Search engine optimization (SEO) is the process of improving the quality and quantity of website traffic to a website or a web page from search engines. SEO targets unpaid traffic (known as “natural” or “organic” results) rather than direct traffic or paid traffic. Unpaid traffic may originate from different kinds of searches, including image search, video search, academic search, news search, and industry-specific vertical search engines.
Search engine marketing (SEM) is a form of Internet marketing that involves the promotion of websites by increasing their visibility in search engine results pages (SERPs) primarily through paid advertising. SEM may incorporate search engine optimization (SEO), which adjusts or rewrites website content and site architecture to achieve a higher ranking in search engine results pages to enhance pay per click (PPC) listings.
In order to make our website is accessable, we need to open the service or port from the firewall. In this article, we will whow how to set up a firewall for your server and show you the basics of the firewall-cmd tool.
In order from least trusted to most trusted, the predefined zones within firewalld are:
--permanent
flag to indicate that the non-ephemeral firewall should be targeted.sudo yum install firewalld
sudo systemctl enable firewalld
sudo reboot
sudo firewall-cmd --state
firewall-cmd --get-default-zone
firewall-cmd --get-active-zones
sudo firewall-cmd --list-all
firewall-cmd --get-zones
sudo firewall-cmd --zone=home --list-all
sudo firewall-cmd --list-all-zones | less
sudo firewall-cmd --zone=home --change-interface=eth0
firewall-cmd --get-active-zones
sudo firewall-cmd --set-default-zone=home
firewall-cmd --get-services
sudo firewall-cmd --zone=public --add-service=http
sudo firewall-cmd --zone=public --permanent --add-service=http
sudo firewall-cmd --zone=public --permanent --list-services
sudo firewall-cmd --zone=public --add-service=https
sudo firewall-cmd --zone=public --permanent --add-service=https
sudo firewall-cmd --zone=public --add-port=5000/tcp
sudo firewall-cmd --zone=public --list-ports
sudo firewall-cmd --zone=public --add-port=4990-4999/udp
sudo firewall-cmd --zone=public --permanent --add-port=5000/tcp
sudo firewall-cmd --zone=public --permanent --add-port=4990-4999/udp
sudo firewall-cmd --zone=public --permanent --list-ports
sudo cp /usr/lib/firewalld/services/ssh.xml /etc/firewalld/services/example.xml
sudo vi /etc/firewalld/services/example.xml
sudo firewall-cmd --reload
firewall-cmd --get-services
sudo firewall-cmd --permanent --new-zone=publicweb
sudo firewall-cmd --permanent --new-zone=privateDNS
sudo firewall-cmd --permanent --get-zones
sudo firewall-cmd --reload
firewall-cmd --get-zones
sudo firewall-cmd --zone=publicweb --add-service=ssh
sudo firewall-cmd --zone=publicweb --add-service=http
sudo firewall-cmd --zone=publicweb --add-service=https
sudo firewall-cmd --zone=publicweb --list-all
sudo firewall-cmd --zone=privateDNS --add-service=dns
sudo firewall-cmd --zone=privateDNS --list-all
sudo firewall-cmd --zone=publicweb --change-interface=eth0
sudo firewall-cmd --zone=privateDNS --change-interface=eth1
sudo firewall-cmd --zone=publicweb --permanent --add-service=ssh
sudo firewall-cmd --zone=publicweb --permanent --add-service=http
sudo firewall-cmd --zone=publicweb --permanent --add-service=https
sudo firewall-cmd --zone=privateDNS --permanent --add-service=dns
sudo systemctl restart network
sudo systemctl reload firewalld
firewall-cmd --get-active-zones
sudo firewall-cmd --zone=publicweb --list-services
sudo firewall-cmd --zone=privateDNS --list-services
sudo firewall-cmd --set-default-zone=publicweb
A SOCKS proxy is an SSH encrypted tunnel in which configured applications forward their traffic down, and then, on the server-end, the proxy forwards the traffic to the general Internet. Unlike a VPN, a SOCKS proxy has to be configured on an app-by-app basis on the client machine, but you can set up apps without any specialty client software as long as the app is capable of using a SOCKS proxy. On the server-side, all you need to configure is SSH.
ssh -i ~/.ssh/id_rsa -D 1337 -f -C -q -N user@your_domain
-i
: The path to the SSH key to be used to connect to the host-D
: Tells SSH that we want a SOCKS tunnel on the specified port number (you can choose a number between 1025 and 65536)-f
: Forks the process to the background-C
: Compresses the data before sending it-q
: Uses quiet mode-N
: Tells SSH that no command will be sent once the tunnel is up“Connection”→“SSH”→“Tunnels”
, setup the following
source port
, need larger than 1024Dynamic
add
SwitchOmega is a tool to manage and switch between multiple proxies quickly & easily.
AutoProxy
For more details, please refer http://junch.github.io/%E6%8A%80%E5%B7%A7/2015/06/05/original-proxy.html
For those machine behind the firewall
Add a single proxy for all
git config --global http.proxy http://proxyUsername:proxyPassword@proxy.server.com:port
Add proxy for different hosts
git config --global http.https://domain.com.proxy http://proxyUsername:proxyPassword@proxy.server.com:port
git config --global http.https://domain.com.sslVerify false
git clone https://xxxxx
vim ~/.ssh/config
# Global setting
# ProxyCommand connect -S 127.0.0.1:6600 %h %p
# For specific host
Host github.com
ProxyCommand connect -S 127.0.0.1:6600 %h %p
~/.ssh/config
Host 10.*
ProxyCommand nc -X 5 -x PROXY_HOST:1080 %h %p