When the system administrator is not in the data center, how can he continue to monitor and manage the Linux server and understand the running status of the Linux server. There are many ways to achieve remote management and monitoring of Linux servers. Here we mainly introduce the use of SrvReport, a
With the expansion of Linux enterprise applications, a large number of network servers use the Linux operating system. The security and performance of Linux servers have received increasing attention. Here we list the depth of att
The mail system is an important part of Linux network applications. The complete mail system includes the underlying operating system, the mail sending proxy MTA, the mail distribution proxy MDA, and The Mail User proxy MUA.
Currently, the main danger facing the Linux email system is spam, Linux virus, and DoS attacks. This article focuses on Anti-Spam policies f
email, the column type, high-brightness contrast text, table, and detailed list records are used to classify and record the operating status of the Linux server. By reading HTML emails, the Linux system administrator can easily understand the situation of Linux servers.
An overview of four types of attacks against Linux operating system servers-Linux Enterprise applications-Linux server applications. For more information, see the following section. With the expansion of Linux enterprise applications, a large number of network
Analysis: event records of one intrusion into Linux servers
This vulnerability is common in ColdFusion and content management systems. In some cases, a specific attack may succeed, and a high-value server may cause significant data leakage. In other cases, attackers can operate infected hosts on a large scale.
Recently, I noticed that multiple IP addresses were attempting to exploit a PHP vulnerability, So
shell scripts, refer to the following link:
Linux/Unix shell scripts call SQL and RMAN scripts
Passing variables between Linux/Unix shell SQL statements
1. Use ssh-keygen to generate a key for fast Login
To automatically execute scripts across servers, you must implement password-free automatic login before you can jump between multiple
Linux/Unix shell scripts Execute SQL statements across servers and instances during database O M, it is inevitable that you need to query databases across multiple servers and multiple Oracle instances. For example, you need to check the value of the open_cursor parameter in all current production environment databases to determine whether to increase the value.
.
System Environment: CentOS 5.2 Linux version 2.6.18-92. el5 (because my system version is new, you do not need to update and compile the kernel)NIC: eth0: 219. 237. ***. *** (one piece, it doesn't matter)
Check the MPPE of the system first. Basically, CentOS itself exists. If you see OK, you can continue. If you don't, you can simply go to other people's patch articles, which are everywhere on the Internet.Modprobe ppp-compress-18 echo OK
The CentO
192.168.0.0/24--dport 111-j ACCEPTIptables-a input-i eth0-p tcp-s 140.0.0.0/8--dport 111-j ACCEPTIptables-a input-i eth0-p udp-s 140.0.0.0/8--dport 111-j ACCEPT3, in order to prevent possible Dos attacks, it is necessary to set the NFSD copy number reasonably.4, modify/etc/hosts.allow and/etc/hosts.deny to limit the purpose of the client/etc/hosts.allowPortmap:192.168.0.0/255.255.255.0:allowPortmap:140.116.44.125:allow/etc/hosts.denyPortmap:ALL:deny5. Change the default NFS portNFS uses 111 por
Multiple remote linux servers are switched to the WEB system. multiple remote linux servers are used to build the LAMP environment. the database tables in mysql are the same. there are some differences between the WEB systems installed on each server. Various systems are difficult to manage. you need to log on to the W
Article Title: backup and recovery on Linux servers. Linux is a technology channel of the IT lab in China. Including desktop applications, Linux system management, kernel research, embedded systems, open source and other basic categories for general backup should be the highest priority for responsible system managers.
Item entry tool ---------Go to the download page
Violence rate modifier :---------Go to the download page
Experience modification tool :---------Go to the download page
List of shocking item codes ---------Go to view How to change the brute-force rate ---------Go to view
Earth-shattering task system ----------Go to view Important difficulties in setting up earth-shattering private servers --------Go t
CwRsyncServer enables Real-time Data Synchronization from Windows to Linux servers
Because the company has two Windows servers, the development usually uploads some data or modifies some things on these two servers during operation, the Linux server must be consistent with t
利用率,磁盘,内存页,内存对换,全部中断,接触开关以及赏赐自举时间
swaps
显示的是交换分区的使用情况
uptime
这个文件给出自从上次系统自举以来的秒数,以及其中有多少秒处于空闲
version
这个文件只有一行内容,说明正在运行的内核版本。可以用标准的编程方法进行分析获得所需的系统信息
下面本文的几个例子都是使用Python 脚本读取/proc the main file in the directory to implement实现对 Linux 服务器的监控的 。Using Python scripts to monitor Linux servers for CPU (ce
are mainstream in UNIX and Linux. If you want to intrude into these systems, you must have an understanding of them.Most of the commands used on DOS have corresponding commands on UNIX and Linux (because early dos Development draws on UNIX). The following list shows how to use shell accounts) the most important commands correspond to DOS commands:Help = HelpCP =
name service for host search, you must also inform the server of the name it uses. There is an independent file called resolv. conf. If the file does not exist or is empty, the parser assumes that the name server is on your local host. If you run a name server on your local host, you must set it separately. The most important option in resolv. conf is nameserver, which provides the IP address of the name server to be used. If you specify several name server
Define your own template based on the existing Linux monitoring template, and under the Templates page, select the Templates OS Linux , go in and click on " full clone" below to clone the template and name the template as " OS Linux , and then click ADD below to see the template defined in the template list
# Author li ning# Date 2015.11.30 00:41:35 Import sysimport Time "" "Principle: Linux system based on the principle of all documents, we can put any information as a string read into the analysis" "#若没有提供参数, here The default is the network card is eth0, according to their actual situation to connect parameters. Eg: (python get_net_infor.py eth1) If Len (sys.argv) > 1:interface = sys.argv[1]else:interface = "eth0" print "currently viewed NIC is:", Inte
As a Linux/unix system administrator, I often ask this question: What can shell do? PHP is so powerful, why not use PHP to complete the work? In fact, shell is mainly used for database backup (SVN backup), scheduled task (crontab), service status monitoring, and ftp remote backup compared with PHP development languages. For these tasks, shell is widely recognized as powerful, which is also one of the basics of every
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.