<![CDATA[Messages posted by "Michael_Scotfield"]]> /hvaonline/posts/listByUser/206944.html JForum - http://www.jforum.net XenServer không thể cài trên server SuperMicro /hvaonline/posts/preList/41792/260450.html#260450 /hvaonline/posts/preList/41792/260450.html#260450 GMT Load Balancing – Failover với Pfsense2 /hvaonline/posts/preList/39917/246146.html#246146 /hvaonline/posts/preList/39917/246146.html#246146 GMT HCM - Tìm bạn cấu hình và quản trị Server web windows - Bán thời gian /hvaonline/posts/preList/39103/241197.html#241197 /hvaonline/posts/preList/39103/241197.html#241197 GMT Làm thế nào nhận biết các máy client trong LAN có bị nhiễm virus ? /hvaonline/posts/preList/39165/240893.html#240893 /hvaonline/posts/preList/39165/240893.html#240893 GMT Làm thế nào nhận biết các máy client trong LAN có bị nhiễm virus ? /hvaonline/posts/preList/39165/240806.html#240806 /hvaonline/posts/preList/39165/240806.html#240806 GMT Hỏi về cách íntall Mod_Security_CRS Code:
http://localhost/c99.php
Audit log ghi nhận Code:
SecAction "phase:1,t:none,nolog,pass,setvar:tx.critical_anomaly_score=5,setvar:tx.error_anomaly_score=4,setvar:tx.warning_anomaly_score=3,setvar:tx.notice_anomaly_score=2"

SecAction "phase:1,t:none,nolog,pass,setvar:tx.inbound_anomaly_score_level=5"

SecAction "phase:1,t:none,nolog,pass,setvar:tx.outbound_anomaly_score_level=4"

SecAction "phase:1,t:none,nolog,pass,setvar:tx.paranoid_mode=0"

SecAction "phase:1,t:none,nolog,pass,setvar:tx.max_num_args=255"

SecAction "phase:1,t:none,nolog,pass,setvar:'tx.allowed_methods=GET HEAD POST OPTIONS',setvar:'tx.allowed_request_content_type=application/x-www-form-urlencoded multipart/form-data text/xml application/xml application/x-amf',setvar:'tx.allowed_http_versions=HTTP/0.9 HTTP/1.0 HTTP/1.1',setvar:'tx.restricted_extensions=.asa/ .asax/ .ascx/ .axd/ .backup/ .bak/ .bat/ .cdx/ .cer/ .cfg/ .cmd/ .com/ .config/ .conf/ .cs/ .csproj/ .csr/ .dat/ .db/ .dbf/ .dll/ .dos/ .htr/ .htw/ .ida/ .idc/ .idq/ .inc/ .ini/ .key/ .licx/ .lnk/ .log/ .mdb/ .old/ .pass/ .pdb/ .pol/ .printer/ .pwd/ .resources/ .resx/ .sql/ .sys/ .vb/ .vbs/ .vbproj/ .vsdisco/ .webinfo/ .xsd/ .xsx/',setvar:'tx.restricted_headers=/Proxy-Connection/ /Lock-Token/ /Content-Range/ /Translate/ /via/ /if/'"

SecRule "REQUEST_HEADERS:User-Agent" "@rx ^(.*)$" "phase:1,t:none,pass,nolog,t:sha1,t:hexEncode,setvar:tx.ua_hash=%{matched_var}"

SecAction "phase:1,t:none,pass,nolog,initcol:global=global,initcol:ip=%{remote_addr}_%{tx.ua_hash}"

SecRule "REQUEST_METHOD" "@rx ^(?:GET|HEAD)$" "phase:1,log,chain,rev:2.1.2,t:none,block,msg:'GET or HEAD requests with bodies',severity:2,id:960011,tag:PROTOCOL_VIOLATION/EVASION,tag:WASCTC/WASC-21,tag:OWASP_TOP_10/A7,tag:PCI/6.5.10,tag:http://www.w3.org/Protocols/rfc2616/rfc2616-sec4.html#sec4.3"
#SecRule "REQUEST_HEADERS:Content-Length" "!@rx ^0?$" "t:none,setvar:tx.msg=%{rule.msg},setvar:tx.protocol_violation_score=+%{tx.notice_anomaly_score},setvar:tx.anomaly_score=+%{tx.notice_anomaly_score},setvar:tx.%{rule.id}-PROTOCOL_VIOLATION/INVALID_HREQ-%{matched_var_name}=%{matched_var}"

SecRule "REQUEST_METHOD" "!@rx ^OPTIONS$" "phase:2,log,chain,rev:2.1.2,t:none,block,msg:'Request Missing an Accept Header',severity:2,id:960015,tag:PROTOCOL_VIOLATION/MISSING_HEADER_ACCEPT,tag:WASCTC/WASC-21,tag:OWASP_TOP_10/A7,tag:PCI/6.5.10"
#SecRule "&REQUEST_HEADERS:Accept" "@eq 0" "t:none,setvar:tx.msg=%{rule.msg},setvar:tx.anomaly_score=+%{tx.notice_anomaly_score},setvar:tx.protocol_violation_score=+%{tx.notice_anomaly_score},setvar:tx.%{rule.id}-PROTOCOL_VIOLATION/MISSING_HEADER-%{matched_var_name}=%{matched_var}"

SecRule "REQUEST_METHOD" "!@rx ^OPTIONS$" "phase:2,log,chain,rev:2.1.2,t:none,block,msg:'Request Has an Empty Accept Header',severity:2,id:960021,tag:PROTOCOL_VIOLATION/MISSING_HEADER_ACCEPT"
#SecRule "REQUEST_HEADERS:Accept" "@rx ^$" "t:none,setvar:tx.msg=%{rule.msg},setvar:tx.anomaly_score=+%{tx.notice_anomaly_score},setvar:tx.protocol_violation_score=+%{tx.notice_anomaly_score},setvar:tx.%{rule.id}-PROTOCOL_VIOLATION/MISSING_HEADER-%{matched_var_name}=%{matched_var}"

SecRule "&REQUEST_HEADERS:Content-Type" "@eq 0" "phase:2,log,chain,rev:2.1.2,t:none,block,msg:'Request Containing Content, but Missing Content-Type header',id:960904,severity:5"
#SecRule "REQUEST_HEADERS:Content-Length" "!@rx ^0$" "t:none,setvar:tx.msg=%{rule.msg},setvar:tx.anomaly_score=+%{tx.notice_anomaly_score},setvar:tx.protocol_violation_score=+%{tx.notice_anomaly_score},setvar:tx.%{rule.id}-PROTOCOL_VIOLATION/MISSING_HEADER-%{matched_var_name}=%{matched_var}"

SecRule "&TX:MAX_NUM_ARGS" "@eq 1" "phase:2,log,chain,t:none,block,msg:'Too many arguments in request',id:960335,severity:4,rev:2.1.2"
#SecRule "&ARGS" "@gt %{tx.max_num_args}" "t:none,setvar:tx.msg=%{rule.msg},setvar:tx.anomaly_score=+%{tx.notice_anomaly_score},setvar:tx.policy_score=+%{tx.notice_anomaly_score},setvar:tx.%{rule.id}-POLICY/SIZE_LIMIT-%{matched_var_name}=%{matched_var}"

SecRule "REQUEST_BASENAME" "@rx \\.(.*)$" "phase:2,log,chain,capture,setvar:tx.extension=.%{tx.1}/,t:none,t:urlDecodeUni,t:lowercase,block,msg:'URL file extension is restricted by policy',severity:2,id:960035,tag:POLICY/EXT_RESTRICTED,tag:WASCTC/WASC-15,tag:OWASP_TOP_10/A7,tag:PCI/6.5.10,logdata:%{TX.0}"
#SecRule "TX:EXTENSION" "@within %{tx.restricted_extensions}" "t:none,setvar:tx.msg=%{rule.msg},setvar:tx.anomaly_score=+%{tx.warning_anomaly_score},setvar:tx.policy_score=+%{tx.warning_anomaly_score},setvar:tx.%{rule.id}-POLICY/EXT_RESTRICTED-%{matched_var_name}=%{matched_var}"

SecRule "REQUEST_HEADERS_NAMES" "@rx ^(.*)$" "phase:2,log,chain,t:none,block,msg:'HTTP header is restricted by policy',id:960038,tag:POLICY/HEADER_RESTRICTED,tag:POLICY/FILES_NOT_ALLOWED,tag:WASCTC/WASC-21,tag:OWASP_TOP_10/A7,tag:PCI/12.1,tag:WASCTC/WASC-15,tag:OWASP_TOP_10/A7,tag:PCI/12.1,severity:4,logdata:%{matched_var},capture,setvar:tx.header_name='/%{tx.0}/'"
#SecRule "TX:HEADER_NAME" "@within %{tx.restricted_headers}" "setvar:tx.msg=%{rule.msg},setvar:tx.anomaly_score=+%{tx.warning_anomaly_score},setvar:tx.policy_score=+%{tx.warning_anomaly_score},setvar:tx.%{rule.id}-POLICY/HEADERS_RESTRICTED-%{matched_var_name}=%{matched_var}"

SecRule "REQUEST_HEADERS_NAMES" "@rx ^(.*)$" "phase:2,log,chain,t:none,block,msg:'HTTP header is restricted by policy',id:960038,tag:POLICY/HEADER_RESTRICTED,tag:POLICY/FILES_NOT_ALLOWED,tag:WASCTC/WASC-21,tag:OWASP_TOP_10/A7,tag:PCI/12.1,tag:WASCTC/WASC-15,tag:OWASP_TOP_10/A7,tag:PCI/12.1,severity:4,logdata:%{matched_var},capture,setvar:tx.header_name='/%{tx.0}/'"
#SecRule "TX:HEADER_NAME" "@within %{tx.restricted_headers}" "setvar:tx.msg=%{rule.msg},setvar:tx.anomaly_score=+%{tx.warning_anomaly_score},setvar:tx.policy_score=+%{tx.warning_anomaly_score},setvar:tx.%{rule.id}-POLICY/HEADERS_RESTRICTED-%{matched_var_name}=%{matched_var}"

SecRule "REQUEST_HEADERS_NAMES" "@rx ^(.*)$" "phase:2,log,chain,t:none,block,msg:'HTTP header is restricted by policy',id:960038,tag:POLICY/HEADER_RESTRICTED,tag:POLICY/FILES_NOT_ALLOWED,tag:WASCTC/WASC-21,tag:OWASP_TOP_10/A7,tag:PCI/12.1,tag:WASCTC/WASC-15,tag:OWASP_TOP_10/A7,tag:PCI/12.1,severity:4,logdata:%{matched_var},capture,setvar:tx.header_name='/%{tx.0}/'"
#SecRule "TX:HEADER_NAME" "@within %{tx.restricted_headers}" "setvar:tx.msg=%{rule.msg},setvar:tx.anomaly_score=+%{tx.warning_anomaly_score},setvar:tx.policy_score=+%{tx.warning_anomaly_score},setvar:tx.%{rule.id}-POLICY/HEADERS_RESTRICTED-%{matched_var_name}=%{matched_var}"

SecRule "REQUEST_HEADERS_NAMES" "@rx ^(.*)$" "phase:2,log,chain,t:none,block,msg:'HTTP header is restricted by policy',id:960038,tag:POLICY/HEADER_RESTRICTED,tag:POLICY/FILES_NOT_ALLOWED,tag:WASCTC/WASC-21,tag:OWASP_TOP_10/A7,tag:PCI/12.1,tag:WASCTC/WASC-15,tag:OWASP_TOP_10/A7,tag:PCI/12.1,severity:4,logdata:%{matched_var},capture,setvar:tx.header_name='/%{tx.0}/'"
#SecRule "TX:HEADER_NAME" "@within %{tx.restricted_headers}" "setvar:tx.msg=%{rule.msg},setvar:tx.anomaly_score=+%{tx.warning_anomaly_score},setvar:tx.policy_score=+%{tx.warning_anomaly_score},setvar:tx.%{rule.id}-POLICY/HEADERS_RESTRICTED-%{matched_var_name}=%{matched_var}"

SecRule "REQUEST_HEADERS_NAMES" "@rx ^(.*)$" "phase:2,log,chain,t:none,block,msg:'HTTP header is restricted by policy',id:960038,tag:POLICY/HEADER_RESTRICTED,tag:POLICY/FILES_NOT_ALLOWED,tag:WASCTC/WASC-21,tag:OWASP_TOP_10/A7,tag:PCI/12.1,tag:WASCTC/WASC-15,tag:OWASP_TOP_10/A7,tag:PCI/12.1,severity:4,logdata:%{matched_var},capture,setvar:tx.header_name='/%{tx.0}/'"
#SecRule "TX:HEADER_NAME" "@within %{tx.restricted_headers}" "setvar:tx.msg=%{rule.msg},setvar:tx.anomaly_score=+%{tx.warning_anomaly_score},setvar:tx.policy_score=+%{tx.warning_anomaly_score},setvar:tx.%{rule.id}-POLICY/HEADERS_RESTRICTED-%{matched_var_name}=%{matched_var}"

SecRule "REQUEST_HEADERS_NAMES" "@rx ^(.*)$" "phase:2,log,chain,t:none,block,msg:'HTTP header is restricted by policy',id:960038,tag:POLICY/HEADER_RESTRICTED,tag:POLICY/FILES_NOT_ALLOWED,tag:WASCTC/WASC-21,tag:OWASP_TOP_10/A7,tag:PCI/12.1,tag:WASCTC/WASC-15,tag:OWASP_TOP_10/A7,tag:PCI/12.1,severity:4,logdata:%{matched_var},capture,setvar:tx.header_name='/%{tx.0}/'"
#SecRule "TX:HEADER_NAME" "@within %{tx.restricted_headers}" "setvar:tx.msg=%{rule.msg},setvar:tx.anomaly_score=+%{tx.warning_anomaly_score},setvar:tx.policy_score=+%{tx.warning_anomaly_score},setvar:tx.%{rule.id}-POLICY/HEADERS_RESTRICTED-%{matched_var_name}=%{matched_var}"

SecRule "REQUEST_HEADERS_NAMES" "@rx ^(.*)$" "phase:2,log,chain,t:none,block,msg:'HTTP header is restricted by policy',id:960038,tag:POLICY/HEADER_RESTRICTED,tag:POLICY/FILES_NOT_ALLOWED,tag:WASCTC/WASC-21,tag:OWASP_TOP_10/A7,tag:PCI/12.1,tag:WASCTC/WASC-15,tag:OWASP_TOP_10/A7,tag:PCI/12.1,severity:4,logdata:%{matched_var},capture,setvar:tx.header_name='/%{tx.0}/'"
#SecRule "TX:HEADER_NAME" "@within %{tx.restricted_headers}" "setvar:tx.msg=%{rule.msg},setvar:tx.anomaly_score=+%{tx.warning_anomaly_score},setvar:tx.policy_score=+%{tx.warning_anomaly_score},setvar:tx.%{rule.id}-POLICY/HEADERS_RESTRICTED-%{matched_var_name}=%{matched_var}"

SecRule "REQUEST_HEADERS_NAMES" "@rx ^(.*)$" "phase:2,log,chain,t:none,block,msg:'HTTP header is restricted by policy',id:960038,tag:POLICY/HEADER_RESTRICTED,tag:POLICY/FILES_NOT_ALLOWED,tag:WASCTC/WASC-21,tag:OWASP_TOP_10/A7,tag:PCI/12.1,tag:WASCTC/WASC-15,tag:OWASP_TOP_10/A7,tag:PCI/12.1,severity:4,logdata:%{matched_var},capture,setvar:tx.header_name='/%{tx.0}/'"
#SecRule "TX:HEADER_NAME" "@within %{tx.restricted_headers}" "setvar:tx.msg=%{rule.msg},setvar:tx.anomaly_score=+%{tx.warning_anomaly_score},setvar:tx.policy_score=+%{tx.warning_anomaly_score},setvar:tx.%{rule.id}-POLICY/HEADERS_RESTRICTED-%{matched_var_name}=%{matched_var}"

SecRule "REQUEST_HEADERS_NAMES" "@rx ^(.*)$" "phase:2,log,chain,t:none,block,msg:'HTTP header is restricted by policy',id:960038,tag:POLICY/HEADER_RESTRICTED,tag:POLICY/FILES_NOT_ALLOWED,tag:WASCTC/WASC-21,tag:OWASP_TOP_10/A7,tag:PCI/12.1,tag:WASCTC/WASC-15,tag:OWASP_TOP_10/A7,tag:PCI/12.1,severity:4,logdata:%{matched_var},capture,setvar:tx.header_name='/%{tx.0}/'"
#SecRule "TX:HEADER_NAME" "@within %{tx.restricted_headers}" "setvar:tx.msg=%{rule.msg},setvar:tx.anomaly_score=+%{tx.warning_anomaly_score},setvar:tx.policy_score=+%{tx.warning_anomaly_score},setvar:tx.%{rule.id}-POLICY/HEADERS_RESTRICTED-%{matched_var_name}=%{matched_var}"

SecRule "REQUEST_HEADERS_NAMES" "@rx ^(.*)$" "phase:2,log,chain,t:none,block,msg:'HTTP header is restricted by policy',id:960038,tag:POLICY/HEADER_RESTRICTED,tag:POLICY/FILES_NOT_ALLOWED,tag:WASCTC/WASC-21,tag:OWASP_TOP_10/A7,tag:PCI/12.1,tag:WASCTC/WASC-15,tag:OWASP_TOP_10/A7,tag:PCI/12.1,severity:4,logdata:%{matched_var},capture,setvar:tx.header_name='/%{tx.0}/'"
#SecRule "TX:HEADER_NAME" "@within %{tx.restricted_headers}" "setvar:tx.msg=%{rule.msg},setvar:tx.anomaly_score=+%{tx.warning_anomaly_score},setvar:tx.policy_score=+%{tx.warning_anomaly_score},setvar:tx.%{rule.id}-POLICY/HEADERS_RESTRICTED-%{matched_var_name}=%{matched_var}"

SecRule "REQUEST_HEADERS_NAMES" "@rx ^(.*)$" "phase:2,log,chain,t:none,block,msg:'HTTP header is restricted by policy',id:960038,tag:POLICY/HEADER_RESTRICTED,tag:POLICY/FILES_NOT_ALLOWED,tag:WASCTC/WASC-21,tag:OWASP_TOP_10/A7,tag:PCI/12.1,tag:WASCTC/WASC-15,tag:OWASP_TOP_10/A7,tag:PCI/12.1,severity:4,logdata:%{matched_var},capture,setvar:tx.header_name='/%{tx.0}/'"
#SecRule "TX:HEADER_NAME" "@within %{tx.restricted_headers}" "setvar:tx.msg=%{rule.msg},setvar:tx.anomaly_score=+%{tx.warning_anomaly_score},setvar:tx.policy_score=+%{tx.warning_anomaly_score},setvar:tx.%{rule.id}-POLICY/HEADERS_RESTRICTED-%{matched_var_name}=%{matched_var}"

SecRule "TX:PARANOID_MODE" "!@eq 1" "phase:2,t:none,nolog,skipAfter:END_SESSION_FIXATION"

SecRule "TX:PARANOID_MODE" "!@eq 1" "phase:2,t:none,nolog,skipAfter:END_FILE_INJECTION"

SecRule "TX:PARANOID_MODE" "!@eq 1" "phase:2,t:none,nolog,skipAfter:END_COMMAND_ACCESS"

SecRule "TX:PARANOID_MODE" "!@eq 1" "phase:2,t:none,nolog,skipAfter:END_COMMAND_INJECTION"

SecRule "TX:PARANOID_MODE" "!@eq 1" "phase:2,rev:2.1.2,t:none,nolog,skipAfter:END_SQL_INJECTION_WEAK"

SecRule "TX:PARANOID_MODE" "!@eq 1" "phase:2,t:none,nolog,skipAfter:END_XSS_CHECK"

SecRule "RESPONSE_BODY" "!@pm iframe" "phase:4,rev:2.1.2,t:none,capture,t:urlDecodeUni,t:htmlEntityDecode,t:lowercase,nolog,skipAfter:END_IFRAME_CHECK"

SecRule "RESPONSE_BODY" "!@pmFromFile modsecurity_50_outbound.data" "phase:4,rev:2.1.2,t:none,capture,t:urlDecodeUni,t:htmlEntityDecode,nolog,skipAfter:END_OUTBOUND_CHECK"
]]>
/hvaonline/posts/preList/39118/240240.html#240240 /hvaonline/posts/preList/39118/240240.html#240240 GMT
Hướng dẫn config mail server centos 5 /hvaonline/posts/preList/38341/235834.html#235834 /hvaonline/posts/preList/38341/235834.html#235834 GMT how to config haproxy + heartbeat+drbd /hvaonline/posts/preList/38314/235348.html#235348 /hvaonline/posts/preList/38314/235348.html#235348 GMT Hỏi về test Mod_Security /hvaonline/posts/preList/38252/235117.html#235117 /hvaonline/posts/preList/38252/235117.html#235117 GMT Hỏi về test Mod_Security SecRule ARGS abc "phase:1,log,deny,status:503"   Nhưng khi truy cập vào server thì vẫn bình thường, không hiện lên status error 503, mặc dù audit log vẫn phát hiện và báo trùng rule ?
--1a203d52-A-- [06/Apr/2011:16:51:24 +0700] TZw3nH8AAQEAACawDO0AAABA 192.168.25.80 20062 192.168.25.90 80 --1a203d52-B-- GET /?test=abc HTTP/1.1 Host: 192.168.25.90 Connection: keep-alive User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.204 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 If-None-Match: "4163d-b1-4a03b3c0facd4" If-Modified-Since: Wed, 06 Apr 2011 07:49:38 GMT --1a203d52-F-- HTTP/1.1 304 Not Modified Last-Modified: Wed, 06 Apr 2011 07:49:38 GMT ETag: "4163d-b1-4a03b3c0facd4" Accept-Ranges: bytes Content-Length: 0 Vary: Accept-Encoding Keep-Alive: timeout=15, max=94 Connection: Keep-Alive Content-Type: text/html --1a203d52-E-- --1a203d52-H-- Message: Warning. Pattern match "abc" at ARGS:test. [file "/opt/modsecurity/etc/modsecurity.conf"] [line "28"] Stopwatch: 1302083484907582 37118 (36600 36603 -) Response-Body-Transformed: Dechunked Producer: ModSecurity for Apache/2.5.13 http://www.modsecurity.org/). Server: Apache/2.2.16 (Ubuntu) --1a203d52-K-- SecRule "ARGS" "@rx abc" "phase:1,auditlog,log,deny,status:503" --1a203d52-Z--  
Thật sự thì em chỉ mới setup đuơc chứ chưa nắm rõ rule, em chỉ muốn test thử xem mod_security đã hoạt động chưa không thôi, nên nếu em sai xót chổ nào ace góp ý giùm Em cám ơn ]]>
/hvaonline/posts/preList/38252/234898.html#234898 /hvaonline/posts/preList/38252/234898.html#234898 GMT
hỏi về giao thức ftp /hvaonline/posts/preList/38186/234805.html#234805 /hvaonline/posts/preList/38186/234805.html#234805 GMT Hỏi về cài đặt Webserver với IP Tĩnh được thuê /hvaonline/posts/preList/38228/234753.html#234753 /hvaonline/posts/preList/38228/234753.html#234753 GMT HN - Việc làm ngon dành cho chuyên gia Unix AIX đây !

panfider wrote:
mình chỉ biêt Unix và ở thành phố HCM không biết bạn có hổ trợ cho tiền phí đi lại 
@panfider bạn biết aix là os gì ko ?, bạn có nhìn vào mức lương không ?, chi phí đi lại là thế nào? , sáng hỗ trợ bạn bay ra hn, chiều hỗ trợ bạn bay về hcm ? Bạn hỏi nhiều câu tớ cảm thấy bức xúc quá :-s]]>
/hvaonline/posts/preList/38002/234664.html#234664 /hvaonline/posts/preList/38002/234664.html#234664 GMT
xin giúp đỡ - Cấu hình cho terminal CentOs 5

conmale wrote:

quanta wrote:

giaodaulamxung wrote:

conmale wrote:
Chạy: # cat /etc/resolv.conf xem nó ra cái gì? 
E chạy lệnh trên chỉ show ra đc 1 dòng: "search localdomain" ạ 
Vậy mà "vẫn duyệt web trên FF như thường" được sao? 
Có thể được nếu như có một "ông" squid đứng trước và "ông" squid đó chịu trách nhiệm resolve names luôn ;). 
Em có 1 số thắc mắc trong câu trả lời của anh conmale : 1) Nếu client duyệt web vd yahoo.com, đầu tiên client sẽ tìm xem yahoo.com có ip là gì, bằng cách gởi gói request dns tới dns server được liệt kê trong /etc/resolv.conf, ở đây file resolv.conf không hề khai báo dns server thì làm sao client có thể duyệt web được ? 2) Theo em tìm hiểu thì squid là 1 proxy, nếu như squid chịu trách nhiệm resolve names thì squid phải đứng với vai trò là gateway của client, vậy thì tại sao trong terminal client lại không thể nhờ squid resolve names được ? Mong mọi người giải đáp giúp em ! :)]]>
/hvaonline/posts/preList/38208/234663.html#234663 /hvaonline/posts/preList/38208/234663.html#234663 GMT
Phân vùng cho máy server cung cấp dịch vụ hosting và domain /hvaonline/posts/preList/38198/234588.html#234588 /hvaonline/posts/preList/38198/234588.html#234588 GMT xin giúp đỡ - Cấu hình cho terminal CentOs 5 /hvaonline/posts/preList/38208/234568.html#234568 /hvaonline/posts/preList/38208/234568.html#234568 GMT hỏi về giao thức ftp /hvaonline/posts/preList/38186/234560.html#234560 /hvaonline/posts/preList/38186/234560.html#234560 GMT Gửi mail trên cùng server CentOs /hvaonline/posts/preList/38125/234537.html#234537 /hvaonline/posts/preList/38125/234537.html#234537 GMT Phân vùng cho máy server cung cấp dịch vụ hosting và domain /hvaonline/posts/preList/38198/234534.html#234534 /hvaonline/posts/preList/38198/234534.html#234534 GMT Qmail as a Mail Gateway - Phần 1 /hvaonline/posts/preList/119/234403.html#234403 /hvaonline/posts/preList/119/234403.html#234403 GMT Lỗi khi setup mlogc trong mod_security /hvaonline/posts/preList/38156/234309.html#234309 /hvaonline/posts/preList/38156/234309.html#234309 GMT Lỗi khi setup mlogc trong mod_security Code:
SecAuditEngine RelevantOnly
SecAuditLogType Concurrent
SecAuditLogParts ABIDEFGHZ
SecAuditLogStorageDir /var/log/mlogc/data
SecAuditLog "|/usr/local/bin/mlogc /opt/mlogc.conf"
và sau khi restart apache thì lỗi: Code:
* Restarting web server apache2                                               
 [Wed Mar 30 09:59:25 2011] [1] [15471/0] Unable to open configuration file: /opt/mlogc.conf
 [Wed Mar 30 09:59:26 2011] [1] [15480/0] Unable to open configuration file: /opt/mlogc.conf
]]>
/hvaonline/posts/preList/38156/234298.html#234298 /hvaonline/posts/preList/38156/234298.html#234298 GMT
MySQL loadbalancing with HAproxy on CentOS /hvaonline/posts/preList/38089/234067.html#234067 /hvaonline/posts/preList/38089/234067.html#234067 GMT Thắc mắc về (Domain) sockets ,Named pipes trong phân loại file /hvaonline/posts/preList/37966/233628.html#233628 /hvaonline/posts/preList/37966/233628.html#233628 GMT sinh viên năm cuối Kỹ thuật máy tính(Mạng máytính)cấn tìm nơi thực tập /hvaonline/posts/preList/35372/232287.html#232287 /hvaonline/posts/preList/35372/232287.html#232287 GMT tìm việc IT support - Quản Trị Mạng tại Bình Dương và TPHCM /hvaonline/posts/preList/37758/232286.html#232286 /hvaonline/posts/preList/37758/232286.html#232286 GMT Hỏi về cách check 1 tag html trên firefox. Code:
#! /bin/bash
lynx -dump localhost/server-status | grep 'requests currently' > /home/scotfield/a.txt
b=`cat /home/scotfield/a.txt | cut --delimiter=' ' -f 4`
echo $b
if [ $[$b>200] -eq 1 ]; then
        /bin/mail -s "Over 200 Request" "scotfield@gmail.com" < /home/scotfield/b.txt
fi
Done, thanks anh quanta, em đã test và thành công.]]>
/hvaonline/posts/preList/37540/231281.html#231281 /hvaonline/posts/preList/37540/231281.html#231281 GMT
Hỏi về cách check 1 tag html trên firefox.

quanta wrote:
Nhưng mà khi nó chỉ có 1 chữ số thì kết quả trả về lại có cả chữ 'r' trong requests à. Nên cắt bằng cách lấy word đầu tiên, thế là chuẩn nhất. PS: bạn có 2 nicks à? 
Không phải có 2 nick ạ, do sử dụng máy của 1 đồng nghiệp trong công ty mà em quên logout, cứ để vậy mà reply. ok anh, để em thử code lại rổi sẽ up lên.Thnks anh :) ]]>
/hvaonline/posts/preList/37540/231201.html#231201 /hvaonline/posts/preList/37540/231201.html#231201 GMT
Hỏi về cách check 1 tag html trên firefox. Code:
#!/bin/bash 
lynx -dump http://ip/server-status | grep 'requests currently' > def
a=`cat /home/scotfield/def`
echo $a
b=`echo ${a:3:3}`
echo $b
if [ $[$b>200] -eq 1 ]; then
zenity --warning --text "server qua 200 request"
fi
Em dự định đưa code này vào crontab, chạy 1 phút 1 lần]]>
/hvaonline/posts/preList/37540/231063.html#231063 /hvaonline/posts/preList/37540/231063.html#231063 GMT
Hỏi về cách check 1 tag html trên firefox. /hvaonline/posts/preList/37540/231030.html#231030 /hvaonline/posts/preList/37540/231030.html#231030 GMT