centos 6.x install squid

Do not set user authentication install # install yum install squid yum install httpd #View version rpm -qa | grep squid #Here is the version I installed #squid-3.1.23-24.el6.i686 Modify profile Use vim to edit the / etc/squid/squid.conf file. As shown below #/etc/squid/squid.conf # The configuration file al ...

Posted by cheald on Sat, 04 Apr 2020 06:04:43 -0700

Record a journey of cc attack and modify it with ddos deflate

The beginning of the story, on March 30, is supposed to be a friendly business attack on the company's website. The attack starts at 4 p.m. on the attack website, there is also Alibaba cloud ip in it. Angry. I want to complain. Start to talk about how to solve it. First, use netstat -ntu | awk '{print $5}' | cut -d: -f1 | so ...

Posted by squizz on Fri, 03 Apr 2020 07:00:16 -0700

Install traefik ingress in Kubernetes

#Download Configuration List wget https://github.com/containous/traefik/tree/v1.7/examples/k8s #There are three files in the link that start with traefik-and you can see their names, of which traefik-deployment.yaml is not used here # traefik-deployment.yaml is either traefik-ds.yaml or traefik-ds.yaml, which is recommended because the conf ...

Posted by mj_23 on Sun, 29 Mar 2020 09:50:42 -0700

Formal Learning linux-16

1. E-mail system Mail User Agent (MUA): A server that receives and receives mail for users; Mail Delivery Agent (MDA): Mail can be saved for users when they are offline; Mail Transfer Agent (MTA): Forward and process messages between different e-mail service providers. In deploying an e-mail system, the outgoing service is based on the post ...

Posted by shure2 on Fri, 27 Mar 2020 19:59:31 -0700

One click online installation of redis database by shell script (implemented by function)

The previous article gives the process of manual compilation and installation of redis, and gives the process of online installation of redis when simulating the establishment of redis cluster, so I want to write a redis script for online installation. In this paper, I mainly use shell functions to realize and verify the process of online ins ...

Posted by m!tCh on Wed, 25 Mar 2020 07:48:09 -0700

linux Getting Started Series 18--Apache Service 2 for Web Services

In the next article, after learning about Apache's basic configuration and SELinux, continue demonstrating the virtual host capabilities and access control methods provided by Apache. If you haven't looked at the last suggestion, look at it first and come back later, last article " linux Getting Started Series 18--apache service 1 for Web ...

Posted by WarDeities on Tue, 24 Mar 2020 20:03:51 -0700

Security settings when building a cluster on Baidu cloud server

After moving the hadoop cluster on the local virtual machine to Baidu cloud server, I found that there are always many unknown ip addresses logging in to my server, because the firewall is closed locally, but in the actual deployment, this is too unsafe. So I spent two hours setting up the firewall of t ...

Posted by wonderman on Sun, 15 Mar 2020 02:23:32 -0700

Formal learning linux-13

1.vsftpd main configuration file The main configuration file (/ etc/vsftpd/vsftpd.conf), which contains a lot of annotation information, has little actual parameter information. [root@linuxprobe ~]# mv /etc/vsftpd/vsftpd.conf /etc/vsftpd/vsftpd.conf_bak [root@linuxprobe ~]# grep -v "#" /etc/vsftpd/vsftpd.conf_bak > /etc/vsftpd/vsftpd.conf ...

Posted by Fataqui on Sat, 14 Mar 2020 21:10:22 -0700

linux configuration firewall configuration

Article directory 1, The concept of firewall 2, Firewall configuration 1. View firewall commands 2. Configure firewall commands 3, centos7 and below 4, Cloud platform access policy configuration 5, Copyright notice 1, The concept of firewall Firewall technology is a kind of technology that hel ...

Posted by Datnigz2002 on Mon, 09 Mar 2020 19:58:46 -0700

Build your own intranet penetration

Preface Hello everyone, I am a different technology house. I make a little progress every day and experience a different life. What we bring today is to use frp to build our own intranet penetration, which is convenient for debugging in our daily development. At the same time, frp is open-source and free, only one cloud server is needed to bui ...

Posted by jimdelong on Sun, 08 Mar 2020 04:04:42 -0700