htt: 192.168.10.1 home.asp

mysql odbc does not recognize 192.168.1.22

Today, the reverse with the power designer mysql database and found that actually can not establish 192.168.1.22 mysql odbc data source, reports: Connection Fialed: [HY000] [MySQL] [ODBC 5.1 Driver] Access denied for user 'xxx' @ '192 .168. 19

Router of 192.168.1.1

MAC MAC (Media Access Control, Medium Access Control ) MAC address is burning in the Network Interface Card (NIC, NIC) inside. MAC address, also known as the hardware address is 48 bits long (6 bytes), 16 hex .0-23 bit numbers assigned by the manufacturer

Authorized to resolve Host '192 .168.1.180 'is not allowed to connect to this MySQL server

Authorized to resolve Host '192 .168.1.180 'is not allowed to connect to this MySQL server GRANT ALL PRIVILEGES ON *.* TO 'root'@'%' IDENTIFIED BY' mypassword 'WITH GRANT OPTION

RROR 1045 (28000): Access denied for user 'root' @ '192 .168.2.12 (using password:

This is a mysql permissions not reported on a solution: 1, landing mysql, mysql-uroot-hlocalhost-p 2, use mysql (must be the library system) 3, update user set host = '%' where user = 'root'; (can be anonymous and no password will be able

wip330 upgrade, the sound of small problems to solve

http://rapidshare.com/files/87010718/wip330_USB_driver.rar http://rapidshare.com/files/86603479/wip330_v1_01_00.bin 1) upgrade to support MSN and skype version, and will support activesync, voice can also be increased Open a browser, enter the http:/ ...

Common SQL injection code

/ / To see what rights and 1 = (Select IS_MEMBER ('db_owner')) And char (124)% 2BCast (IS_MEMBER ('db_owner') as varchar (1))% 2Bchar (124) = 1; - / / Test whether the permission to read a database and 1 = (Select HAS_DBACCESS ('m

From the database and display all data

1. From the database and display all data iBatis are like Hibernate, JDO and EJB as data persistence framework, which will target mapping for the SQL statement. It is a lightweight and durable framework Persistence API suitable POJO.iBatis with Hiber ...

Automatic generation of update packages (subversion, ruby) continued

Automatically upgrade package 2 (subversion) Before writing the production side of the current directory to modify the extracted files, this is the current directory under a particular version of comparison before, and then get the difference file. I ...

JBoss deployment of web applications

Initial deployment of the JBoss web application, put tomcat / weblogic works migrate to JBoss on release First, modify JBOSS application server, database connectivity and port: 1, port modifications: 4 .* version: $ (JBOSS_HOME) / server -> default -

java string Oracle connection, jdbc connect Oracle jar

jbdc.driverClassName = oracle.jdbc.driver.OracleDriver jdbc.url = jdbc: oracle: thin: @ 192.168.10.122:1521: myoracle jdbc.username = nc jdbc.password = nc

Can not access web server, crossdomain.xml security sandbox problems

Using the jboss server to other machines can not access the host, mainly the security sandbox crossdomain.xml question is not placed in the following directory jboss caused by server \ all \ deploy \ jbossweb-tomcat55.sar \ ROOT.war crossdomain.xml f ...

apache2 Log Settings

Web server log records the error information as well as access to information, to analyze site traffic and access to an important basis for the amount. 1, the error log settings ErrorLog logs / error_log # logs are saved LogLevel warn # log-level for ...

Routing table Xiangjie

Routing table shows (Xiangjie route print) Read nello routing table, to get this piece of paper, a more detailed explanation of the routing table, this is quite common, and share Routing table shows -------------------------------------------------- ...

Traceroute command. View DNS.IP.Mac etc.

1. The most basic, the most commonly used to test the physical network, ping 192.168.0.8-t, parameter-t is waiting for the user to interrupt testing 2. View the DNS, IP, Mac, etc. A.Win98: winipcfg B.Win2000 above: Ipconfig / all C. NSLOOKUP: If the ...

tracert command Xiangjie

Tracert (trace route) is a route tracing utility used to determine the IP datagram access to the path taken by the target. Survival time of the order with the IP (TTL) field and ICMP error messages to determine the network from one host to another ho ...

Common network commands (2)

1. The most basic, the most commonly used to test the physical network ping 192.168.0.8-t, parameter-t is waiting for the user to interrupt testing 2. View the DNS, IP, Mac, etc. A.Win98: winipcfg B.Win2000 above: Ipconfig / all C. NSLOOKUP: If the D ...

ARCGIS DESKTOP installation steps

First, install ARCGIS LICENSE MANAGER: 1. Find the authority before installation license.lic or license.dat, use Notepad to open the content editor which will be the first line of host name to your machine name or IP. (Eg to SERVER 192.168.10.100 ESR ...

VMware virtual machine, network connection under the three models

bridge: this way the most simple and direct to the virtual NIC bridged to a physical network card above, and a network card under linux bind two different addresses similar in effect to card set to promiscuous mode, so as to achieve multiple IP liste ...

Three ways vmware network

Many of my friends are using vmware to test different systems, combined with his experience I talk about understanding the network settings, wrong place, please correct me. bridge: this way the most simple and direct to the virtual NIC bridged to a p ...

Fast Algorithm for the subnet mask

Fast Algorithm for the subnet mask Many people certainly set the subnet mask that are not familiar with, it is a headache, so I will now tell you an easy way to count the subnet mask, to help people who look like the lazy:) We all should know 2 0 th ...

Under the VNC configuration Ubuntu

By the server configured VNC SERVER, can be used for other hosts to log on this server graphics. Configure vnc server on ubuntu under very simple, as follows: Server-side: 1, first install the VNC service program: 2, to the current user to set vnc pa ...

Oracle10G Express (APEX) Gossip

Oracle10G Express limit on the total user database table space 4G, memory 1G, the initial limit only the local user access management page, you can change the cost to / remote can log management -> managed to set up http access Management page htt ...

Weblogic cluster configuration

1 , Weblogic10.3.1.0.0 cluster configuration requirements 1, two in the same segment, and can visit each other's computers. 2, two computers are installed Weblogic10.3.1.0.0 version of the application server. 3, the installation media Note: the cluste

Nginx + Mongrel Cluster deployment of ROR in CentOS

Nginx + Mongrel Cluster deployment of ROR in CentOS I, a basic environment set up, what is CentOS CentOS is RHEL (Red Hat Enterprise Linux) and then compile the source code product, known as 100% compatible re-established, and removed all Red Hat trademar

hibernage Naming Policy

Notes on the use of Hibernate annotation mapping and naming strategies and associated problem-solving one, the first leads to the following view: 1). Development projects, regardless of whether to use Hibernate, all should be Wei project involved a prefix

SUSE Linux vsftpd set up (turn)

Yesterday, in the VM installed suse linux 10, I do not know is not the VM version is not high enough, one will set the monitor VM Huaping no response. . . . . . I use VM5.5, where the characteristics of the Internet to see an increase of 6.0 SUSE Lin ...

Samba configuration file common arguments detailed

Samba's main configuration file called smb.conf, the default in / etc / samba / directory. smb.conf with multiple segments, each segment starting from the section name until the name of the next paragraph. Each segment were placed in the middle of the

Introduction to learning --- python reproduced hour

A preface for the reader this article as soon as possible for experienced programmers into the Python2.x world. In particular, if you learn Java and Javascript, not one hour you can use Python to write smoothly useful quick Python program. ---------------

Openfire custom database And http-bind

Currently I need working on instant message, so choice openfire as XMPP server. Enviroments: Openfire (3.6.3) Mysql (5.0.75) Requirements: Intergeneration with local user, the same as custom database of user in openfire tutorial. Depend on the tutori ...

Traceroute command. View DNS.IP.Mac

1. The most basic, the most commonly used to test the physical network, ping 192.168.0.8-t, parameter-t is waiting for the user to interrupt testing 2. View the DNS, IP, Mac, etc. A.Win98: winipcfg B.Win2000 above: Ipconfig / all C. NSLOOKUP: If the ...

backup mysql master slave

Props: Computer A (master ip: 192.168.10.10), Computer B (slave ip: 192.168.10.11) First, before you can start doing B-side computer connected to a computer, A-side, whether we can connect successfully (this step you can also put the final do or not ...

Tomcat5.5 while multi domain approach access to the same ip.

In server.xml, the port to 80, the other configuration example is as follows. <Engine name = "Catalina" defaultHost = " www.aaa.com "> <Realm className = "org.apache.catalina.realm.UserDatabaseRealm" resourceNam ...

Web server using clustering technology to achieve the load balancing concept of clustering and load balancing

The concept of clustering and load balancing Cluster (Cluster) The so-called cluster is a group of independent computer system consisting of a loosely coupled multi-processor system, the network between them to achieve inter-process communication. Ap ...

OpenVPN on windows xp installation and configuration under

Bad memory as well written, OpenVPN configuration is really a Google / baidu on the lot. As the teaching and research needs of VPN, so the Internet is a OpenVpn installation configuration. After two days of the Internet to find information, configuration,

Large-scale J2EE project Web container cluster-Nginx + Glasshfish + Memcached + ServletFilter

The title might make you not understand it, because he comes from HE cottage way, or I will in this way more popular nowadays some stuff for the DIY integration. Look at the pictures and say goodbye for the time being about text: Do not understand do

Sample OpenVPN 2.0 config file configuration file of a simple translation

Reprinted from: http://kb.cnblogs.com/a/1322186/ Sample OpenVPN 2.0 config file configuration file of a simple translation: Frodo Source: garden blog ################################################# # Sample OpenVPN 2.0 config file for # # Multi-client s

linux arp fraud under the defense solution

Now the network magistrate, P2P Terminator often monkeying in LAN play around, so slower speeds, and poor network would also break. In windows as long as there are "anti-p2p Terminator" or arp firewall "Antiarp", can easily solve

PHP and. NET's communication [change]

In recent days received an item, use the C # and PHP communication procedures, and have been thinking about how to achieve this function. Later discussions with my friends said that he had done a java and PHP communication case, then think of PHP and NET

PHP and. NET communications [change]

In recent days received an item, use the C # and PHP communication procedures, and have been thinking about how to achieve this function. Later discussions with my friends said that he had done a java and PHP communication case, then think of PHP and

Packet capture tools WireShark

Software Description Wireshark (formerly Ethereal) is a network packet analysis software. Network packet analysis software, network packet capture feature, and shows the most detailed possible packet data network. Network packet analysis functions ca

DB2 in Linux to achieve a complete program of two-machine HA

1. Summary This document describes the SuSE Linux EntERPrise Server v8.0 (SLES 8) on the install and configure DB2 UDB Enterprise Serverv8.2 Dual Active high reliability of the basic steps of the program. The program with the use of SLES volume manag

Linux command line, modify the IP. Gateway. DNS method

Linux command line, modify the IP, gateway, DNS method Way: ifconfig eth0 192.168.1.18 netmask 255.255.255.0 Description: The ways you can make changes take effect immediately, restart will revert to the original IP The second way: vi / etc/sysconfig

Linux learning --vi/cp/scp/ps command summary

1, SSH SSH, his full name is "(SSH: Secure Shell Protocol)" SSH: Secure Shell Protocol Through SSH Secure Shell Client to access Linux server client connection. 2, vi command Note: vi is the unix world, the most common full-screen editor. #vi *.

(Switch) to use syslog-ng build secure centralized server log

Management of Linux systems and application logs are very important and have fun. We want to get is important, useful information, not a lot of garbage. You have to have the ability to log to find the information you need. Old syslogd tools have worked as

C # Implementation start another program with parameters (test network conditions)

Now. Net provides us with powerful features to call external tools, and by redirecting input and output for the implementation of the results, the following example to illustrate the use of a networked call Ping.exe command detection of hope. Net for

James Server Configuration (2)

James server started Double-click \ james-2.3.1 \ bin directory run.bat file to launch the James server. Console displays the following: Using PHOENIX_HOME: F: \ Projects \ James \ james-2.3.1rc1 Using PHOENIX_HOME: F:\项目\James\james-2.3.1rc1 Using P

winXP have online intranet, extranet way wireless

route-p add the definition to allow access within the network address of the IP (not your own wired IP) mask in the mask Cable Gateway Cable As follows: route-p add 192.168.10.0 mask 255.255.255.0 10.68.49.225 192.168.10.0 allow access to the interna

Linux, the Apache reverse proxy ProxyPass IIS Web site summary

Linux, Apache reverse proxy ProxyPass IIS Web site summary of the collection in the write down this conclusion, I would like to say a few words: Do not mix work and love together, anxious edge distressed ah! In order to complete a seemingly simple past an

Construction ipsec VPN with openswan 2.4.7 Notes

Introduction: Against the complex compound tried many times, in line under the guidance of the relevant documents, finally achieved in RH Linux 9.0 (kernel 2.4.20-8) on the way to install openswan-2.4.27 source, but the old system, install the new version

In the HP-UX install wget

The past few days have applied, have to run the HP-UX servers, one of the functions need to use wget refresh a page, not the operating system to install, then went to the official website download wget-1.12-hppa-11.31.depot.gz And reached the server,
Recent
Recent Entries
Tag Cloud
Random Entries