Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to install and use Linux software

2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)05/31 Report--

This article mainly introduces "how to install and use Linux version software". In daily operation, I believe many people have doubts about how to install and use Linux version software. The editor consulted all kinds of materials and sorted out simple and easy-to-use operation methods. I hope it will be helpful to answer the doubts about "how to install and use Linux version software". Next, please follow the editor to study!

Rapid system configuration

1. Network interface configuration

The interface displays the ip, subnet mask, mac address, ip setting mode, network card activation status and other information of each network card of the system, as well as the dns server (nameserver) settings of the system.

Keyboard shortcuts support modifying the ip acquisition method of the network card. If you need to enter ip and mask information manually, you can choose to enter gateway and dns information. At the same time, you can disable the network card, start the network card and other functions.

If the display value is "?", the software cannot detect the parameter or the parameter does not exist.

[note]

The dynamic or static displayed by the software is the current way to obtain ip, which may not be correct for reference only.

2. System status configuration

The interface displays the machine name of the system, the date and time of the system, the shortcut keys that support the modification of the machine name of the system, the account number and password in the system, and the date and time of the system. The status under this menu will be automatically refreshed every two to three seconds.

Rapid optimization of system

1. Network optimization

Icmp echo ignore all turns on or off "disable response to ping package Policy"

[verify effective method]

Cat / proc/sys/net/ipv4/icmp_echo_ignore_all

If the result is 1, it is valid, and if it is 0, it is not valid.

[test method]

You can execute the command locally

Ping 127.0.0.1

View the effect before and after configuration

Tcp syncookies turns on or off "prevent syn flood attack Strategy"

[verify effective method]

Execute a command

Cat / proc/sys/net/ipv4/tcp_syncookies

If the result is 1, it is valid, and if it is 0, it is not valid.

[test method]

None for the time being

Tcptimewaitreuse turns Port reuse in time-wait status on or off

[verify effective method]

Execute a command

Cat / proc/sys/net/ipv4/tcp_tw_reuse

If the result is 1, it is valid, and if it is 0, it is not valid.

[test method]

None for the time being

2. Process resource optimization

Shmmax sets the maximum value of a single shared memory segment in byte

[verify effective method]

Execute a command

Cat / proc/sys/kernel/shmmax

[test method]

Use the following command

Ipcmk

The total amount of shared memory allowed by shmall, in pages

[verify effective method]

Execute a command

Cat / proc/sys/kernel/shmall

[test method]

Use the following command

Ipcmk

Maximum number of shared memory segments within the shmmni system

[verify effective method]

Execute a command

Cat / proc/sys/kernel/shmmni

[test method]

Use the following command

Ipcmk

Maximum number of threads in threadsmax system

[verify effective method]

Execute a command

Cat / proc/sys/kernel/threads-max

[test method]

None for the time being

Maximum number of file descriptors assigned by filemax to the process

[verify effective method]

Execute a command

Cat / proc/sys/kernel/file-max

[test method]

None for the time being

System real-time monitoring

1. File monitoring

Monit toggle File Monitor switch

List of files monitored by file list

[test method]

After setting the file list, and then turning on the monitor switch, you can view the report file using the following command

Tail-f / etc/safedog/monitor/filemonit.txt

The generation, modification and deletion of files or folders in the file list will be immediately reflected in the report file.

The generation, modification and deletion of files in the folder or first-level folder in the file list will also be reflected in the report file immediately.

[note]

It is not monitored recursively into a subdirectory, and the monitor cannot be started when the file name list is empty.

2. Process monitoring

Monit toggle process Monitor switch

List of process names (must include running parameters) monitored by process list

[test method]

After setting the list of process names, and then turning on the monitor switch, you can view the report file using the following command

Tail-f / etc/safedog/monitor/processmonit.txt

Use the command

Top or ps aux

You can see if the process is running, and the monitor restarts the process as soon as it ends or is kill.

For example, set the process name list to

/ bin/sleep 5

/ bin/sleep 15

As you can see, these two processes will always be running in the process, and will be restarted as soon as it is over.

Note that the monitor cannot be started when the process name list is empty.

[note]

This function is only suitable for monitoring daemons that can be started by a command. The correct way to use this function is not to start the service to be monitored initially, but to let the security dog start the monitored process automatically by adding the process startup command to be monitored. Otherwise, the security dog may not be able to match the process name in the process list because of the different startup process. (for example, to monitor the vsftpd process, if the monitoring content added by the user is "vsftpd &", but the user starts the vsftpd command with the command service vsftpd start before that, there will be an error. )

3. Cpu monitoring

Monit toggle cpu usage Monitor switch

Cpu ceil cpu usage monitoring upper limit (higher than this value to write to the report)

Cpu floor cpu usage monitoring lower limit (below this value to write report)

[test method]

After setting the monitoring scope, and then turning on the monitor switch, you can view the report file using the following command

Tail-f / etc/safedog/monitor/cpumonit.txt

4. Memory monitoring

Monit toggle memory usage Monitor switch

Upper limit of memory use ceil memory usage monitoring (higher than this value to write report)

Display the current memory usage and free capacity of the system at the same time

[test method]

After setting the monitoring scope, and then turning on the monitor switch, you can view the report file using the following command

Tail-f / etc/safedog/monitor/memorymonit.txt

5. Disk capacity monitoring

Disk partitions monitored by partition, such as / dev/sda1

Upper limit of disk capacity monitored by ceil (higher than this value to write to the report)

Lower limit of disk capacity monitored by floor (below this value to write report)

Report interval value of disk capacity monitored by interval (write report when increment or decrease is greater than this value)

[test method]

After setting the monitoring scope, and then turning on the monitor switch, you can view the report file using the following command

Tail-f / etc/safedog/monitor/ diskvolumemonit.txt

6. File backup

Absolute path of files that file needs to back up

The destination directory of the backup file in the backup directory save direction

When the file size monitored by backup size exceeds this value, the file will be compressed and backed up to the backup directory while emptying the original file

[test method]

After setting the monitoring path and backup, turn on the monitor switch, and when the file size exceeds the set value, you can check the target directory of the backup and the contents of the monitored files.

7. Tcp listening port

Displays the tcp port that is listening on the current system and the corresponding address, process id, and process name.

Application Settings

1 、 iptables

Displays a list of the current rule sets for iptables and the default policy (policy) for the rule chain.

You can add some simple rules to the input chain or output chain in iptables, including protocol type (tcp/udp), source address, source port, destination address, destination port, behavior, etc.

[test method]

After adding the corresponding rules through the software, test whether the corresponding rules are effective through the network test.

[note]

The setting of iptables through this software is lost after restart.

2 、 vsftpd

Do some simple configuration for the vsftpd that has been installed and not configured on the system.

Whether anonym enable allows anonymous users to log in

Does anonym upload allow anonymous users to upload permissions?

Does anonym make directory allow anonymous users to establish folder permissions?

Root path of the anonym root path anonymous user

Whether local user enable allows local users to log in

Whether write enable allows write permission, these switches affect all operations that need to use write permission.

Ftp start starts and stops the ftp service

Ftp restore default initializes or restores the default configuration of dump, which must be initialized when entering for the first time.

[test method]

Start vsftpd after the configuration is complete, and then access the local ftpd server over the network to test whether the configuration item is in effect.

Enter on the browser

Ftp:// Server ip/

Access the ftp server

[note]

This software can only configure vsftpd simply. If you need more complex settings, please directly refer to the vsftpd manual to edit the configuration file. When using this feature, you must first start the "ftp restore default" function to initialize the configuration. After initialization, the configuration information before vsftpd will be lost. At the same time, the root directory of anonymous users is set to / srv/ftp, and the / srv/ftp/upload directory is the upload directory of anonymous users. The relevant settings can also be re-modified through the software. After the software is configured, in order to use the configuration to take effect, you need to shut down the service and then restart the service (that is, restart the service) in the "ftp start" on the software interface.

3 、 samba

Do some simple configuration for the samba that has been installed and not configured on the system.

Path to the share directory path shared folder

Anonymous write permissions for share write enable shared folders

Samba start starts to stop sharing

Samba restore default initialization configuration file, which must be initialized when entering for the first time

[test method]

Start samba after the configuration is complete, and then test whether the configuration item is in effect by accessing the local samba shared folder over the network.

Enter on the browser

\\ Server ip\

Access the samba shared server

[note]

Refer to the considerations of vsftpd.

Software uninstall

Execute the command in the previously extracted safedog_1.0.0.tar.gz directory:

. / uninstall.sh

That's it.

At this point, the study on "how to install and use the Linux version of software" is over. I hope to be able to solve your doubts. The collocation of theory and practice can better help you learn, go and try it! If you want to continue to learn more related knowledge, please continue to follow the website, the editor will continue to work hard to bring you more practical articles!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report