Author: Liu Zhiyong Guo conghui
For those with a large number of accounts and BUSY systemsLinuxIn terms of the system, its log files are extremely large, and a lot of useless information will overwhelm the noteworthy information, causing great inconvenience to the user to analyze logs. There are some tools dedicated to log analysis, such as logcheck and friends.
Logcheck is used to analyze a large log file,
For Linux systems with a large number of accounts and BUSY systems, their log files are extremely large, and a lot of useless information will overwhelm the information worth noting, this makes log analysis inconvenient. There are some tools dedicated to log analysis, such as Logcheck and Friends.Logcheck is used to analyze a large log file, filter out log items with potential security risks or other abnormal conditions, and then notify the specified
/passwd command to run the Crack password.
John can also Crack the password generated by htpasswd to verify apache users. If you use htpasswd-capachepasswduser to create a user and generate a password, you can also use johnapachepasswd to guess. John output the password on the terminal when he guessed it, and stored the password in the john. pot file.
Another passwordCracker is the classic Cracker you know. Home Page in http://www.users.dircon.co.uk /~ Crypto/
Linux Network Security Tool-
some of the security layers are damaged, many security layers can independently apply to provide some additional defense. Is a multi-layered system security model.
Each layer in the chart provides additional data protection for the previous layer. For example, the first layer is the firewall. If the firewall does not block external intrusion attempts, the second layer-port daemon will provide additional protection. Further, the security system is the LIDS and
layer in the chart provides additional data protection for the previous layer. For example, the first layer is the firewall. If the firewall does not block external intrusion attempts, the second layer-port daemon will provide additional protection. Further, the security system is the lids and logcheck programs, which are also protected when intrusion attempts are not intercepted by Layer 2.
Monitor current connection
The first protection layer after
the Apache user, and if you create a user with htpasswd-c apachepasswd user and generate a password, you can also use John APACHEPASSWD to make a guess.
John guesses the password and prints it on the terminal and saves the guessed password in the John.pot file.
Another password cracker is the classic cracker that everyone knows.
Second, Logcheck
Logcheck is a tool for automatically checking system secu
check the log files for activity that violates security rules and exceptions. It first cut off the normal log information, keep some of the problematic logs, and then email the information to the system administrator. Logcheck uses the Logtail program to remember the location of the log file that was last read, and then starts processing the new log information from this location. Logcheck mainly consists
administrators to observe many different types of system logs without using command lines.
◆ V Log Analysis
LogWatch
Logwatch is used to parse system logs, locate any data that may indicate security risks or system errors, and send an email to the specified address. Logwatch and RetHat Enterprise Linux are released together. The following is a summary from the PRM description.
"LogWatch is a customizable log analysis system. LogWatch can parse system logs in a given period of time and create a
/logcheck/mvlog.sh"$server" "$expried _time Done}mvlogsThis allows you to release the control over time on the machine.CrontabTo modify the scheduled tasks under this user:Crontab-eView scheduled tasks under this userCrontab-lThe configuration is as follows: $ the sh /home/productscm/logcheck/mvlog. SH 2>1This is the logic that executes the above at 15:45 every day.*/1sh /home/productscm/
modern Linux versions, a small program named logrotate is used to help users manage log files and work with their own daemon processes. Logrotate periodically rotates log files. You can periodically rename each log file into a backup name, and then let its daemon process start to use a new copy of the log file. This is why many file names such as maillog, maillog.1, maillog.2, boot. log.1, and boot. log.2 are displayed under/var/log. It is driven by a configuration file, which is/etc/logroatate
vulnerabilities in the following three services. We strongly recommend that you close them.
Yppasswdd (NIS Server)
Ypserv (NIS Server)
Nfs (NFS server)
16. LINUX Firewall Security Configuration
System-config-securitylevel
17. LINUX system security tools
Sxid: Check the suid, sgid, and files without a master in the system.
Skey: one-time password Tool
Logrotate: A log loop Tool
Logcheck: log management tool
Swatch: A log management tool that is mo
Article Title: List of Linux security tools. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Sxid
Check the suid, sgid, and files without the master in the system.
Skey
One-time password Tool
Logrotate
Log loop Tool
Logcheck
Log Management Tools
Swatch
Log management tools, more real-time than
It's okay to tell you about Linux system security tools. Someone should want to know about Linux system security and so on. If you are not interested in this, you can skip this step.◆ Sxid: Check◆ Suid, sgid: And files without a master◆ Skey: one-time password Tool◆ Logrotate: log loop Tool◆ Logcheck: log management tool◆ Swatch: log management tool, which is more real-time than logcheck◆ Ssh (openssh): pro
configuration example of red Hat system, and explains the application method of Logrotate program in detail. You want to be helpful to all Linux system administrators. Manage well, analyze good log file is the first step of system security, in later article Freelamp also will introduce another check log of good East Logcheck. ================================================================== Example ===================================================
' (2)TroubleshootingA look at whether the database process startedThis error will also be reported if the database process is not started.The process is wrong.Two look at the configuration file of the socket file, and check the socket file exists, the permissions are correctThe location of the socket file in the configuration file is configured under/tmp/mysql.sockBut the error to go to/var/run/mysqld/mysqld.sock location to find the configuration file, the configuration file does not take effe
with tag ' update_copy ';}Backup Archive log:rman> list Archivelog all;rman> Backup Archivelog all delete all input;rman> list Archivelog all;rman> list backup;Maintenance of Backup:View:rman> list backup;rman> list copy; mirror copyRman> list Backup of tablespace users; table space corresponding data fileRman> list Backup of datafile 4;rman> list archivelog all; archive logCheck Backup:rman> Delete backup; Delete a backuprman> Delete copy;rman> list
First, whether the intrusion check1) Check the system logCheck the system error log, count the number of IP retries (last command is to view the system log, such as the system is reboot or logged in the situation)[Email protected] ~]# last2) Check the system userTo see if there is an exception for the system user[Email protected] ~]# CAT/ETC/PASSWDSee if new users are generated, UID and GID 0 users[[email protected] ~]# grep "0"/etc/passwdCheck the mo
Add controls manually add or drag in the layout add, add EditText after the layout is not good, the other controls easy to use, and then said the following paragraphException raised during rendering:java.lang.System.arraycopy ([Ci[cii) VException details is logged in Window > Show View > Error LogCheck the "Android version to use when rendering layouts" and make sure your ' re not using a version of ' ends in "W Droid Wear (e.g. API 20:android 4.4W).
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.