Chinese Professor’s Actions Spark Outrage After Linux Kernel Blacklists University for Submitting Vulnerabilities

Author | Xu Xuanjuan“Even if you can provide evidence that those patches are effective, why are we actually wasting time doing extra work?” Linus Torvalds must be furious. Recently, Greg Kroah-Hartman, the maintainer of the Linux kernel stable branch, blacklisted the University of Minnesota (UMN), prohibiting it from submitting patches to the mainline Linux kernel. … Read more

Security Measures to Prevent Injection Attacks When Deploying Large-Scale Models on Linux Systems

1. System-Level Hardening 1. Dynamic Firewall Configuration Firewall Configuration: Use firewall tools such as iptables or firewalld to strictly limit access to the model server. For example, only open specific ports required for model services and allow access only from trusted IP addresses or network segments. Example command: Allow a specific IP (e.g., 192.168.1.100) to … Read more

Installation and Configuration of PostgreSQL Debugger Plugin on Debian Linux

Installation of the Plugin Program on PostgreSQL Server in Debian Linux Execute the following command on the PostgreSQL database server running Debian system to install the plugin pldebugger: sudo apt install postgresql-15-pldebugger # After running this command, it seems that the pgsql service automatically restarted. According to the logs, it appears that there is no … Read more

Linux File Search Tools: Locate vs. Find – Which is Your Best Choice?

There are many search tools in Linux, and today we will mainly discuss two tools: locate and find. 01 Locate 1. Performance Overview Queries the pre-built file index database on the system /var/lib/mlocate/mlocate.db Note: If this file is deleted, locate will not work. The database must be manually updated (updatedb), or the system must be … Read more

25 Linux Server Security Tips You Can Always Use!

链接:https://blog.csdn.net/2401_84578953/article/details/144244011? ☞The course by Liang Xu has completely exploded!☜ Everyone thinks that Linux is secure by default, and I generally agree (this is a controversial topic). Linux does indeed have a built-in security model. You need to enable it and customize it to achieve a more secure system. Linux is harder to manage, but correspondingly … Read more

Is Your Server Memory Full? A Quick Linux Command to Free Up Memory!

If your server’s memory usage is too high, causing slow performance or crashes, you can try the following Linux command to quickly free up cached memory: # This parameter can be used to instruct the kernel to actively free memory caches, but it will not affect running programs. sync; echo 3 > /proc/sys/vm/drop_caches Command Explanation … Read more

Basic Linux for Bioinformatics (Part 2)

tar PART 01 Function Description: Add or restore files from backup files Syntax: tar -f[cxzjv] <file> Parameters: -f is a required parameter -c Create a backup file -x Extract files from the backup file -z Use gzip/gunzip to compress/decompress files -j Use bzip2/bunzip2 to compress/decompress files -v Show the command execution process Example: tar -cf … Read more

Understanding the Linux Virtual File System (VFS)

Click on the above“Linux Tech Enthusiast” to select “Set as Favorite” High-quality articles delivered promptly ☞【Essentials】ChatGPT 4.0 is unlocked, no limit on questions!!! ☞【Essentials】Tsinghua University senior's self-study Linux notes, top-level quality! ☞【Essentials】Comprehensive guide to commonly used Linux commands, all in one article ☞【Essentials】Collection! Linux basic to advanced learning roadmap Original link:https://blog.csdn.net/KUNPLAYBOY/article/details/123191919 Introduction The virtual file … Read more

Linux Emergency Response – Common Service Logs

System Logs btmp /var/log/btmp records all login attempts that failed, displaying the last ten entries. root@mon0dy-ubuntu:~# lastb –time-format iso -10 root ssh:notty 58.56.52.226 2023-03-11T14:30:23+0800 – 2023-03-11T14:30:23+0800 (00:00) root ssh:notty 58.56.52.226 2023-03-11T14:30:20+0800 – 2023-03-11T14:30:20+0800 (00:00) root ssh:notty 58.56.52.226 2023-03-11T14:30:16+0800 – 2023-03-11T14:30:16+0800 (00:00) root ssh:notty 58.56.52.226 2023-03-11T14:30:05+0800 – 2023-03-11T14:30:05+0800 (00:00) root ssh:notty 58.56.52.226 2023-03-11T14:30:02+0800 – 2023-03-11T14:30:02+0800 (00:00) … Read more

Linux Threads and Hyper-Threading

1. Definition A thread is an execution flow of a process and is the basic unit of CPU scheduling and dispatching. It is a smaller unit that can run independently compared to a process. A process consists of several threads, and threads belonging to the same process share all the resources owned by the process. … Read more