Home IT Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ Under Ubuntu on how to use iptables firewall     - Arronax allows you to easily create desktop startup file (Linux)

- Processor in protected mode of protection (Linux)

- MySQL 5.6 master-slave replication configuration (Database)

- How Datadog monitor Nginx (Server)

- Vagrant build LNMP environment (Server)

- Python objects (Programming)

- Oracle 11g R2 RAC RMAN backup script example (Database)

- Windows Remote Desktop Management CentOS 6.4 (Linux)

- How to manage your to-do list with the Go For It on Ubuntu (Linux)

- Transfer MySQL database to MariaDB (Database)

- MySQL Online DDL tools of pt-online-schema-change (Database)

- OpenStack Folsom create an instance of the failure of the Quota Fixed_IP articles (Server)

- Job achieve automation in Ubuntu 14.04 - Using Cron (Linux)

- Getting Started with Linux system to learn: how to install the kernel headers on Linux (Linux)

- Oracle 10046 Event (Database)

- Web database security tips (Linux)

- Bitmap memory footprint of computing Android memory optimization (Linux)

- Dual system Linux (Ubuntu) into the Windows NTFS partition's mount error (Linux)

- Git Getting Started tutorial (Linux)

- Installation on Ubuntu class Winamp audio player Qmmp 0.9.0 (Linux)

 
         
  Under Ubuntu on how to use iptables firewall
     
  Add Date : 2018-11-21      
         
       
         
  Ubuntu and Fedora still some operational differences.

For example, Fedora has its own iptables rules file, Ubuntu is no need to manually build one.

You can use this command: iptables-save> /etc/iptables.up.rules then applied directly when needed is also very simple: iptables-restore < /etc/iptables.up.rules
     
         
       
         
  More:      
 
- Security: set limits on password (Linux)
- Linux platform Oracle MySQL connection (Database)
- Several reasons MySQL garbled (Database)
- Linux use iptables ban Ping (Linux)
- Ubuntu 14.04 Install WordPress on Nginx (Server)
- MYSQL root password for the database user passwords are weak attack analysis (Linux)
- CentOS 7 hard disk expansion toss record (Linux)
- Linux system security check method (Linux)
- How Oracle implements random reads from specific combinations (Database)
- Let Git variety of colors and custom log format output (Linux)
- Android Studio Personalization (Linux)
- How to use the DM-Crypt encryption Linux File System (Linux)
- Node.js simple interface server (Server)
- Linux distributed message queue RocketMQ deployment and monitoring - Dual Master (Server)
- Use Ansible to bulk manage remote servers (Server)
- How to extend / remove swap partitions (Linux)
- Android development environment to build under Fedora 13 (Linux)
- In addition to wget and curl, what better alternatives (Linux)
- Configure the Linux kernel and use iptables to do port mapping (Linux)
- Depth Java Singleton (Programming)
     
           
     
  CopyRight 2002-2016 newfreesoft.com, All Rights Reserved.