This section is about two commands su and sudo are all about getting root permissionsThe parameters of the sudo band are-l-c-m-v, etc.-L gives Sudo permission for the current user-C Execute Command-V time stamp-M Delete timestampAnd then there's the Setup command for sudo.Usually use regular visudo.And then step by step, this doesn't easily cause a big mistake.You can also edit the configuration file/etc/sudoersAbout configuration formatsRoot AllThat's probably all I remember.20161128l04-08 old
Front User GroupAdd User Group commandGroupaddWe just need to remember some common parameters.Groupadd-g 8888 Syz #添加 GID 888 user GroupView grep syz/etc/group after adding completeThe point is, passwd, this command.Used to change the passwordPasswd-d This is the delete passwordWith passwd This command, root can change any user's password, and is not required to lose the original passwordPassword for other
Operational commands for some Linux usersUseradd Creating a userAddUser Creating a userpasswd Password Change commandUsermod Change the user name, and the user directoryUserdel Deleting a userID shows the user uid and GIDGroupadd Creating a user groupGroupdel Deleting a user groupGroupmod changing user group name informationGroups displays the group to which the user belongs/etc/skel When a user creates a n
This section also speaks of user and user group managementOr retry the previous user-limited issueCan be used chage can also use USERADD-EChage-l View the user's time limit and some other informationYou can also use USERMOD-E to set time limits.The old boy here said there are many commands to set up some of the same functionsBut all we have to do is use one of our habits and preferences.You don't have to remember anything.And then speaking of Userdel
This section is mainly about using scripts to build accounts in bulk#/bin/sh #这是脚本使用的命令, we're using the scripting language SH#authur: Arthur #作者#qq: 10000 #这是联系方式For num in ' seq 3 'DoUseradd $suerchars $numPasswd= ' date|md5sum|cut-c3-20 'echo "$passwd" |passwd--stdin $userchars $numEcho-e "User: $userchars $num\tpasswd: $passwd" >>/tmp/user.logSleep 1DoneEcho----------------------------------------Cat/tmp/user.log20161108l04-05 old boy Linux OPS tr
/etc/rc.localRc.local: After the system starts, it executes and is a script.1.2 About RHEL6 root account password recoveryBoot, or interrupt the system to startEdit kernel parameters, find startup Item, e edit--Select to Kernel (kernel line), E edit. --Add the parameter 1 or single at the end, enter confirm---Select to Kernell kernel line, b boot directly into single user mode no need to re-attach single user mode, go directly to system root, root account---> passwd Change password, reboot resta
Or is that sudo and su?When you log in with Su, add the following-Because of this, the environment variable will become the switch user'sThis can cause unnecessary trouble if you do not use environment variables.General Sudo is not allowed for remote logins, because passwords are plaintext and are very insecureBut you can use ssh-t [email protected] sudo-l this way to log inOkay, I'm done.20161129l04-09 old boy Linux OPS training-linux system user and
If Nginx + PHP-FPM combination is good, how to set the user group and user of PHP program, to ensure the security of program execution? If Nginx + PHP-FPM combination is good, how to set the user group and user of PHP program, to ensure the security of program execution?
Reply content:
If Nginx + PHP-FPM combination
The security group upgrade rule failed error: Rule "Security Group Sid (Security Identifier)" failed was reported in the forum today. This error occurs because the Windows Local Group Sid information created by SQL Server does not
' attribute, it is regarded as the top directory of the directory structure for Orlov block allocation.
U
Files can be deleted in reverse mode. The opposite is S!
X (suppressing underlying access)
Mark direct access to files
Z (Suppress dirty files)
Mark dirty files
Lsattr
Chattr
User:
Useradd
Usermod
Usedel
Passwd
Adduser
Deluser
Pwck
Pwconv
Pwuncov
ID
Whoami
Who am I
Who
Finger
Chfn
CHSH
/E
Aliyun How to authorize security group rules
The Authorization Security group rule allows or prohibits access to the public network and the inbound direction of an ECS instance associated with a security group. You can authorize
During the Golden Week of the 11 S, the group buying market was once again on fire. Group Buying promotions such as "smashing golden eggs" and "receiving red packets" were in full swing. However, according to the China Group Buying website security detection report released by the 360
Command Overview
(nova-api)[[emailprotected] /]# nova help|grep secgroup add-secgroup Add a Security Group to a server. list-secgroup List Security Group(s) of a server. remove-secgroup Remove a Security
Group Policy is used to configure multiple Microsoft Active Directory directory service users and computer objects from a single point. By default, the policy affects not only the objects in the container where the policy is applied, but also the objects in the child container.
Group Policy includes security settings under Computer Configuration, Windows settings
Group Policy is used to configure multiple Microsoft Active Directory directory service users and computer objects from a single point. By default, the policy affects not only the objects in the container where the policy is applied, but also the objects in the child container.
Group Policy includes security settings under Computer Configuration, Windows settings
security group
A security group is a logical grouping that consists of instances of the same domain (Region) that have the same security requirements and trust each other. Each instance belongs to at least one security
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.