About Telecom Unicom and other first-line ISP to the user to assign a private IP address, is indeed an incredible thing. This is not surprising in the second-tier network operators, but such things happen if the first-line network operators, is really strange.
Recent Arctic ...
Raspbian without RTL8179/8188EU drivers. Raspberry Pi cannot found wlan0 when you plug-in a 8188eu base wireless dongle. So you need a 3rd-driver for 8188eu base wireless dongle.
KNOWN CARD LIST
TPLINK TL-WN725N v2
GET KERNEL VERSION
IMPORTANT: First check the version ...
[November 8, 2015 added] because the author is in the operator network is not mature, resulting in test results are not accurate. The overall conclusion is that once the operator's network is stable, then the DNS server provided by the operator must be available. Another move, iron ...
L2TP/IPsec is a secure Virtual Private Network solution that is well supported on many different platforms.
This article aims to describe in a HOWTO like fashion how to configure and use a L2TP/IPsec client on Debian family Linux. This article will cover the installation and setup of several ...
The CPUID opcode is a processor supplementary instruction (its name derived from CPU IDentification) for the x86 architecture allowing software to discover details of the processor. It was introduced by Intel in 1993 when it introduced the Pentium and SL-enhanced 486 processors.
By using the CPU ...
Because device drivers run with system-level privileges and can access anything on your computer, it is critical that you trust the device drivers that you install. Trust, in this context, includes two main principles:
Authenticity is an assurance that the driver package came from its claimed sour ...
ECDSA as known as ECC, is more safer and faster than RSA, and its more suitable for use on mobile devices. But ECC not compatible with older devices, such as Windows XP or Android 2.3.
Enable both ECC and RSA on nginx will get better security and compatible with older devices. nginx will automa ...
Warning: An earlier version of this guide included mention of Ubuntu 14.04 systems. While an upgrade from 14.04 may successfully complete, upgrades between LTS releases are not enabled by default until the first point release, and it is recommended to wait until the 16.04.1 point release to upgr ...
OpenShift default using the Apache web server and user cannot modify the virtual host configuration file. Is there any way to allow OpenShift support multiple domains? The answer is yes. You can just only using Apache htaccess rule to get multiple domain supports.
STEP BY STEP
1. BIND YOUR DOMAINS ...
AJAX is not a programming language.
AJAX just uses a combination of:
A browser built-in XMLHttpRequest object (to request data from a web server)
AJAX is a misleading name. AJAX applications might use XM ...
Environment variables are placeholders for values that are provided to a software program at runtime. They are particularly useful when the values are likely to be different from one host system to the next, or from one run to the next. Including these placeholders in applications makes the applica ...
Usually, we install a opensource software from source code directly. But if we want to transplant a opensource software from develop environment to server environment there have 2 ways:
Build and install opensource software on server
Build from development PC and install on server
Install on serv ...
Linux systems have more ways to reject or drop incoming packets, And takes different effects. In this article, I tried 4 ways to reject or drop TCP packets, and watch effect in nmap tool.
WHICH 1+3 WAYS ?
In Linux systems, we usually using following 3 ways to reject or drop packets:
Drop incoming ...