On the first line of telecommunications Unicom ISP assigned private IP address
About Telecom Unicom and other first-line ISP to the user to assign a private IP address, is indeed an incredible thing. This is not surprising in the second-tier network operators, but such things happen if the first-line network operators, is really strange. Recent Arctic ...
Raspberry Pi – Driver for RTL8179/8188EU
INTRODUCE Raspbian without RTL8179/8188EU drivers. Raspberry Pi cannot found wlan0 when you plug-in a 8188eu base wireless dongle. So you need a 3rd-driver for 8188eu base wireless dongle. KNOWN CARD LIST TPLINK TL-WN725N v2 MERCURY MW150US FAST FW150US GET KERNEL VERSION IMPORTANT: First check the version ...
How to choose a correct DNS server
[November 8, 2015 added] because the author is in the operator network is not mature, resulting in test results are not accurate. The overall conclusion is that once the operator's network is stable, then the DNS server provided by the operator must be available. Another move, iron ...
L2TP/IPSec VPN client setup on debian family system
  INTRODUCE L2TP/IPsec is a secure Virtual Private Network solution that is well supported on many different platforms. This article aims to describe in a HOWTO like fashion how to configure and use a L2TP/IPsec client on Debian family Linux. This article will cover the installation and setup of several ...
Daily API extraction [EN]
English Title: Extract Dongting.com API [Chinese Only] Originally wanted to extract the beautiful API every day, and then write a terminal player, it seems that some pit ...
Software

Customize CPUID in Virtual Machine

Customize CPUID in Virtual Machine
INTRODUCE The CPUID opcode is a processor supplementary instruction (its name derived from CPU IDentification) for the x86 architecture allowing software to discover details of the processor. It was introduced by Intel in 1993 when it introduced the Pentium and SL-enhanced 486 processors.[1] By using the CPU ...

Norckon 06-01 177℃ 0 COMMENT 0 LIKE

Operating System

Steps for Signing a Device Driver Package

Steps for Signing a Device Driver Package
INTRODUCE Because device drivers run with system-level privileges and can access anything on your computer, it is critical that you trust the device drivers that you install. Trust, in this context, includes two main principles: Authenticity is an assurance that the driver package came from its claimed sour ...

Norckon 06-01 128℃ 0 COMMENT 0 LIKE

Server

Enable both ECC and RSA on nginx

Enable both ECC and RSA on nginx
INTRODUCTION ECDSA as known as ECC, is more safer and faster than RSA, and its more suitable for use on mobile devices. But ECC not compatible with older devices, such as Windows XP or Android 2.3. Enable both ECC and RSA on nginx will get better security and compatible with older devices.  nginx will automa ...

Norckon 01-17 401℃ 0 COMMENT 0 LIKE

Server

How To Upgrade to Ubuntu 16.04 LTS

How To Upgrade to Ubuntu 16.04 LTS
Introduction Warning: An earlier version of this guide included mention of Ubuntu 14.04 systems. While an upgrade from 14.04 may successfully complete, upgrades between LTS releases are not enabled by default until the first point release, and it is recommended to wait until the 16.04.1 point release to upgr ...

Norckon 10-20 227℃ 1 COMMENT 0 LIKE

Server

OpenShift bind multiple domains

OpenShift bind multiple domains
INTRODUCE OpenShift default using the Apache web server and user cannot modify the virtual host configuration file. Is there any way to allow OpenShift support multiple domains? The answer is yes. You can just only using Apache htaccess rule to get multiple domain supports. STEP BY STEP 1. BIND YOUR DOMAINS ...

Norckon 10-20 261℃ 0 COMMENT 1 LIKE

Programming

Form submit via Javascript

Form submit via Javascript
INTRODUCE AJAX = Asynchronous JavaScript And XML. AJAX is not a programming language. AJAX just uses a combination of: A browser built-in XMLHttpRequest object (to request data from a web server) JavaScript and HTML DOM (to display or use the data) AJAX is a misleading name. AJAX applications might use XM ...

Norckon 10-20 211℃ 0 COMMENT 0 LIKE

Server

OpenShift Environment Variables

OpenShift Environment Variables
INTRODUCE Environment variables are placeholders for values that are provided to a software program at runtime. They are particularly useful when the values are likely to be different from one host system to the next, or from one run to the next. Including these placeholders in applications makes the applica ...

Norckon 10-20 187℃ 0 COMMENT 0 LIKE

Network

What different between the 3 ways to reject packets

What different between the 3 ways to reject packets
INTRODUCE Linux systems have more ways to reject or drop incoming packets, And takes different effects. In this article, I tried 4 ways to reject or drop TCP packets, and watch effect in nmap tool. WHICH 1+3 WAYS ? In Linux systems, we usually using following 3 ways to reject or drop packets: Drop incoming ...

Norckon 2016-06-26 321℃ 0 COMMENT 0 LIKE