current location:Home > Technical Articles > System Tutorial > LINUX
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- How to configure master-slave replication in MariaDB
- In our previous tutorials, we have learned how to install and configure MariaDB[1], and also learned some basic commands for managing MariaDB[2]. Now let's learn how to configure a master-slave replication on the MariaDB server. Replication is used to create multiple copies of our database. These copies can be used to run queries on other databases. Some very heavy queries may affect the performance of the main database server, or we can use it for data redundancy. , or both of the above purposes. We can automate this process, that is, the replication process from the master server to the slave server is automatically performed. Perform backups without affecting writes on the primary server. So let's now configure our master-slave
- LINUX 577 2024-05-01 13:49:01
-
- Differences between Unix and Linux operating systems
- In the computer age, a considerable number of people mistakenly believe that Unix and Linux operating systems are the same. However, the opposite is true. Let's take a closer look. What is Unix? In the IT field, Unix, known as the operating system, was developed by AT&T in New Jersey, USA in 1969 (its trademark rights are currently owned by the International Open Standards Organization). Most operating systems were inspired by Unix, which was also inspired by the unfinished Multics system. Another version of Unix is Play9 from Bell Laboratories. Where is Unix used? As an operating system, Unix is mostly used on servers, workstations, and now also on personal computers. it
- LINUX 1119 2024-05-01 08:55:02
-
- The evasive module protects your website from application layer DOS attacks
- There are a variety of attack methods that can take a website offline, and the more complex methods involve technical knowledge of databases and programming. A simpler method is called a "DenialOfService" (DOS) attack. The name of this attack method comes from its intention: to cause normal service requests from ordinary customers or website visitors to be denied. Generally speaking, there are two forms of DOS attacks: the third and fourth layers of the OSI model, that is, the network layer attack. The seventh layer of the OSI model, that is, the application layer attack. The first type of DOS attack - the network layer, occurs when a large number of of junk traffic flows to the web server. When spam traffic exceeds the network's ability to handle it, the website goes down. The second type of DOS attack is at the application layer and uses combined
- LINUX 993 2024-04-30 17:34:14
-
- Analyzing the Patron Saint of Linux
- The biggest differences between background processes and daemon processes are as follows: (a) The daemon process has completely separated from the terminal console, while the background program has not completely separated from the terminal (results will still be output to the terminal before the terminal is closed); (b) The daemon process will not be affected when closing the terminal console, and the background program will stop when the user exits. It needs to be run in nohupcommand& format to avoid the impact; (c) The session group, current directory, and file description of the daemon process The symbols are all independent. Background running is just a fork of the terminal to allow the program to execute in the background. These have not changed; the characteristics of the daemon process. The daemon is a special process that runs in the background. It is separated from the terminal, so that it can avoid running in the background.
- LINUX 616 2024-04-29 12:28:13
-
- One line to understand the causes and consequences of SSH login
- SSH flow chart According to the flow chart, we can see the process of our program from the initial browser to the final page echo. If there is anything you don't understand, please leave a message. The Hibernate layer is mainly responsible for mapping files, injection of Action and Service, and responsible for calling between the three layers of background services. **JSP is equivalent to the HTML page in our asp.net. If it is the same as our HTML page, then it can also be used. Ajax can be written and our events can be triggered. Events are triggered through the action attribute. There will be an address in this attribute, which is specifically used to establish a connection with our backend.
- LINUX 587 2024-04-29 09:10:09
-
- Come with me to learn Linux and install Nginx
- Today, I will lead you to install Nginx in a Linux environment. The Linux system used here is CentOS7.2. Prepare the installation tools 1. Download Nginx from the Nginx official website. The version used here is: 1.13.6.2. Upload the downloaded Nginx to Linux. Here, the /opt/nginx directory is used as an example. Run "tar-zxvfnginx-1.13.6.tar.gz" to decompress. 3. Switch to the /opt/nginx/nginx-1.13.6 directory and run ./configure for initial configuration. If the following prompt appears, it means that PCRE is not installed on the machine, and Nginx needs to
- LINUX 1255 2024-04-28 15:10:09
-
- Learn more about the difference between git fetch and git pull
- Both gitfetch and gitpull can update the remote repository to the local one. So what are the differences between them? There are several concepts that have to be mentioned to clarify this issue. FETCH_HEAD: It is a version link, recorded in a local file, pointing to the end version of the branch that has been taken down from the remote warehouse. commit-id: After each local work is completed, a gitcommit operation will be performed to save the current work to the local repo. At this time, a commit-id will be generated, which is a serial number that uniquely identifies a version. After using gitpush, this serial number will also be synchronized to the remote warehouse. With the above concepts in mind, let’s talk about gitfetchg
- LINUX 585 2024-04-27 21:34:33
-
- How to use Fail2Ban to protect your server from brute force attacks
- An important task for Linux administrators is to protect the server from illegal attacks or access. By default, Linux systems come with well-configured firewalls, such as iptables, Uncomplicated Firewall (UFW), ConfigServerSecurityFirewall (CSF), etc., which can prevent a variety of attacks. Any machine connected to the Internet is a potential target for malicious attacks. There is a tool called Fail2Ban that can be used to mitigate illegal access on the server. What is Fail2Ban? Fail2Ban[1] is an intrusion prevention software that protects servers from brute force attacks. It is written in Python programming language
- LINUX 797 2024-04-27 08:34:20
-
- Run Linux on Android devices
- Once upon a time, I tried searching for a simple way to run Linux on Android. My only intention at that time was just to use Linux and some basic applications like SSH, Git, awk, etc. Not asking for much! I don't want to root my Android device. I have a tablet that I use mainly for reading e-books, news, and a handful of Linux blogs. Other than that, I don't use it much. So I decided to use it to implement some Linux functions. If you also want to run Linux on your Android device, this article may be helpful to you. Termux - Android terminal emulator that runs on Android and ChromeOS
- LINUX 971 2024-04-26 09:07:01
-
- Introducing 5 cool tools for Python
- If you want to do your job well, you must first sharpen your tools. A good tool can get twice the result with half the effort. The Python community has provided enough excellent tools to help developers realize certain ideas more conveniently. The following tools provide My work also brings a lot of convenience, and I recommend it to you who pursue beautiful things. PythonTutor PythonTutor is a free educational tool developed by PhilipGuo, which can help students overcome basic obstacles in programming learning and understand the process of each line of source code in the computer when the program is executed. With this tool, teachers or students can write Python code directly in a web browser and run the program visually step by step. If you don't know how code runs in memory,
- LINUX 1422 2024-04-25 09:22:19
-
- Artifact Nmon
- For example: nmon-f-s1. nmonCPUandDiskutilization will create a log file. The beginning of the log file is some system metadata (AAA-BBBV part), followed by regular snapshots of the monitored system properties, such as CPU and memory usage. This output file is difficult to process directly by a spreadsheet application, so the Nmon_Analyzerexcel macro was born. If you are using Windows/Mac and have Microsoft Office installed, this tool is very good. If you don’t have this environment, you can also use the Nmon2rrd tool. This tool can convert log files into RRD input files.
- LINUX 1144 2024-04-25 09:01:02
-
- Use Python code to automatically grab train tickets
- You should be very familiar with many train ticket grabbing software on the market, but few people have studied how it is implemented, so they think it is mysterious, but it is actually very simple. The following uses Python to simulate the ticket grabbing program to reveal to you what the ticket grabbing process is. This code is for reference only and is mainly used for communication. Commercial use is prohibited. The specific code is as follows, which can be modified to your own 12306 username account: Prepare tool 12306 website username and password Pythonchrome browser and download chromedriver Download Python code, located at: https://github.com/ppy2790/tickets Python+Splinte used in the code
- LINUX 459 2024-04-25 08:25:29
-
- Tutorial on setting up nginx+php to upload large files
- To enable PHP to upload large files, you generally need to modify the configuration file php.ini. Configure file_uploads=on as follows; //Switch to allow uploading files via HTTP. The default is ONupload_tmp_dir; //Upload files to the directory where the server temporarily places them. upload_max_filesize=2m;//Maximum allowed upload file size post_max_size=8m;//Refers to the maximum value that can be received by PHP through form POST, including all values in the form. max_execution_time=600;//The maximum time value (seconds) for each PHP page to run, the default is 30 seconds max_
- LINUX 1095 2024-04-24 08:46:01
-
- Several points to note when building high availability with keepalived+nginx
- After yum installs keepalived, configure the keepalived configuration file. Note that in the keepalived configuration files of master and backup, the network card name is the network card name of the current machine. VIP is selected as an available IP. It is usually used in high availability and LAN environments. There are many, so this VIP is an intranet IP in the same network segment as the two machines. If used in an external network environment, it does not matter whether it is on the same network segment, as long as the client can access it. Stop the nginx service and start the keepalived service. You will see that keepalived pulls the nginx service to start. If it cannot start and fails, it is basically a problem with the configuration files and scripts, or a prevention problem.
- LINUX 647 2024-04-23 17:50:20
-
- One trick to solve the error 'Cannot fetch deployment URL via curl'!
- check_mk is a tool that helps you configure nagios monitoring server. Then while configuring one of the machines I encountered the following error: ERRORCannotfetchdeploymentURLviacurl: Couldn'tresolvehost. Thegivenremotehostwasnotresolved. The error occurred when I tried to register the machine to the monitoring server using the following command: root@kerneltalks#/usr/bin/cmk-update-agentregister-smonitor.kerneltalks.com-
- LINUX 474 2024-04-23 08:16:24