure that work
Section III File operations
File attribute Ls–al (the first character of the filename is. for hidden files)Number of connections: How many file names are connected to the secondary node (i-node)Display the full time format: "Ls-l–full-time"File type permissions:-rwxrwx-The first file type: D-directory directory;-Files; l-link file link files; B-accessible random access device; C Serial Port deviceR Readable, W writable, x executable第2-4 for file owner rights, 5-7 for group permissions,
queue, and then call Schedule () to select and execute a different process.The process of waking up is just the opposite of the process being set to executable state, and then moving from the wait queue to the executable red-black tree.4.6 Preemption and Context switching4.6.1 User preemptionArises in the following cases:When the user space is returned from the system, when the user space is returned from the interrupt handler;4.6.2 kernel preemptionOccurs in the following situations:The interr
Http://edu.51cto.com/course/course_id-2199.htmlCourse ObjectivesFrom the perspective of "security", this paper introduces the Common Security optimization measures of red Hat Enterprise Linux Server System, the SELinux principle and application, port and vulnerability scanning, iptables firewall and other network security
As a system administrator, it is very important to perform a comprehensive security check on the system on a regular basis. Recently, some friends wrote that some inexplicable problems have occurred, for example, the biggest problem is that the network service is obviously slow, which is very likely to be attacked.
Practice has proved that the default installation is not safe for any system. In fact, no matter whether you use windows,
Microsoft recently said it would fix Windows security vulnerabilities to reduce new network-based security risks. However, security researchers said Linux/Mac OS Operating systems may have the same security risks.
Nathan McFeters, one of the
User account is the computer users of the credentials or identification, every person to access the system resources, must rely on his user account to enter the computer. In the Linux system, there are many mechanisms to ensure the proper and safe use of user accounts. It is the first step to ensure the security of Linux system that the user account is properly p
as: Intruders often look for/Etc/shadow directories or similar directories to see if they can find a backup of their password files.
Four, build their own shell account
After two or three two critical steps the intruder finally got the key password file and cracked the password. Now you can run the Telnet program and log on to the host. When you connect to the server, the server displays some of its information to you, typically U NIX, Linux, Aix, I
Although Linux and WindowsNT2000 are the same multi-user systems, there are many important differences between them. For many administrators who are used to Windows
Although Linux is a multi-user system like Windows NT/2000, there are many important differences between them. For many administrators who are used to Windows, there are many new challenges to ensure the sec
Although Linux is a multi-user system like Windows NT/2000, there are many important differences between them. For many administrators who are used to Windows, there are many new challenges to ensure the security and reliability of the Linux operating system. This article focuses on Linux system
read-only file, and the modification finishes saving to use "wq!" when exiting Command.If you want Zhangsan to execute only part of the command, you can specify the file path of the command that Zhangsan can execute in/etc/sudoers, and the file path of the command can be found through the which command.For example: Authorization Zhangsan can only execute useradd and Userdel commands.650) this.width=650; "title=" 1.jpg "alt=" wkiom1rnfr-htdpuaabxn2orjf8416.jpg "src=" http://s3.51cto.com/wyfs02/M
' attribute, it is regarded as the top directory of the directory structure for Orlov block allocation.
U
Files can be deleted in reverse mode. The opposite is S!
X (suppressing underlying access)
Mark direct access to files
Z (Suppress dirty files)
Mark dirty files
Lsattr
Chattr
User:
Useradd
Usermod
Usedel
Passwd
Adduser
Deluser
Pwck
Pwconv
Pwuncov
ID
Whoami
Who am I
Who
Finger
Chfn
CHSH
/E
Monitoring IntroductionMonitor cacti (RRDtool) drawing monitors network device traffic to show historical data functionsNagios Monitoring Service Status disk memory does not record data at a glance you can write your own scriptZabbixCacti installationRPM-IVH http://www.lishiming.net/data/attachment/forum/epel-release-6-8_32.noarch.rpmYum Install Epel-releaseYum install-y httpd php php-mysql mysql mysql-server mysql-devel php-gd libjpeg libjpeg-devel libpng Libpng-develThis article is from the "s
1. No ping
/etc/rc.d/rc.localEcho 1 >/proc/sys/net/ipv4/icmp_echo_ignore_all
2. Permissions control of user and password fileschmod 600/etc/passwdchmod 600/etc/shadowchmod 600/etc/groupchmod 600/etc/gshadow3. Add non-change attributes to the following fileChattr +i/etc/passwdChattr +i/etc/shadowChattr +i/etc/groupChattr +i/etc/gshadow4. Access Control for VSFTPVI Hosts.denyvsftpd:all– first to ban all VSFTP requests.VI Hosts.allowvsftpd:192.168.2.1– again allow the VSFTD request of Intranet5.
Linux has many advantages in function, price or performance, however, as an open operating system, it inevitably has some security problems. about how to solve these hidden dangers, to provide a safe operation platform for the application, this article will tell you some of the most basic, most commonly used, but also the most effective tricks.
Linux is a UNIX-li
Linux is a UNIX-like operating system. In theory, there is no significant security flaw in the design of UNIX itself. For years, the vast majority of security problems found on Unix operating systems exist primarily in individual programs, so most UNIX vendors claim to be able to solve these problems and provide a secure UNIX operating system. But
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.