Click here for "Error Codes for Commercial Air Conditioners".

nuy

Rocky Linux9.2_en

Rocky Linux9.2 ; System Backup and Restore

1.Website data backup 1-1.Backup under /var/www/html ①Create backup script file # cd /var/www/system # vi backup_html.sh 2.MySQL database backup ①Create backup script file # cd /var/www/system # vi db_my_backup.sh 3.Restore backup files under html ①Store HTML backup files in "/ (root)" directory 4.Restore Mysql backup file ①Save the database backup file to any directory and (In the example, the directory is "/var/www/backup/db_bak".)Extracting data
Almalinux9.2_en

AlmaLinux9.2 ; MySQL8 , WordPress Install

Mysql8 , WordPress Install WordPress Install 1. Create database for Word Press As an example, assume database [wp_db] database user [wp_user] password [?Ww123456]
Rocky Linux9.1_en

RockyLinux 9.1 ; Anti-virus(Clamav) , Mail Server

clamav (anti-virus software] Install 1.Clam AntiVirus install # dnf -y install clamav clamd clamav-update 2.Clam AntiVirus  Configuration File Edit Mail Server Install 1. Postfix 1.1 Install Install Postfix and build an SMTP server
Almalinux9.2_en

AlmaLinux9.2 ; Suricata , Tripwire , Chkrootkit

Suricata SURICATA IDS/IPS is an open source IDS that monitors communications on the network and detects suspicious traffic. The basic mechanism is signature-based, so it can detect predefined unauthorized communications. Suricata is also characterized by its ability to provide protection as well as detection. Tripwire 1.Download and installation Chkrootkit ①Download and install chkrootkit
Almalinux9.2_en

AlmaLinux9.2 ; Authenticated SSH connection with key pair

SSH connection with authentication using public key cryptography  Create public and private key pairs Create a public/private key pair for a user connecting to a Linux server using OpenSSH. Use ssh-keygen to create the key pair. The creation of a public/private key pair must be done as a user with remote login privileges. If you do not specify the destination and file name, id_ed25519 and id_ed25519.pub will be created in /home/(user name)/.ssh/. On the way, enter the password for the key.
Almalinux9.1_en

AlmaLinux 9.1 ; Anti-virus(Clamav) , Mail Server

clamav (anti-virus software] Install 1.Clam AntiVirus install # dnf -y install clamav clamd clamav-update 2.Clam AntiVirus  Configuration File Edit Mail Server Install 1. Postfix 1.1 Install Install Postfix and build an SMTP server
fedora38_en

Fedora38 ; OS Install

Fedora ; Download Fedora38 can be downloaded from the following mirror sites http://ftp.riken.jp/Linux/fedora/releases/38/Server/x86_64/iso/ The file to download is the "Fedora-Server-netinst-x86_64-38-1.6.iso" image Create an installation disk from the downloaded "Fedora-Server-netinst-x86_64-38-1.6.iso" image on a USB disk and install it on the actual device.
fedora38_en

Fedora38 ; SSL Certificate Acquisition( Let's Encrypt ) , Apache / Mail SSL/TLS

1.Obtain an SSL certificate ( Let's Encrypt ) Install the latest open ssl 3. SSL/TLS (Let's Encrypt) settings on the mail server 3.1 Obtaining a certificate for the mail server Obtain a certificate for the mail server, but since it cannot be obtained in the same way as above, stop the web server once and add the "--standalone" option. 2. Converting Apache to https Install the following just in case
fedora38_en

Fedora38 ; Mysql8 , WordPress Install

MySQL8 Install ①Install ➁MySQL Server start ➂Check mysql ver...
fedora38_en

Fedora38 ; SNORT2 , Suricata , Tripwire

SNORT Snort is an open source network intrusion detection system capable of performing real-time traffic analysis and packet logging on IP networks. It can perform "protocol analysis," "content search," and "matching," and can be used to detect a variety of attacks, including "buffer overflows," "stealth port scans," "CGI attacks," "SMB probes," "OS fingerprinting attempts," "semantic URL attacks," and "server message block probes. Suricata SURICATA IDS/IPS is an open source IDS that monitors communications on the network and detects suspicious traffic. The basic mechanism is signature-based, so it can detect predefined unauthorized communications. Suricata is also characterized by its ability to provide protection as well as detection.
fedora37_en

Fedora37 ; System Backup and Restore

1.Website data backup Backup under /var/www/html ①Create bac...
fedora37_en

Fedora37 ; Clamav , Mail Server

Clamav 1.Clam AntiVirus Install 2.Edit Clam AntiVirus config...
fedora37_en

Fedora37 ; FTP Server(Vsftpd) , File Server(Samba)

1.FTP Server Installation 1. 1 vsftpd Install 2. vsftpd SSL/TLS Configure Vsftpd to use SSL/TLS 2.1 Create self-signed certificates This work is not required if you are using a trusted, legitimate certificate such as Let's Encrypt. 3. File server installation with Samba Build a file server with access rights that requires user authentication with Samba. Installation Procedure ① Create shared folders with access rights that require user authentication ②Creation of accessible groups ③Creation of users belonging to groups that can be accessed ④Configuration File Editing
fedora37_en

Fedora37 ; Remote connection with SSH public key cryptography

1.Creation of public and private key pairs Create a public/private key pair for a user connecting to a Linux server using OpenSSH. Use ssh-keygen to create the key pair. The creation of a public/private key pair is performed with the authority of the user logging in remotely. If you do not specify the creation destination and file name, id_ed25519 and id_ed25519.pub will be created in /home/(user name)/.ssh/. On the way, also enter the password for the key.
fedora37_en

Fedora37 ; Various settings after installation

1. SELinux Disable First, disable selinux. selinux is a feature that improves auditing and security in Linux, but when enabled, it can limit the behavior of services and the configuration considerably. Therefore, it is basically invalidated in many cases. You can disable it by doing the following。