CentOS System Management _ Basic authority and attribution of the detailed
Linux System Management _ Basic permissions and Attribution-redhat Enterprise 5
Files and directories are the most important in Linux systems, often use the root user login
FTP commands are one of the most frequently used commands for Internet users, and a large number of FTP internal commands are encountered, whether using FTP under a DOS or UNIX operating system. Familiar with and flexible application of FTP
Installation of PHP execution files
General PHP as a web processing language is to be compiled into Apache module, here of course not to do, and therefore compiled very simple, as long as the identity of the root of the following actions:
Untie
Use the method to copy it, save it as a shell file, such as security.sh. Upload it to a Linux server, execute SH security.sh, you can use the script!
The code is as follows:
#!/bin/sh
# Desc:setup Linux system security
# AUTHOR:CORALZD
#
This is just a function of the monitoring side of the overall script installserver ()
The specific script is as follows:
#!/bin/bash #this is Nagios server or client install Shell #at 2012/10/29 path= ' pwd ' Httppath=/usr/lo Cal/apache2
If you host your own blog or no web-based application running on the stack, should have a backup system Keeping data stored in MySQL databases safe. There are several solutions that can help for you, and but nothing beats a simple Bash script I
1, prevent from jumping out of the web directory
First modify httpd.conf, if you only allow your PHP script program to operate in the Web directory, you can also modify the httpd.conf file to restrict the PHP operation path. For example, your web
Used as a reference for resolving PHP to execute commands or applications with root privileges that some ordinary users cannot perform.
In fact, the Popen () function in PHP can solve this problem, but due to some version of Linux (such as I use
Use the program:
chmod setfacl getfacl Stat chattr lsattr
chmod: Setting File permissions
SETFACL: Setting access Control lists (Access controls list)
Getfacl: View access Control List
Stat: Display inode content (a|m|c) time content
Chattr:
Apache|mysql Author: llzqq [Article from: http://www.cnfug.org]
OPENBSD 3.6 + APACHE + MYSQL + PHP + mod_limitipconn
Llzqq
Welcome to share this article, but to retain the following copyright information:
The purpose of this article
1. Picture processing class. imagecls.php
2.get_spec_img () calls the picture class, and then saves the picture with a different specification and returns a picture connection in the following way thumb" _path, $width, $height, $gen, true, "",
Preface:
PHP for various types of database operations have support, the operation of the file also has a very rich way to operate, many friends are now operating or based on file operations but sometimes in the operation of documents there are still
One of the problems with Win7 as a virtual machine is that there is not enough disk space, and a common way is to use shared folders, and I've encountered two big problems with this approach:
1. You cannot create a file.
2. After mapping to the
E-mail, also known as e-mail, electronic postage, it is-a kind of electronic means of providing information exchange, is the most widely used Internet services, through the network of e-mail systems, users can use very low prices (no matter where
If you can be familiar with and flexible application of FTP internal commands, it is really more than half the effort.
The command line format for FTP is:
Ftp-v-d-i-n-g [host name], where
-V Displays all response information for the remote server;
The permissions meaning of the file
R: Indicates that the contents of the file can be read
W: Indicates that you can edit, add, or modify the contents of the file, but do not have permission to delete the file
X: Indicates that the file can be
The following is a detailed analysis of the method of deploying the Javaweb project to Linux, the need for a friend to come to the reference
Typically developed under Windows, now deployed to Linux:1, the project to reach the war package (with
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.