Since entering December, the DNS server recursive column high, after several days of analysis and processing, now the problem has been resolved, the specific content is as follows:Reason:1. The recent increase in DDoS attacks with the randomization
In the main configuration file/etc/named. conf, a root domain is defined. The zone file is the named. root file under the/var/named directory. It is a very important file that contains the name and IP address of the Internet root server. When the
Domain name root server suffered two large-scale attacks: 5 million attacks per second
In the early morning of January 1, December 11, Beijing time, the root servers of multiple domain name systems were attacked twice at the beginning of last week.
Upgrade Zabbix2.2 to Zabbix3.0.2 in CentOS
Upgrade Zabbix2.2 to Zabbix3.0.2 in Linux.
1. Operating System Environment[Root @ Server ~] # Cat/etc/issueCentOS release 6.4 (Final)Kernel \ r on an \ m[Root @ Server ~] # Uname-r2.6.32-358. el6.x86 _
Deployment background: a customer recently asked us to deploy a login stepping stone server in the company's IDC so that users can log on to the server in the IDC first, and then ssh to other servers. Specific requirements: 1) to maximize security,
SVN server has two ways to run: 1, independent server (for example: svn: // xxx.com/xxx); 2, with apache (for example: http://svn.xxx.com/xxx); in order not to rely on apache, I chose the first method: Independent svn server. The SVN storage version
System: Centos6.0
Introduction:
NIS (Network Information Services) was first Sun Yellow Pages (yp );
In a large domain, what if multiple Linux Hosts require the same account and password for each host? If you can have an account server to manage the
Security O & M: Use of Linux backdoor intrusion detection tools
1. Introduction to rootkit
Rootkit is the most common backdoor tool in Linux. It mainly replaces system files for intrusion and concealment. This Trojan is more dangerous and concealed
1. Configure DNS resolution
[Root @ server ~] #
CAT/etc/RedHat-release
Red Hat Enterprise Linux Server Release 6.2 (Santiago)
[Root @ server ~] #
Uname-R
2.6.32-220. el6.i686
[Root @ server ~] #
Yum install bind *-y
[Root @ server ~] #
This section will focus on the configuration of the next iptables, which is a tool to ensure network security, Iptables is based on the core firewall, built-in Filter,nat and mangle three tables, filter is responsible for filtering packets, NAT
First, the system security record file
The record file inside the operating system is an important clue to detect whether there is a network intrusion. If your system is connected directly to the Internet, you find that a lot of people do
The RHCE exam will be held next month. Therefore, it is important to record the details of the RHCE exam. Hope you can pass the RHCE exam smoothly! Tang sir said he wanted a full score. I hope I can afford it! 1: Clear the default firewall, the
1. Create a userUseradd RedHatPasswd RedHatIn this way, a user with the username RedHat and password RedHat is created. The default Redhat group is used. The RedHat Directory folder is automatically created in the home directory to store the user's
The following is a forward resolution (IP192.168.1.2 domain name is www.linuxidc.com) based on the RedHat5 or CentOS system. to ensure the construction is successful, do not miss any step. The following is a detailed step-by-step command to ensure
How sshd + rsync achieves data synchronization is simple
The client connects to the server through sshd, and the server synchronizes data to the client
First, check the kernel information of the server.
Server
[Root @ server ~] # Uname-Linux
The following is a forward resolution based on RedHat 5 or CentOS System (IP192.168.1.2 domain name is www.linuxidc.com). To ensure successful construction, do not miss any step. The following is a detailed step-by-step command can also ensure
I. Domain Name and domain name resolution
NetworkIn order to distinguish each host, you must assign a unique address to each host. This address is called "IP AddressAddress ". However, these numbers are hard to remember, so they are replaced by
Another small trick, using the expect scripting language to implement SSH automatic connection to the server, you can automatically enter the password. Because every time using SSH root@xx.xx.xx.xx connection server, you have to manually enter the
Sshd+rsync to realize the principle of data synchronization is simple
The client connects to the server through SSHD, and the server synchronizes the data to the client
First look at the server's kernel information
Server Side
[Root@server ~]#
The following is reverse resolution based on RedHat 5 or CentOS System (IP192.168.1.2 domain name is www.linuxidc.com). To ensure successful construction, do not miss any step. The following is a detailed step-by-step command can also ensure success!
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.