linuxÏÂdataguardʹÓÃrman±¸·Ý
oracle dataguardÊÇÖ¸Ò»ÖÖÊý¾Ý¿â¼¶±ðµÄHA·½°¸£¬×îÖ÷ÒªµÄ¹¦ÄÜÊÇÈÝÔÖ£¬Êý¾Ý±£»¤£¬¹ÊÕϻָ´µÈ
ÔÚÉú²úÊý¾Ý¿âµÄÊÂÎñÒ»ÖÂÐÔʱ£¬Ê¹ÓòúÉúµÄÎïÀíÈ«±¸·Ý´´½¨±¸¿â£¬±¸¿âͨ¹ý´«Êä¹ýÀ´µÄ¹éµµÈÕÖ¾×Ô¶¯Î¬»¤±¸ÓÃÊý¾Ý¿â
½«ÖØ×öµÄÊý¾ÝÓ¦Óõ½±¸ÓÿâÉÏ¡£
1£¬Ç°Ì᣺
primary£º192.168.18.1;
oracle_SID:db1
db_unique_name=db1
standby: 192.168.18.2
oracle_sid:standby
db_unique_name=standby
Ö÷Êý¾Ý¿âµÄ×¼±¸
1£¬ÉèÖÃÖ÷Êý¾Ý¿âµÄforce logging
alter database force logging;
2,£¬´´½¨ÃÜÂëÎļþ
cd $ORACLE_HOME/DBS/ orapwdfile=orapwdb1 password=123 force=yes
3,ÐÞ¸ÄÖ÷¿âµÄ³õʼ»¯²ÎÊý
alter system set log_archive_config='dg_config=(db1,standby)' scope=both;
alter system set log_archive_dest1='location=/../db1/arch/ scope=both;
alter system db_unique_name='db1' scope=both;
4,Éú³ÉÊý¾Ý¿â±¸·Ý£¬
conn target sys/123
backup database format='/oracle/rmanback/%d_%s.dbf' plus archivelog;
5£¬Éú³É±¸¿âµÄcontrol file
alter database create standby controlfile as '/../oracle/rmanback/ctontrol01.ctl';
6,ÅäÖÃlistener.ora ºÍtnsname.oraÎļþ
Æô¶¯listener.ora
lsnrctl status
ÅäÖÃtnsname.ora
vi $ORACLE_HOME/network/admin/tnsname.ora
db1 =(DESCRIPTION =(ADDRESS_LIST =
(ADDRESS = (PROTOCOL = TCP)(HOST = 192.168.18.1)(PORT = 1521)))
(CONNECT_DATA = (SERVICE_NAME = db1)
standby =(DESCRIPTION =(ADDRESS_LIST =
(ADDRESS=(PROTOCOL = TCP)(HOST = 192.168.18.2)(PORT = 1521)))
(CONNECT_DATA =(SERVICE_NAME = standby)))
ÅäÖÃstandby database
1,ÉèÖû·¾³±äÁ¿£¬²¢ÇÒ°²×°oracleÈí¼þ
»·¾³±äÁ¿ºÍÖ÷¿âÊÇÒ»ÑùµÄ
Ö»ÐèÒª°²×°Èí¼þ£¬²»ÐèÒª°²×°Êý¾
Ïà¹ØÎĵµ£º
´´½¨×ÀÃæͼ±ê
Ä¿Ç°½«ÍøÂçÓ¦ÓÃÀ©Õ¹µ½×ÀÃæÊÇÒ»¸öÇ÷ÊÆ£¬´æÔÚןܶà½â¾ö·½°¸£¬±¾ÎÄÒÔ Mozilla Prism ΪÀý£¬ÀàËƵķ½·¨Í¬ÑùÊÊÓÃÓÚ Google Chrome ¡£
1. µ½ Mozilla Prism µÄÍøÕ¾ÉÏÏÂÔØ Prism£¬µã»÷ Download Now Ö®ºó»áÌáʾÓÐÁ½ÖÖ£¬Ò»ÖÖÊÇÒÔ Mozilla Firefox À©Õ¹µÄ·½Ê½£¬ÊʺÏÒѾ°²×°ÓÐ Firefox µÄÅóÓÑ£»Ò»Ö ......
½ñÌì×Ô¼ºÑ§Ï° LinuxÉ豸Çý¶¯³ÌÐò µÚÈý°æ µÚ15Õ ÄÚ´æÓ³ÉäºÍDMA. ¸Ð¾õÓеã³ÔÁ¦¡£Ö÷ÒªÊǶÔÄÚ´æÓ³ÉäºÜ¶àÊõÓïºÍ¸ÅÄî²»ÊǺÜÇå³þ£¬Àí½âÆðÀ´Óеã·Ñ¾¢¡£
ºóÀ´½áºÏÓ¢ÎÄ԰棬¾²ÏÂÐÄÀ´×Ðϸѧϰ£¬²ÅËãÊÇÓÐÁËÒ»µã½øÕ¹¡£
ÏÖÔÚÔÚÕâÀï×öÒ»¸ö±Ê¼Ç£¬ÒÔ±¸ÒÔºó¸´Ï°Óá£
µÍ¶ËÄÚ´æºÍ¸ß¶ËÄÚ´æ
ÊéÖеÄͼ15-1ÓеãÎóµ¼ÈË¡£Í¼Öн« ÄÚºËÐéÄâµØÖ· ºÍ ......
4ÔÂ19ÈÕ£¬²Ù×÷½çÃæ½â¾ö·½°¸ÌṩÉÌSynaptics Inc.Ðû²¼ÁËÒ»Ì×ÓÃÓÚLinuxϵ統µÄ Synaptics Gesture Suite¿ª·¢Ì××°£¨SGS-L£©£¬Õâ¿îÈí¼þ½«´ø¸ø¿ªÔ´LinuxϵͳÒÔ¶àµã´¥ÃþµÄÄÜÁ¦¡£
SGS-LÖ§³Ö眾¶àµÄLinux·¢ÐаæÈçFedora, Millos Linpus, Red Flag, SuSE, UbuntuºÍXandros£¬並ÌØ別Ìá¼°¿ÉÍØÕ¹Chrome OSµÄй¦Ä ......
/*
* /*
* Linux x86 Dropbear SSH <= 0.34 remote root exploit
* coded by live
*
* You'll need a hacked ssh client to try this out. I included a patch
* to openssh-3.6.p1 somewhere below this comment.
*
* The point is: the buffer being exploited is too small(25 bytes) to hold our
......