How to use sort and uniq command in Linux
This article mainly writes the use of some shell script sort and uniq tools in Linux environments. Sort command Sort is a tool for sorting the contents of files in units of lines, and...
This article mainly writes the use of some shell script sort and uniq tools in Linux environments. Sort command Sort is a tool for sorting the contents of files in units of lines, and...
VyOS is forked from the Vyatta community, is a network operating system that provides software-based network routing, firewall, and VPN functionality. VyOS is based on Debian GNU/Linux and is fully open source free. VyOS...
Microsoft released detailed information about the company’s new Linux kernel project. The project is called Integrity Policy Enforcement (IPE) and is a Linux Security Module (LSM) that allows configurable policies to enforce integrity requirements...
TCP Wrappers TCP wrappers are host-based access control systems. It is used to prevent unauthorized access and only allow specific customers to access services on your server. Why use TCP wrappers TCP wrappers create...
iperf is a tool for performing network throughput measurements. It can test either TCP or UDP throughput. To perform an iperf test the user must establish both a server (to discard traffic) and a...
There are existing anti-port scanning tools on the Internet, such as psad and portsentry, but I find the configuration a bit cumbersome, and the server does not want to install additional software. So I...
After Microsoft opened up exFAT technology and actively added it to the Linux kernel, Linux Kernel 5.4 brought initial support for the exFAT file system . Now, based on earlier code improvements, the new...
SYN flooding attack refers to an attack method that uses the imperfect TCP/IP three-way handshake and maliciously sends a large number of packets that contain only the SYN handshake sequence. This kind of attack...
Some time ago, the South Korean government drafted a strategy to completely replace Windows 7 with a Linux-based open-source operating system to get rid of its dependence. Currently, the Polish social insurance company ZUS...
RPM package This kind of software package is like the EXE installation file of Windows. Various files have been compiled and packaged. Which file should be placed in which folder is specified. Installation is...
When managing files under Linux, we usually have the need to periodically delete expired files. For example, periodically delete log files that exceed a specified time. Otherwise, the longer it takes, the more space...
This article will explain how to modify the default settings of sshd to ensure that sshd is secure and restricted to protect your server from hackers. You need to restart sshd every time you...
When we manage the server or VPS, we often upload and download data. For example, when we need to move data from one server to another, we usually download the data from the first...
mkdir command The mkdir used to create one or more directories Example: Create directory: mkdir ddos The above command will create the directory ‘ddos’. Create a directory and set access permissions: mkdir -m 777...
Create archives and extract archive files with tar and gzip command in Linux tar The tar command is used to create archives and extract archive files. Use Example Archive files or directories tar -cvf...
The vi editor is a standard editor for all Unix and Linux systems. Its power is not inferior to any latest text editor. Here is a brief introduction to its usage and a small...