> DENIED Redis is running in protected mode because protected mode is enabled, no bind address was specified, no authentication password is requested to clients. In this mode connections are only accepted from the loopback interface. If you want to connect from external computers to Redis you may adopt one of the following solutions: 1) Just disable protected mode sending the command 'CONFIG SET protected-mode no' from the loopback interface by connecting to Redis from the same host the server is running, however MAKE SURE Redis is not publicly accessible from internet if you do so. Use CONFIG REWRITE to make this change permanent. 2) Alternatively you can just disable the protected mode by editing the Redis configuration file, and setting the protected mode option to 'no', and then restarting the server. 3) If you started the server manually just for testing, restart it with the '--protected-mode no' option. 4) Setup a bind address or an authentication password. NOTE: You only need to do one of the above things in order for the server to start accepting connections from the outside.
- centos
- 安裝工具
- 安裝nginx
- 安裝PHP5
- 安裝PHP7.0.1
- 安裝PHP7.0.8
- 安裝redis
- redis允許遠程訪問
- 安裝php之redis擴展
- 安裝mysql
- 配置nginx虛擬機綁定域名
- xdebug下載配置
- phpStorm遠程調試配置
- 報錯解決:安裝PHP7解決問題方法
- 報錯解決:xdebug-解決問題
- yum丟失的解決辦法
- CentOS下安裝JDK的四種方法
- workman
- 某服務器配置情況
- 安裝PHP7.2.17
- 安裝PHP7.1.27
- 安裝MongoDB
- ubuntu
- mac
- window
- phpstrom+wamp+xdebug
- mysql
- MySql創建本地用戶和遠程用戶 并賦予權限
- 自建主從復制-mycat
- 數據庫優化
- 阿里云mysql主從復制
- 報錯解決
- SQL分析
- group by
- Mysql定時備份數據腳本
- MySQL數據庫遠程連接開啟方法
- 啟動報錯systemctl status
- 日志導出
- mysq進程
- mysql查詢正在執行的進程
- 命令
- nginx
- 安裝GIT
- access.log
- error.log分析
- 500 Internal Server Error錯誤
- 502解決方案
- 405 Not Allowed,nginx靜態文件響應post請求
- Linux基本操作
- 創建用戶
- chmod命令詳細用法設置文件的權限
- chown命令
- chgrp命令:改變文件的群組
- Linux 設置定時任務crontab命令
- 其他問題
- Win10 Subsystem Linux : Ubuntu 的root密碼
- 安全問題
- PHP安全設置
- redis
- 安裝
- 安裝2.8.17
- 問題
- 日志分析
- an upstream response is buffered to a temporary file
- too many open files
- worker_connections are not enough
- recv() failed
- 日志
- 系統日志
- apache訪問日志與錯誤日志
- nginx訪問日志與錯誤日志
- php錯誤日志
- php-fpm慢日志
- mysql慢日志
- 服務器優化
- php-fpm進程數優化
- 服務器安全
- RHSA-2018:2748: kernel security and bug fix update
- RHSA-2018:3408: git security update
- RHSA-2018:2570: bind security update
- RHSA-2018:3052: wget security and bug fix update
- RHSA-2018:3221: openssl security, bug fix, and enhancement update
- RHSA-2018:2384: kernel security and bug fix update
- RHSA-2018:3032: binutils security, bug fix, and enhancement update
- RHSA-2018:3157: curl and nss-pem security and bug fix update
- RHSA-2018:2285: yum-utils security update
- RHSA-2018:3092: glibc security, bug fix, and enhancement update
- CVE-2018-17182 on Ubuntu 14.04 LTS (trusty)
- CVE-2018-9415 on Ubuntu 14.04 LTS (trusty)
- CVE-2018-8043 on Ubuntu 14.04 LTS (trusty)
- CVE-2018-3620 on Ubuntu 14.04 LTS (trusty)
- CVE-2018-14634 on Ubuntu 14.04 LTS (trusty)
- CVE-2018-14609 on Ubuntu 14.04 LTS (trusty)
- CentOS Linux 7安全基線檢查
- Redis安全基線檢查
- RHSA-2019:1168-重要: 內核 安全更新
- RHSA-2019:1481-重要: 內核 安全更新
- RHSA-2019:0512-重要: 內核 安全和BUG修復更新
- ThinkPHP漏洞
- ThinkPHP 5.1.X <= 5.1.30 遠程代碼執行漏洞
- ThinkPHP 5 <=5.0.22 遠程代碼執行高危漏洞
- ThinkPHP <5.0.24 Request.php 遠程代碼執行漏洞
- PHP
- 怎樣獲取PHP各種版本
- 攻擊
- SSH暴力破解
- RDP暴力破解
- SQLSERVER暴力破解
- MYSQL暴力破解
- FTP暴力破解
- SQL注入
- 代碼執行
- XSS攻擊
- 本地文件包含
- 遠程文件包含
- 腳本木馬
- 上傳漏洞
- 路徑遍歷
- 越權訪問
- CSRF
- CRLF
- 其他