mkdir /var/lib/rpm/backup cp -a /var/lib/rpm/__db* /var/lib/rpm/backup/ rm -f /var/lib/rpm/__db.[0-9][0-9]* rpm –quiet -qa rpm –rebuilddb yum clean all
|
||||||
mkdir /var/lib/rpm/backup cp -a /var/lib/rpm/__db* /var/lib/rpm/backup/ rm -f /var/lib/rpm/__db.[0-9][0-9]* rpm –quiet -qa rpm –rebuilddb yum clean all Downgrade with glibc Update to using YUM 1). Existing RPM version checking and backup #rpm -qa | grep glibc compat-glibc-headers-2.3.4-2.26 glibc-common-2.5-81 glibc-devel-2.5-81 compat-glibc-2.3.4-2.26 compat-glibc-2.3.4-2.26 glibc-2.5-81 glibc-headers-2.5-81 glibc-devel-2.5-81 glibc-2.5-81 2). createrepo REPODATA /usr/local/src/new_glibc # pwd /usr/local/src/new_glibc #createrepo ./ 12/12 – glibc-devel-2.5-123.el5_11.1.i386.rpm Saving Primary metadata Saving file lists metadata Saving other metadata 3). old_glibc.repo #vim /etc/yum.repos.d/new_glibc.repo [old-glibc] […] Linux defaults to allow ping responses, which means that ping is on, but ping may be the start of a network attack, so turning off ping can improve the server’s security factor. Whether the system allows ping is determined by two factors: 1. Kernel parameters, 2. Firewall. Two factors are required to allow ping […] This configuration allows you to: ssh logins between cluster servers. If you only want to ssh login from other machines (slave1, slave2) from a single machine (such as master), only follow the second step. It is recommended to spend two or three minutes to read the full text and then follow the steps Steps: 1. […] Patching a server is an important task for Linux system administrators in order to make the system more stable and perform better. Manufacturers often release some security / high-risk patches, the software needs to be upgraded to guard against potential security risks. Yum (Yellowdog Update Modified) is an RPM package management tool used on CentOS […] Linux to achieve SSH password-free remote access server Description Usually use SSH login remote server, you need to use the input password, hoping to achieve through the key login and exemption from the input password, which can be achieved for the future batch automatic deployment of the host to prepare. The environment is as follows: […] Install Docker [root@clusterserver3 /]# yum -y install docker Loaded plugins: fastestmirror base | 3.6 kB 00:00:00 extras | 3.4 kB 00:00:00 updates | 3.4 kB 00:00:00 Loading mirror speeds from cached hostfile * base: mirror.nus.edu.sg * extras: mirror.nus.edu.sg * updates: mirror.nus.edu.sg Resolving Dependencies –> Running transaction check —> Package docker.x86_64 0:1.8.2-10.el7.centos will be installed –> […] Counting number of users in a group – Linux Here is a small command to find number of users in particular group on a *nix system. An example for wheel group: grep wheel /etc/group | fgrep -o , | wc -m Now here’s a catch, this command actually counts the commas in the line from […] $ make test You need tcl 8.5 or newer in order to run the Redis test make: *** [test] rpm -qa | grep tcl yum install tcl Technically at the moment there isn’t anything really wrong with the SHA-1 hash function, but it is now quite old and is starting to show potential cracks. Hence the reason that the security industry is advising to move to something better. In this case SHA-256. 1. Generate a SSL Key File Firstly you will need […] |
||||||
Copyright © 2024 - All Rights Reserved Powered by WordPress & Atahualpa |
Recent Comments