Ò׽ؽØÍ¼Èí¼þ¡¢µ¥Îļþ¡¢Ãâ°²×°¡¢´¿ÂÌÉ«¡¢½ö160KB

¹ØÓÚMysqlÊÇ·ñÂú×ãC2¼¶µÄÌÖÂÛ


====================================================
Òý×Ô£ºhttp://blog.sina.com.cn/s/blog_538a9d1901008f9g.html
ʲôÊÇC2¼¶°²È«ÐÔ£¿°²È«ÐԵķÖÀàÊÇÔõÑùµÄ£¿(2008-01-30 17:04:39)
  
DÀࣺ×îµÍ±£»¤£¬±£Áô¸ø²»ÄÜͨ¹ý¸ü¸ß¼¶±ð¼ì²éµÄϵͳ
C1£º½÷É÷±£»¤£¬ÒªÇóÓлùÓÚÓû§¼¶±ðµÄ¿ØÖÆÀ´±£»¤Êý¾Ý£¬Ö÷Òª·ÀÖ¹ÒâÍâʼþ´øÀ´µÄËðʧ£¬ÊÊÓÃÓÚ¶Ô°²È«ÐÔÒªÇó²»ÊÇÌ«¸ßµÄϵͳ
C2£ºÈ¨ÏÞ¿ØÖƱ£»¤£ºÓû§¶Ô×Ô¼ºµÄÐÐΪ¸ºÔð£»ÏµÍ³¿ÉÒÔ¸ú×ÙËùÓйý³ÌºÍ¼Ç¼ij¸öÓû§µÄÐÐΪ¡£·ÀÖ¹¶ÔÏóÖØÒýÓ㬲¢±£Ö¤ÏµÍ³°²È«ÐÔ¼àÊÓÆ÷µÄЧÁ¦¡£Óû§¿ÉÒÔÉ趨±ðÈ˶Ô×Ô¼ºÊý¾ÝµÄȨÏÞ¡£
B1£º±êÖ¾°²È«ÐÔ±£»¤£ºÒªÇóÌØ±ðµÄ°²È«ÐԼƻ®£¬ËùÓеı£ÃÜÊý¾Ý¶¼Òª¼ÓÒ»±êÖ¾£¬ÔÚϵͳÖд«µÝÕâЩÊý¾Ýʱ±ØÐëºË¶Ô±êÖ¾¡£Óû§²»ÄÜ×Ô¼º¸Ä±äÕâЩ±êÖ¾¡£
B2£º½á¹¹»¯±£»¤£¬ÒªÇó½á¹¹»¯µÄ¡¢Õý¹æµÄ°²È«ÐԼƻ®¡£Óû§ÕË»§ÑéÖ¤¹¦ÄÜÔöÇ¿£¬ÒÔÈ·¶¨Ã¿¸öÓû§ºÏ·¨µÄ°²È«ÐÔȨÏÞ¡£
B3£º°²È«Óò£ºÒªÇó°²È«ÐÔϵͳ¾¡¿ÉÄÜС£¬ÅųýÒ»ÇÐÎÞȨÏÞ´úÂëÖ´ÐС£ÕâЩ´úÂë¿ÉÄܲ»ÀûÓÚϵͳµÄ°²È«ÐԺͲâÊÔ£¬ÒªÇóÓи½¼ÓµÄÓйذ²È«ÐÔ¹ÜÀíµÄ¹¤¾ß¡£ÏµÍ³±ØÐëÓкÜÇ¿µÄ·´ÎÞȨ¸Ä¶¯ºÍÇÖÈë¡£
A1£ººËʵµÄÉè¼Æ£º¹¦ÄܺÍB3Ïàͬ£¬µ«A1Òª¾­¹ý¸üÑϸñ¡¢¸üÕý¹æµÄ²âÊÔ¡£
=================================================================
¹ØÓÚC2¼¶µÄ¹Ù·½½âÊÍ
Òý×Ô£ºhttp://ftp.ntu.edu.tw/ftp/linux/libs/security/Orange-Linux/refs/Orange/OrangeI-II-2.html
2.2 CLASS (C2): CONTROLLED ACCESS PROTECTION
Systems in this class enforce a more finely grained discretionary access control than (C1) systems, making users individually
accountable for their actions through login procedures, auditing of security-relevant events, and resource isolation. The 
following are minimal requirements for systems assigned a class (C2) rating:
Security Policy
Discretionary Access Control
The TCB shall define and control access between named users and named objects (e.g., files and programs) in the ADP system. 
The enforcement mechanism (e.g., self/group/public controls, access control lists) shall allow users to specify and control 
sharing of those objects by named individuals, or defined groups of individuals, or by both, and shall provide controls to 
limi


Ïà¹ØÎĵµ£º

Can't connect to MySQL server on '' (10060)

Ô¶³ÌÁ¬½Ó·þÎñÆ÷³öÏÖÒÔÉÏ´íÎó
Ö÷ÒªÓÐÈý¸öÔ­Òò£º
1¡¢mysqlÊÚȨ±íÀïûÓÐÔ¶³Ì»úÆ÷µÄȨÏÞ£¬¼°ÐèÒªÔÚÊÚȨ±ímysql.userÌí¼Ó
grant all privileges on *.* to 'root'@'Ô¶³ÌµÇ½IP' identified by 'Ô¶³ÌµÇ½ÃÜÂë'
flush privileges;
2¡¢ÍøÂ粻ͨ£¬Õâ¸ö¾Í²»ËµÁË¡£
3¡¢·À»ðǽ½ûÖ¹3306¶Ë¿Ú£¬ÒÔiptableΪÀý
vi /etc/sysconfig/ipt ......

MysqlÊý¾Ý¿âµ¼³ö·½·¨

µ¼³öÕû¸öÊý¾Ý¿â£ºmysqldump -uÓû§Ãû -pÃÜÂë ÐèÒªµ¼³öµÄÊý¾Ý¿âÃû > µ¼³öÎļþÃû.sql
ÆäËû²ÎÊý£º
-d ²»°üº¬Êý¾Ý£¬Ö»ÓÐÊý¾Ý¿â±í½á¹¹
--add-drop-table ÔÚÿ¸öcreateÓï¾ä֮ǰÔö¼ÓÒ»¸ödrop
--skip-opt ÿÌõ¼Ç¼ֻ¶ÔÓ¦Ò»¸öinsertÓï¾ä ......

mysql»ù±¾Ó÷¨

http://dev.mysql.com/doc/refman/5.1/zh/index.html
(MySql 5.1 ÖÐÎIJο¼ÊÖ²á)
*------------------------------------------------------------------------------------------
show databases; ÏÔʾÊý¾Ý¿â
drop database Êý¾Ý¿âÃû;ɾ³ýÊý¾Ý¿â
set names 'utf8';ÉèÖÃÊý¾Ý¿â±àÂëΪutf-8
source x:\Êý¾Ý¿âÃû.sql;µ¼È ......

Quick Test Setup of MySQL Cluster


To familiarize you with the basics, we will describe the simplest
possible configuration for a functional MySQL Cluster. After this,
you should be able to design your desired setup from the
information provided in the other relevant sections of this
chapter.
......

MySQL Cluster Configuration — Basic Example


To support MySQL Cluster, you will need to update
my.cnf
as shown in the following example.
You may also specify these parameters on the command line when
invoking the executables.

Note
The options shown here should not be confused with thos ......
© 2009 ej38.com All Rights Reserved. ¹ØÓÚE½¡ÍøÁªÏµÎÒÃÇ | Õ¾µãµØÍ¼ | ¸ÓICP±¸09004571ºÅ