Setting up RabbitMQ server in Linux and setting up linuxrabbitmqSystem Environment
Operating System: CentOS6.9
Erlang: OTP 19.3
Rabbitmq: rabbitmq-server 3.6.12 Installation Steps to install erlang
1. Install the pre-Environment
Install the following components using yum and run the following command:
[Root @ rabbitmqs
Recently the company has a customer reported a problem, that is, after running for a while in the Apache log/var/log/httpd/error_log file has an error message
[Fri 29 15:45:37 2016] [ERROR] Server reached maxclients setting, consider raising the maxclients setting
Check, this is due to the number of concurrent links caused by too many, and then check the Apach
Recently the company has a customer reported a problem, that is, after running for a while in the Apache log/var/log/httpd/error_log file has an error message
[Fri Mar 04 10:48:20 2011] [ERROR] Server reached maxclients setting, consider raising the maxclients setting
Check, this is due to the number of concurrent links caused by too many, and then check the Apac
Label:--Current database creation roleexec sp_addrole ' Rapp '--Assign View permissions GRANT SELECT on veiw to [role]--Specify the View list Viewcardbaseinfo--grant SELECT on v_city to Rapp--grant SELECT on V_LP to Rapp--grant SELECT on v_qy to RappGRANT SELECT on Viewcardbaseinfo to RappGo--Add only users who are allowed access to the specified view: EXEC sp_addlogin ' login name ', ' Password ', ' Default database name 'EXEC sp_addlogin ' CD ', ' CD ', ' Campuscard 'You may not be able to do
The way to set the file upload size in IIS 6.0 is to configure the following nodes:
Copy Code code as follows:
However, in IIS7, the setting is set as above, no matter how large the number is set, the maximum upload limit is 30M
The following settings are also required to be correct:
Method 1:
Appcmd set config "My Site/myapp"-section:requestfiltering-requestlimits.maxallowedcontentlength:104857600- Commitpath:apphost
On th
; status-Starts all applications and changes the process model identity and database authentication methods (such as System validation): Restart, and browse the Web site (this is also available on the LAN to test access): Server Local and LAN are accessible: 5, the server public network address to do domain name resolution. At this point, the relocation case is complete. Four, graphical mod
catalog server and must have the DNS service installed, not a read-only domain controller6. NetBIOS name does not need to be set7. The AD DS database file path remains the default, and of course, putting the log files and database files on different disks can help improve performance8. After installing AD DS, the server will be restarted automatically after restarting the
version, followed by server-side settings: domain that block can choose the host name or IP address the third step is the database settings, using the standard database connection, Database driver Selection Mysqljdbc driver class is: Com.mysql.jdbc.Driver database url:jdbc:mysql://ip:3306/openfire (where IP is server-side IP) User name: openfire password : 123456The fourth step is the feature
Eight security setting skills for CentOS server to ensure Apache Web Server Security
Apache server is an open-source WEB Server supported by the Apache Software Foundation, a non-profit organization. Many of our virtual hosts and VPS use the Apache
setting up, land the peanut shell client again.At this time, the peanut shell software has been online, we have applied for the domain name has been bound to the current public network IP address, the Internet can be applied to the domain name directly to the current host services, if your host to connect to the router or proxy server, please refer to the intranet site documentation. Let's continue the mai
=Roothome=/# for details seeMans 4crontabs# Example of Job definition:#.----------------Minute (0- -)# | .-------------Hour (0- at)# | | .----------Day of Month (1- to)# | | | .-------Month (1- A) OR jan,feb,mar,apr ... #| | | | .----Day of Week (0-6) (sunday=0Or7) OR sun,mon,tue,wed,thu,fri,sat#| | | | |# * * * * *command to be executed~~~~Look at this file, the front four lines can be ignored regardless. In fact, there is an example here, very easy to read, the key is this line:*
Web site program is placed. Where wwwroot as long as the right to save D disk, and blog.postcha.com This directory, we need to add two additional permissions, namely IUSR and Iis_iusrs.
Wwwroot Permissions:
Site Directory Permissions:
The general website has uploads the file, the picture function, but the user uploads the file is not credible. So also to the upload directory for separate settings. The upload directory also needs to add "modify", "write" permission to the IIS_IUSRS grou
Frequent use of PING commands can cause network congestion, reduce transmission efficiency, and generally deny users ping servers in order to avoid malicious network attacks. For this to happen, not only can you set it up in a firewall, you can set it up on a router, but you can also take advantage of the capabilities of the Windows 2000/2003 system itself. Either way, the deny ping action is implemented by prohibiting the use of the ICMP protocol.For example, to set IP policy in Windows
different port. Click OK.
In the Delivery tab, click Advanced. By default, the "Fully qualified domain name" of the local server is listed. The smart host property can be left blank, depending on the Internet provider. You may need to contact your Internet provider to verify that you need a smart host. Otherwise you may not be able to enter SMTP. Emailprovider.com.
Note Note
A smart host (also known as a relay h
As a classic FTP server software, Serv-u has been used by most administrators, its simple installation and configuration, as well as the powerful management of human nature has been praised by the administrator. But as users become more and more, the security of the software is emerging.
The first is Serv-u site chmod vulnerabilities and serv-u Mdtm vulnerabilities, that is, the use of an account can easily get system permissions. The second is the s
and shares to enable
Network access: Enable for network authentication store credentials is not allowed
Network access: All shares that can be accessed anonymously are deleted
Network access: Anonymous access to all of the lives deleted
Network access: Remote access to the registry path all deleted
Network access: Remotely accessible registry paths and subpath Delete all
Account: Rename guest account rename an account
Accounts: Renaming a system administrator account renaming an account
SQL Server downgrading SQL Server 2000 run the setting method with the GUESTS permission, sqlguests
Due to vulnerabilities in the SQL2000 database, hackers can easily obtain system administrator privileges.
By default, SQL runs with the SYSTEM permission, which is extremely powerful.
To make the server more secure, we
However, the workload of maintaining these level two domain names is very high, but we can solve this problem by using a generic domain name resolution technique, so that support for the generic domain name can be achieved by slightly setting up a DNS server with its own Windows system.
The following are examples of Windows Server 2003 and Windows 2000 DNS s
/binmailto=roothome=/# for details see Mans 4 crontabs# Example of Job definition:#.----------------minute (0-59) # | -------------Hour (0-23) # | | . ----------Day of Month (1-31) # | | | . -------Month (1-12) OR jan,feb,mar,apr ... # | | | | ----Day of Week (0-6) (sunday=0 or 7) or sun,mon,tue,wed,thu,fri,sat# | | | | | # * * * * * command to be executed~~~~Look at this file, the front four lines can be ignored regardless. In fact, there is an example here, very easy to read, the key
allow anonymous connections, and in the Message tab, set the prompts that appear when users visit or exit your FTP server, and write as you like! There is also a "maximum number of connections" set, It refers to the maximum number of hosts connected to the local FTP at the same time, if your computer configuration is not very good, it is recommended not more than 5. Your FTP server should already be work
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.