Redis installation + Remote Access + power on and self start under centos

1, Install redis 1. Download redis installation package Go to the official website http://redis.io , you can also use the wget command cd /usr/local/soft/ wget http://download.redis.io/releases/redis-4.0.6.tar.gz 2. Unzip tar xzf redis-4.0.6.tar.gz 3. Compile and install cd redis-4.0.6 make 2, Remote access ...

Posted by jonnym00 on Sun, 03 May 2020 17:08:40 -0700

CentOS 7.3 installation and configuration vsftp

1, Configure firewall and open the port required by FTP service Turn off the firewall of the system #Stop firewall [root@localhost ~]# systemctl stop firewalld.service #Disable startup of firewall [root@localhost ~]# systemctl disable firewalld.service Install iptables firewall #install [root@localhost ~]# yum in ...

Posted by Zangakat on Sun, 03 May 2020 14:51:12 -0700

< EOF in linux

1,EOF  In Shell, EOF is usually used in combination with < to indicate that the subsequent input is used as the input of subcommand or subshell, until EOF is encountered, and then returned to the calling Shell. EOF can be replaced by something else, meaning that content is passed to the program as standard input. Review the use of <. W ...

Posted by brij_theinvader on Sun, 03 May 2020 04:57:15 -0700

centos6\centos7 basic optimization

Optimization term 1. Close selinux, firewalld (centos7) / iptables (centos6) 2. Modify character set 3, Simplify startup items 4. Modify maximum file descriptor 5. Modify yum source and install common tools 6. Optimize system kernel 7. Optimize ssh login speed 8. Disable ctrl+alt+del restart 9. Set time synchronization 10. history opt ...

Posted by Cheers on Mon, 13 Apr 2020 09:50:36 -0700

centos 6.x install squid

Do not set user authentication install # install yum install squid yum install httpd #View version rpm -qa | grep squid #Here is the version I installed #squid-3.1.23-24.el6.i686 Modify profile Use vim to edit the / etc/squid/squid.conf file. As shown below #/etc/squid/squid.conf # The configuration file al ...

Posted by cheald on Sat, 04 Apr 2020 06:04:43 -0700

Record a journey of cc attack and modify it with ddos deflate

The beginning of the story, on March 30, is supposed to be a friendly business attack on the company's website. The attack starts at 4 p.m. on the attack website, there is also Alibaba cloud ip in it. Angry. I want to complain. Start to talk about how to solve it. First, use netstat -ntu | awk '{print $5}' | cut -d: -f1 | so ...

Posted by squizz on Fri, 03 Apr 2020 07:00:16 -0700

k8s Service Exposure Plugin-fraefik

CoreDNS implements automatic discovery of services, so how do we expose our services? The first is a nodePort-type service: however, it cannot use the ipvs model, only the iptables model The second option is ingress: note that Ingres resources can only schedule seven-tier network resources, specifically http/https ingress is one of the standa ...

Posted by ChrisF79 on Fri, 27 Mar 2020 20:14:39 -0700

Formal Learning linux-16

1. E-mail system Mail User Agent (MUA): A server that receives and receives mail for users; Mail Delivery Agent (MDA): Mail can be saved for users when they are offline; Mail Transfer Agent (MTA): Forward and process messages between different e-mail service providers. In deploying an e-mail system, the outgoing service is based on the post ...

Posted by shure2 on Fri, 27 Mar 2020 19:59:31 -0700

Formal learning linux-14

1. Configure Samba service on the server The first step is to install samba service through yum warehouse. The second step is to configure shared resources. In the process of configuring shared resources, samba service uses password authentication mode by default. The password authentication mode is based on the account information databa ...

Posted by Rother2005 on Wed, 18 Mar 2020 00:01:28 -0700

Nginx Security Access Configuration

Website System Security Configuration (Nginx) prevents websites from being malicious GJ s.Websites such as DDos, CC, etc.They all work the same way, sending large amounts of request data to the server. Nginx Active Defense MethodThere are two modules in Nginx that control the "number" and "speed" of accessing user connecti ...

Posted by cdjaco on Tue, 17 Mar 2020 12:28:51 -0700