
英文文章
文章平均质量分 80
JJDiaries
JJ diaries-still-always-forever
展开
-
Understand Linux Shell and Basic Shell Scripting Language Tips-Part I
Picture speak more than words and the below picture says all about the working of Linux. Understanding Linux ShellRead Also5 Shell Scripts to Learn Shell Programming – Pa转载 2013-09-21 08:49:05 · 1581 阅读 · 0 评论 -
How to Reset Forgotten Root Password in RHEL/CentOS and Fedora
In this post will guide you simple steps to reset forgotten root password in RHEL, CentOSand Fedora Linux with example. There are various ways to reset root password which are.Booting into sin转载 2013-09-22 08:36:06 · 1627 阅读 · 0 评论 -
MySQL Backup and Restore Commands for Database Administration
This article shows you several practical examples on how to perform various backup operations of MySQL databases using mysqldump command and also we will see how to restore them with the help of mys转载 2013-09-22 08:38:04 · 2522 阅读 · 0 评论 -
Rsync (Remote Sync): 10 Practical Examples of Rsync Command in Linux
Rsync (Remote Sync) is a most commonly used command for copying and synchronizingfiles and directories remotely as well as locally in Linux/Unix systems. With the help ofrsync command you can co转载 2013-09-22 08:38:43 · 1309 阅读 · 0 评论 -
Basic Guide on IPTables (Linux Firewall) Tips / Commands
This tutorial guides you how firewall works in Linux Operating system and what is IPTablesin Linux? Firewall decides fate of packets incoming and outgoing in system. IPTables is a rule based firewal转载 2013-09-22 08:33:10 · 1062 阅读 · 0 评论 -
5 Best Practices to Secure and Protect SSH Server
SSH (Secure Shell) is an open source network protocol that is used to connect local or remote Linux servers to transfer files, make remote backups, remote command execution and other network related转载 2013-09-22 08:33:58 · 1367 阅读 · 0 评论 -
How to Enable and Disable Root Login in Ubuntu
We have recently installed Ubuntu 12.10 Desktop and Ubuntu 12.10 Server, we have nowhere asked to supply root password during installation. Generally in Linux, root user does exist and we need t转载 2013-09-22 08:35:30 · 2414 阅读 · 0 评论 -
Install Apache, MySQL 5.5.32 & PHP 5.5.0 on RHEL/CentOS 6.4/5.9 & Fedora 19-12
This howto guide explains you’ll how to install Apache Server with latest MySQL 5.5.32 andPHP 5.5.0 versions with php required following modules on RHEL 6.4/6.3/6.2/6.1/6.0/5.9/5.8/5.6, CentOS 6.4转载 2013-09-22 08:36:26 · 2114 阅读 · 0 评论 -
Install LEMP (Linux, Nginx, MySQL 5.5.29, PHP 5.4.11) on RHEL/CentOS 5-6 & Fedora 18-12
This howto guide explains more deeply on how to install LEMP (Linux, Nginx, MySQL, PHP) on pre-installed Linux servers and installation instructions can be used on various Linux distribution such as转载 2013-09-22 08:36:51 · 1860 阅读 · 0 评论 -
MySQL Basic Database Administration Commands – Part I
Database is a structured set of data stored electronically. The concept of database was known to our ancestors even when there were no computers, however creating and maintaining such database was v转载 2013-09-22 08:37:45 · 1016 阅读 · 0 评论 -
30 Useful Linux Commands for System Administrators【很基础的命令】
In this article we are going to review some of the useful and frequently used Linux or Unixcommands for Linux System Administrators that are used in their daily life. This is not a complete but it’s转载 2013-09-22 08:38:04 · 1310 阅读 · 0 评论 -
15 Useful “ifconfig” Commands to Configure Network Interface in Linux
ifconfig in short “interface configuration” utility for system/network administration inUnix/Linux operating systems to configure, manage and query network interface parameters via command line in转载 2013-09-22 08:38:31 · 1155 阅读 · 0 评论 -
Install WordPress 3.6.1 Using LAMP or LEMP on RHEL, CentOS & Fedora
Well, on the internet you will find a number of good and better ways to install WordPress on Linux, but this installation guide is prepared for my future reference as well as for those beginners who a转载 2013-09-23 21:44:47 · 1299 阅读 · 0 评论 -
我希望早几年知道的 5 个 Unix 命令
使用*nix系统已经有一段时间了。但还是有一些命令是被我一直忽略的,真希望我能早几年发现这些命令。1. man ascii这个命令会打印出八进制、十六进制和十进制的ASCII码表。难以置信我是一个月之前才知道这个命令的。我总是使用google来查询ASCII码表。这个命令其实更方便。ASCII(7) BSD Miscellaneous Infor转载 2013-09-23 21:48:02 · 804 阅读 · 0 评论 -
17 Command Line Tools to Monitor Linux Performance
It’s really very tough job for every System or Network administrator to monitor and debugLinux System Performance problems every day. After being a Linux Administrator for 5 years in IT industry转载 2013-09-22 08:35:50 · 1460 阅读 · 0 评论 -
25 Useful Basic Commands of APT-GET and APT-CACHE for Package Management
This article explains how quickly you can learn to install, remove, update and searchsoftware packages using apt-get and apt-cache commands from the command line. This article provides some useful转载 2013-09-22 08:34:47 · 1654 阅读 · 0 评论 -
Mathematical Aspect of Linux Shell Programming – Part IV
In this post I will be discussing the Scripts from the Mathematical and Number point of view. Although I have posted a more complex script (Simple Calculator) in the previous post, but on a user转载 2013-09-21 08:50:17 · 1034 阅读 · 0 评论 -
Create Multiple IP Addresses to One Single Network Interface
The concept of creating or configuring multiple IP addresses on a single network interface is called IP aliasing. IP aliasing is very useful for setting up multiple virtual sites on Apacheusing one转载 2013-09-21 08:50:43 · 1466 阅读 · 0 评论 -
Block SSH Server Attacks (Brute Force Attacks) Using DenyHosts
DenyHosts is an open source and free log-based intrusion prevention security program forSSH servers developed in Python language by Phil Schwartz. It is intended to monitor and analyzes SSH se转载 2013-09-21 08:50:43 · 1017 阅读 · 0 评论 -
Install Fail2ban (Intrusion Prevention) System on RHEL/CentOS 6.3/5.8, Fedora 17/12
Fail2ban is an open source free intrusion prevention framework developed in python programming language. Fail2ban operates by monitoring log files such as/var/log/pwdfail, /var/log/auth.log, /var/lo转载 2013-09-21 08:50:56 · 1120 阅读 · 0 评论 -
Disable or Enable SSH Root Login and Limit SSH Access in Linux
Today, everyone knows that Linux systems comes with root user access and by default theroot access is enabled for outside world. For security reason it’s not a good idea to have sshroot access ena转载 2013-09-21 08:52:10 · 3114 阅读 · 0 评论 -
【荐】25 Hardening Security Tips for Linux Servers
Everybody says that Linux is secure by default and agreed to some extend (It’s debatable topics). However, Linux has in-built security model in place by default. Need to tune it up and customize as转载 2013-09-21 20:44:51 · 1360 阅读 · 0 评论 -
5 Shell Scripts for Linux Newbies to Learn Shell Programming – Part II
This article is an extension of our First article Understand Linux Shell and Basic Shell Scripting – Part I, where we gave you a taste of Scripting, continuing that we won’t disappoint you in this a转载 2013-09-21 08:49:38 · 1120 阅读 · 0 评论 -
Sailing Through The World of Linux BASH Scripting – Part III
The Previous following articles of ‘Shell Scripting‘ series were highly appreciated and hence I am writing this article to extend the never ending process of learning.Understand Basic Linu转载 2013-09-21 08:50:01 · 1089 阅读 · 0 评论 -
Install Linux Malware Detect (LMD) in RHEL, CentOS and Fedora
In my earlier article I’ve explained you all about how to protect Apache server fromMalicious and DOS attacks using mod_security and mod_evasive. Now again I have come up with another great topic转载 2013-09-21 08:52:39 · 1705 阅读 · 0 评论 -
Linux Directory Structure and Important Files Paths Explained
For any person, who does not have a sound knowledge of Linux Operating System andLinux File System, dealing with the files and their location, their use may be horrible, and a newbie may really mess转载 2013-09-21 08:52:53 · 1780 阅读 · 0 评论 -
【荐】20 MySQL (Mysqladmin) Commands for Database Administration in Linux
mysqladmin is a command-line utility the comes with MySQL server and it is used byDatabase Administrators to perform some basic MySQL tasks easily such as setting root password, changing root pass转载 2013-09-22 08:31:37 · 1102 阅读 · 0 评论 -
A Guide to Kill, Pkill and Killall Commands to Terminate a Process in Linux
Linux Operating System comes with Kill command to terminate a process. The command makes it possible to continue running the server without the need of reboot after a major change/update. Here comes t转载 2013-09-22 08:32:06 · 1442 阅读 · 0 评论 -
Block SSH Server Attacks (Brute Force Attacks) Using DenyHosts
DenyHosts is an open source and free log-based intrusion prevention security program forSSH servers developed in Python language by Phil Schwartz. It is intended to monitor and analyzes SSH server转载 2013-09-22 08:34:20 · 1153 阅读 · 0 评论 -
main 函数是怎样运行的
StartingThe question is simple: how does linux execute my main()?Through this document, I'll use the following simple C program to illustrate how it works. It's called "simple.c"main(){转载 2013-09-26 17:08:11 · 1072 阅读 · 0 评论