code package of FTP server, telnet server, TFTP server, NFS server, GCC, related software, cross compiler, and Development Kit kernel 2.6.I use ubuntu.The release version of 7.10 and the embedded development version adopt Samsung's 2440 series CPU. How to set up a development environment is not covered in this article
code package of FTP server, telnet server, TFTP server, NFS server, GCC, related software, cross compiler, and Development Kit kernel 2.6.I am using the Ubuntu 7.10 release, and the embedded development version uses Samsung's 2440 series CPU. How to set up a development environment is not covered in this article, plea
Tags: Linux secret key remote connection Linuxconnect to Linux remotely using PuttyFirst go to download puttyAs far as possible to download the official website, the official version of the Puttygen, we use the secret key after the use of Download this version 32 bit on the line, 32 bit on 64-bit system uptime Open
Linux configuration without secret key loginYun ZhengjieCopyright Notice: Original works, declined reprint! Otherwise, the legal liability will be investigated.Recently a little upset, rarely write a blog, the late 3 months, the estimated frequency of the update will not be too high, please forgive me, today to share a Linux without
Recently got a Linux cloud server, but every time landing Linux is good trouble, so daoteng the next SSH no secret landing.Linux:centos 6.5, bring your own SSHMac:yosemite, bring your own SSHSteps:1. Create key? .SSH Ssh-keygen-T rsagenerating Public/private RSA key pair. Enterfile inch whichTo save the key (/users/yin
SSH locally [email protected] ' ls/local ' will execute the ls/local command on the remote machine, and if you want to execute multiple commands on a remote machine consecutively, you can enclose the commands in single or double quotes.For example: SSH [email protected] ' cd/local; Pwd;ls 'If you want to start a command on a remote machine locally and return it, you can ssh [email protected] "/local/x.sh 1>/dev/null 2>1 "Note If there is no "", such as ssh [email protected] cd/local; LS will on
Linux server performance tuning skills, linux Server TuningPerformance tuning skills for 20 Linux servers
Guide
Linux is an open-source operating system that supports various hardware platforms.
installation of GCC, this is the C compiler class library (if the server already has the need not to install)Command is: Yum-install gcc, then install just download the free VPN agent software on it, the command is: RPM (online free VPN agent software related tutorials A lot, do not explain the details);
2, configure the VPN server: first open the VPN server
multiple shell windows
Step two: Login with secret key
Because we are ready to test SSH key landing, to see if the setting is successful, if not successful can also login password, so the modified must be tested, for the VPS provider to provide console, it can be arbitrary, after all, there are console can be used, if not, suggest testing first, I just forgot to add another administrator account, and I also forbid the root remote login, resulting
cannot remotely
Linux_centos system ssh can log in, remote terminal management can not login to troubleshoot the idea
ECS Linux ssh login appears warning:remote HOST identification has changed!
LIMITS.CONF Setup error causes Linux system ECS to not log in
ECS Linux SSH host key file loss causes inability to remotely
Remote Login to
One: Overview
The purpose of this article is to describe how to use open source software procmail and Qpopper to configure a POP3 server that can be used by a large number of users, with a focus on maintaining optimal server performance.
Two: Steps
Software Environment for Redhat Linux 7.1
1. Download the latest version of Procmail and Qpopper
Procmail The latest
pair of Linux on the secret-free connection server: 1, switch to the corresponding user # su DD 2, use ssh-keygen generate key, note can add mail, [[emailprotected] ~]$ ssh-keygen-t rsa-c "PHP key" generating public/private RSA key pair. Enter file in which to save the key (/HOME/DD/.SSH/ID_RSA): # requires input key save location enter passphrase (empty for No
Article Title: Building a RADIUS server in Linux (1 ). Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Author: He qijun
RADIUS is used to authorize and authenticate the remote di
improve network performance. Djbdns is a very powerful DNS server with the DNS Cache function, djbdns is safer and better performing than the bind dns server. It can be obtained directly by downloading http://cr.yp.to/or using the software package provided by red Hat.7. Use AES256 to enhance the security of gpg file encryptionTo improve the security of backup files or sensitive information, many
Tags: ROM data test Rules collection notebook SEM disk read-write providerA Linux server Performance View 1.1 CPU Performance View 1, view the number of physical CPUs:cat /proc/cpuinfo |grep "physical id"|sort|uniq|wc -l2. View the number of cores in each physical CPU:cat /proc/cpuinfo |grep "cpu cores"|wc -l3, the number of logical CPUs:cat /proc/cpuinfo |grep "processor"|wc -lNumber of physical CPUs * Num
%.6. Improve Linux Exim server performanceThere are many ways to improve server Exim performance, one way is to use the DNS cache daemon, which reduces the bandwidth and CPU time required to resolve DNS records, and the DNS cache improves network performance by eliminating the need to find DNS records every time from the root node, Djbdns is a very powerful DNS
, can be downloaded directly through http://cr.yp.to/ , or through a package provided by Red Hat.
7, using AES256 enhance GPG file encryption security
In order to improve the security of backup files or sensitive information, many Linux system administrators use GPG to encrypt, when using GPG, it is best to specify GPG use AES256 encryption algorithm, AES256 use 256-bit key, it is an open encryption algorithm, the U.S. National Security Agency (NSA)
as a network administrator, you need to hold user information for administration for each network device that you need to manage. However, network devices usually only support limited user management functions. Learn how to use an external RADIUS server on Linux to authenticate users, specifically through an LDAP server to centrally place user information that is
/ppp/options to see if there are any of the following lines. If not, add them:
Local
Repaire-pap
Login
Auth
Defaultroute
Hide-password
Ipcp-accept-local
Ipcp-accept-remote
10.0.0.1: 10.0.0.255
Netmask 255.255.255.0
Ms-dns 10.0.0.1
Modify/etc/ppp/pppoe-server-options and comment out all rows.
Add a user to/etc/ppp/pap-secrets. For example, add a user luo with a password of 123456. you can dial in from any location:
# Client
Migration from Windows to Linux: File Server (perfect combination of Samba and AD)-Linux Enterprise Application-Linux server application information. The following is a detailed description. After searching for a lot of information on the Internet, we have finally completed
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.