http: 192.168.0.99:99 index1.htm

sponsored links

Router of 192.168.1.1

MAC MAC (Media Access Control, Medium Access Control ) MAC address is burning in the Network Interface Card (NIC, NIC) inside. MAC address, also known as the hardware address is 48 bits long (6 bytes), 16 hex .0-23 bit numbers assigned by the manufacturer

mysql odbc does not recognize 192.168.1.22

Today, the reverse with the power designer mysql database and found that actually can not establish 192.168.1.22 mysql odbc data source, reports: Connection Fialed: [HY000] [MySQL] [ODBC 5.1 Driver] Access denied for user 'xxx' @ '192 .168. 19

Authorized to resolve Host '192 .168.1.180 'is not allowed to connect to this MySQL server

Authorized to resolve Host '192 .168.1.180 'is not allowed to connect to this MySQL server GRANT ALL PRIVILEGES ON *.* TO 'root'@'%' IDENTIFIED BY' mypassword 'WITH GRANT OPTION

RROR 1045 (28000): Access denied for user 'root' @ '192 .168.2.12 (using password:

This is a mysql permissions not reported on a solution: 1, landing mysql, mysql-uroot-hlocalhost-p 2, use mysql (must be the library system) 3, update user set host = '%' where user = 'root'; (can be anonymous and no password will be able

java network access outside the local LAN IP

Recently, the house to meet two Azeri communications needs, need to be outside the local network IP to tell the people to another room. Years ago are calling a group, I am here, IP is XXXX, that one day their own whim, to achieve this through the program

nginx proxy for less than the true client IP

In the Linux environment, the use of strong Nginx - reverse proxy, resulting in use request.getRemoteAddr () to obtain the IP are the company's proxy server IP, logging serious inaccurate! We all know that access to the client server IP address i

[Change] No 99 Knife simple SDK2.2.1 real machine running the certificate method Photo Tutorial

http://www.cocoachina.com/bbs/read.php?tid-3491.html Although I was new to iphone development (last Friday before the first hello world), but not less playing time for the iphone, cracked software cydia where there are more than N (sin sin), so the r ...

Common abnormalities resolved

ConcurrentHashMap and CopyOnWriteArrayList comparison. Blog categories: Java ConcurrentHashMap ConcurrentHashMap introduced Segment, each Segment is a hashtable, the equivalent of two Hash table, and then lock in the Segment level, and increased concurren

ExtMail Solution HOWTO for Linux amendment and installation notes

Recently set up a Linux host. The operating system is CentOS 4.4. Looking for a complete mail solution, so I suffered for a long time. I asked to support POP3, SMTP, SSL, WEBMAIL and multi domain settings. Finally, I found ExtMail Solution, a perfect real

apache2.2.12 + tomcat6.0.20 integration Xiangjie

<! - [If gte mso 9]> <xml> <w:WordDocument> <w:View> Normal </ w: View> <w:Zoom> 0 </ w: Zoom> <w:TrackMoves/> < w: TrackFormatting /> <w:PunctuationKerning/> <w:DrawingGridVerticalSpacing>

Nginx Chinese Manual Download

Nginx Common Applications Guide [Nginx Tips] Second Edition Study: NetSeek http://www.linuxtone.org (IT operation and maintenance network of experts | cluster structure | performance tuning) Welcome reproduced, reprinted, please be sure to hyperlink to th

CentOS 5.5 setup log - (5) LAMP basic configuration

LAMP installation is complete, we now do the basic configuration. (A) Apache (httpd) 1. To modify the type of the initial page # Nano / etc / httpd / conf / httpd.conf Find the DirectoryIndex, revised as the following: DirectoryIndex index.html index

Web-based reverse proxy cache acceleration

Abstract: For a day visit the site reached one million, the rate quickly became a bottleneck. In addition to optimizing the application of content publishing system itself, if it can not updated in real time the output of dynamic pages into static pages t

CentOS 5.5 installation log - (5) LAMP basic configuration

LAMP installation is complete, we now do the basic configuration. (A) Apache (httpd) 1 to modify the initial page of type # Nano / etc / httpd / conf / httpd.conf Find DirectoryIndex, modify the following: DirectoryIndex index.html index.htm index.sh

VNC Remote Control for Linux to use

"VNC Introduction" Network remote control technology refers to a computer (host) to control another computer (host), and when the control side host, the host just as before the operation the user sitting in the same person can perform host appli

I used Linux command of ssh - Secure Shell Client

I used Linux command of ssh - Secure Shell Client This link: http://codingstandards.iteye.com/blog/1005494 (reproduced please indicate the source) Use Description The ssh command is commonly used under Linux telnet client tool used to replace telnet,

Nginx Common Application Technical Guide

Author: NetSeek http://www.linuxtone.org (IT operation and maintenance network of experts | cluster architecture | tuning) Welcome reproduced, reprinted, please be sure to indicate the form of hyperlinks original source of article and author information a

The Heartbeat High Availability Linux installation program (original)

Before installing Heartbeat Heartbeat cluster hardware must be seen from the figure, the system must build a Heartbeat cluster hardware are: Node server; Network and network card; Shared disk. Heartbeat node server installation requires at least two hosts

And installation of JBOSS Cluster

JBOSS Cluster 1. Preface In 2006, Jboss Was Redhat Acquired. This is a direct result of structural adjustment Jboss products and Jboss AS charges before the document be changed free of charge. jijian91 The cluster is based on the initial test of the resul

Install Glassfish 2.1 with HADB

Glassfish Logo If you want 99.999% availability of your Glassfish cluster then you should do 2 things: 1. Use HADB for user HTTP and Session persistence, 2. Get some SUN support. I cannot help you with the decision on point 2, but with point 1 I will show

Use visualVM monitor remote Tomcat

Remote server IP: 192.168.2.99 JDK: jdk1.6.0_17 TOMCAT: 6.0.20 Monitoring Terminal IP: 192.168.2.49 JDK: jdk1.6.0_17 Steps: 1 / In JDK / bin under a new text file, name jstatd.all.policy Reads as follows: grant codebase "file: $ (java.home }/../ ...

James mail server installation and configuration

James mail server installation and configuration of environment: Mail Server: OS: REDHAT LINUX AS 4 IP: 192.168.1.108 Subnet Mask: 255.255.0 Gateway: 192.168.1.1 DNS: 192.168.1.2 Client: Operating System: windows 2003 IP: 192.168.1.2 Subnet Mask: 255 ...

LAN offensive and defensive extract

First, look for other ways - change the MAC address I understand that each card's MAC address (hardware address) vary, which is used to prove the identity of the unique identifier ID. The local area network communication must rely on MAC addresse ...

Netty performance test (compared with the Tomcat)

Netty has always accepted that the performance will be very good intention to use it at the appropriate time to develop some of the demands of new ultra-high-performance services. Today's great interest in writing a simple HTTP services, also wrote a

Apache + Tomcat load balancing. Cluster configuration

This article is read by several predecessors on Apache + Tomcat load balancing, clustering related articles put together in order to access an article. For instructions are load balancing, clustering, and their advantages are discussed here will not ...

Easy to install mediawiki tutorial

** About mediawiki Some good information: http://codex.wordpress.org.cn/Mediawiki% E5% BB% BA% E7% AB% 99% E7% BB% BC% E8% BF% B0 http://www.ziyuan8.com/Article/IT/200810288308.html mediawiki installation steps: 0) ready to install the environment: I ...

Traceroute command. View DNS.IP.Mac etc.

1. The most basic, the most commonly used to test the physical network, ping 192.168.0.8-t, parameter-t is waiting for the user to interrupt testing 2. View the DNS, IP, Mac, etc. A.Win98: winipcfg B.Win2000 above: Ipconfig / all C. NSLOOKUP: If the ...

Of UDP through NAT P2P Theory and Implementation

Forum on the P2P principle often discussed, but return to discuss the discussion, there is little for something real (source code). Oh, here I own a source code implementation to illustrate the principle of UDP through NAT. First of all, will introdu ...

Of UDP through NAT P2P Theory and Implementation - enhanced article

Keywords: P2P UDP NAT principle through Traveral Symmetric Cone Original author: Hwycheng Leo (FlashBT@Hotmail.com) Source Download: http://bbs.hwysoft.com/download/UDP-NAT-LEO.rar Reference: http://midcom-p2p.sourceforge.net/draft-ford-midcom-p2p-01.txt

cisco router to delete a single ACL perfect

Duo created on the router access control lists, inspection found a wrong and wanted to Ta delete, global schema, using the no access-list seq ....., results collapsed, the whole access list not see the. Ask for advice you bully, how to remove an access li

tracert command Xiangjie

Tracert (trace route) is a route tracing utility used to determine the IP datagram access to the path taken by the target. Survival time of the order with the IP (TTL) field and ICMP error messages to determine the network from one host to another ho ...

Common network commands (2)

1. The most basic, the most commonly used to test the physical network ping 192.168.0.8-t, parameter-t is waiting for the user to interrupt testing 2. View the DNS, IP, Mac, etc. A.Win98: winipcfg B.Win2000 above: Ipconfig / all C. NSLOOKUP: If the D ...

What is the gateway gateway

What is Gateway? Gateway (Gateway), also known as gateway, protocol converter. Gateway at the transport layer to achieve network interconnection is the most complex network interconnection facilities, only two high-level agreement for the interconnec ...

Mail:: SpamAssassin:: Conf - SpamAssassin Configuration Guide

Mail:: SpamAssassin:: Conf - SpamAssassin configuration guide English version of the same address - http://spamassassin.apache.org/full/3.2.x/doc/Mail_SpamAssassin_Conf.html Revision and the translator Notes 2004/11/13 first release for SpamAssassin 3.0.x

CentOS5.3 install Oracle11g (Graphic) (3)

Next is to configure the environment of the Set user [Root @ localhost /] # groupadd oinstall (Creating user group oinstall) [Root @ localhost /] # groupadd dba (Creating user group dba) [Root @ localhost /] # cd / [Root @ localhost /] # mkdir-p / fa ...

Note 2 load balancing

Lvs or F5 load system, all requests need to ask too dispatcher, said from the system, it is the so-called hot equipment, no matter how excellent the performance of the device, sooner or later will become the performance bottleneck. Read the memcached syst

Three models configured LVS

LVS of three (LVS-DR, LVS-NAT, LVS-TUN) mode configuration summary What is LVS: http://www.linuxvirtualserver.org/VS-NAT.html http://www.linuxvirtualserver.org/VS-IPTunneling.html http://www.linuxvirtualserver.org/VS-DRouting.html The first is to ins ...

Linux + OS Interview

Linux face questions Daquan http://jythoner.javaeye.com/blog/348231 http://blog.chinaunix.net/u3/108239/showart_2195301.html 1. Fill in the blank: 1. In the Linux system in order to file access device. 2. Linux kernel boot time, from the file / etc / fsta

[Change] English tutorial wonderful putty

These words are from my years of experience in the use PuTTY come slowly, but also just introduced PuTTY, also includes a number of related software, such as: excellent FTP tools FileZilla, a powerful SFTP client WinSCP . Invent a number of assorted, larg

mysql master-slave replication, separate read and write

From: http://hi.baidu.com/yzy888/blog/item/98784fd074381d84a0ec9cc3.html mysql master-slave replication master server IP: 192.168.99.10 From the server IP: 192.168.99.20 (A) install mysql (master and slave server, the same operation) yum-y install gc ...

jdbc stored procedure to return from a single object or PL / SQL table

Return to a single PL / SQL table, the element type to create a scalar type, header, packet body create or replace type tab_array is table of varchar2 (38); / create or replace package addnum is procedure abc (e_name in tab_array, t_name out tab_array); e

Collection of PHP regular expressions examples

2008-04-13 15:32 / / intercept the middle of the string method preg_match ('/(?: ello )(.*)/', 'hello biafra', $ match); print_r ($ match); Array ( [0] => ello biafra [1] => biafra ) preg_match ('/ (ello )(.*)/',' hello b

Oracle sqlplus command using a remote connection

Method 1: Your tnsnames.ora which have AUSHS = (DESCRIPTION = (ADDRESS_LIST = (ADDRESS = (PROTOCOL = TCP) (HOST = *.*.*.*)( PORT = 1541)) ) (CONNECT_DATA = (SERVICE_NAME = AUSHS) ) ) Then connect system / manager @ AUSHS tnsping WSERVER_202.108.99.99 ...

Ruby script a button to restore the database

Production per hour, automatically back up the database, compressed upload to the company's ftp server, ftp server deployment in the company intranet. So every time I use the build environment for the database to do development, they all need acc ...

[Reading notes] graphical TCP / IP (Overview)

Note: This Ethernet-based 0. Preparations 1) Tools Ethereal 0.99.0: Ethereal wget: number of HTTP to avoid interference, use wget to access the web page 2) Prepare / run Close other requests may produce network programs (such as QQ) Clear the ARP cache: a

a Reference linux side

1. Fill in the blank: 1. In the Linux system to access the device file. 2. Linux kernel boot time, from the file / etc / fstab to read the file system to load. 3. Linux file system each file is identified with i nodes. 4. All disk block consists of four p

rabbitmq connection_closed_abruptly

Messaging middleware in use rabbitmq do when you send a message of a problem is that when calls come when the remote interface connection aborts, then the local implementation of the successful implementation of the remote with no success. View rabbi ...

PuTTY Chinese Tutorial

These words are from my years of experience in the use PuTTY come slowly, but also just introduced PuTTY, also includes a number of related software, such as: excellent FTP tools FileZilla, a powerful SFTP client WinSCP . Invent a number of assorted, larg

Traceroute command. View DNS.IP.Mac

1. The most basic, the most commonly used to test the physical network, ping 192.168.0.8-t, parameter-t is waiting for the user to interrupt testing 2. View the DNS, IP, Mac, etc. A.Win98: winipcfg B.Win2000 above: Ipconfig / all C. NSLOOKUP: If the ...

Remote connection oracle10

XX: \ oracle \ product \ 10.2.0 \ db_1 \ NETWORK \ ADMIN \ tnsnames.ora PERFORMA = (DESCRIPTION = (ADDRESS = (PROTOCOL = TCP) (HOST = 192.168.0.99) (PORT = 1521)) (CONNECT_DATA = (SERVER = DEDICATED) (SERVICE_NAME = Performance) ) ) Connection, conne ...
Recent
Recent Entries
Tag Cloud
Random Entries