1, first upload the file and extract Use the command: guzip httpd-.tar.gz tar xvf httpd-2.2.14.tar 2, but change to the httpd-2.2.4 directory. Cd httpd-2.2.4 3, the implementation of. / Configure-C - enable-so - prefix / apache/apache2 - with-include ...
Hello! I am basically a teacher in accordance with the video settings for a small cloth VMWARE the Host-only mode. vmware on network address: 192.168.0.55 windows on the network address: 192.168.0.1 Default Gateway: 192.168.0.1 Connect with secureCRT ...
Description: Client service at a time when the first request, the request will be verified prior to send secure information, so when you catch the "policy-file-request" when the direct return policy file information: "<? Xml version
1. In the browser, type: http://ip:port/em/ as http://192.168.1.55:1158/em/ 2. Login and click the lower left corner Guidance Center 3. Into the results list and select ADDM, and then click on the list at the top of the View Results 4. You can see th
Hibernate implementation of the custom local sql database can be flexibly used to customize the search complexity CRUD
Hibernate defined in the resource file in the complex since the definition of sql, the flexibility to customize complex additions and deletions to change search Ci Fangfa not limited to the previous mode or hibernate xml 声明 annotating the entity clas
Oracle Client is mainly produced SQLPLUS command, EXP and IMP commands, usually in the machine installation if the ORACLE server, of course, very powerful server, the database can be built gradually getting better, will contain the Client so server-s
Oracle Client is mainly produced SQLPLUS command, EXP and IMP commands, usually if you install the ORACLE server, of course, the database server can be built very strong Han, and will include the Client so the server-side program is very large. If yo
I used Linux command of the hostname - show or set the hostname This link: http://codingstandards.javaeye.com/blog/804648 (reprint, please indicate the source) Use Description hostname command can be used to display or set the host name (show or set
NFS Raiders - Linux file server set up and use cases This link: http://codingstandards.javaeye.com/blog/816246 (reprint, please indicate the source) This article includes: 1 NFS Overview 2 Linux NFS server settings under the 3 Linux NFS client settin
NFS Raiders - Linux file server set up and use cases This link: http://codingstandards.javaeye.com/blog/816376 (reprint, please indicate the source) This article includes: 1 NFS Overview 2 Linux NFS server settings under the 3 Linux NFS client settings un
NFS Raiders - Linux file server set up and use cases This link: http://codingstandards.javaeye.com/blog/816389 (reprint, please indicate the source) This article includes: 1 NFS Overview 2 Linux NFS server settings under the 3 Linux NFS client settings un
NFS Raiders - Linux file server set up and use cases This link: http://codingstandards.javaeye.com/blog/816441 (reprint, please indicate the source) This article includes: 1 NFS Overview 2 Linux NFS server settings under the 3 Linux NFS client settin
I used the Linux command telnet - telnet-based tools TELNET protocol This link: http://codingstandards.javaeye.com/blog/835485 (reprint, please indicate the source) Use Description remote login telnet command is often used. telnet program is based on
11G RAC scan that IP address resolved by DNA, oracle recommended configuration 3, so you can play the role of load balancing and redundancy. System case: rac01, rac02 Operating system platforms: red hat enterprise 5.4 2 virtual machines where we need
(A) of the HTTP header first met Whenever people are engaged in the development can not be separated WEB HTTP (Hypertext Transfer Protocol), and to understand HTTP, HTML itself, in addition, there can not be ignored is the part of the HTTP header. Socket
I used Linux command of telnet - telnet TELNET protocol-based tools This link: http://codingstandards.iteye.com/blog/835485 (reproduced please indicate the source) Use Description The telnet command is usually used to log in remotely. telnet program is ba
1, weblogic816 C: \ Documents and Settings \ tony> java-cp E: \ bea816 \ weblogic81 \ server \ lib \ weblogic.jar weblogic.Admin-url localhost: 7001-username weblogic-password weblogic THREAD_DUMP Thread Dump has been printed to the servers standard ou
Original Address: http://www.cnblogs.com/xhan/archive/2011/02/05/1949276.html redis is a cs mode tcp server, using a similar request and http response protocol. A client socket connection can be initiated by a number of request command. Request comma
Original Address: http://www.cnblogs.com/xhan/archive/2011/02/06/1949473.html Publish subscribe (pub / sub) is a messaging model, the main purpose is to decouple the message subscribe news release and the coupling between this point and the observer
Hibernate resource file defined in the complex custom sql, flexibility to customize complex CRUD This method is not limited to comments before the hibernate mode or xml declaration entity class. A definition of the resource that contains a custom sql
Oracle Client is mainly produced SQLPLUS command, EXP and IMP commands, usually installed in the machine if the ORACLE server, of course, the database server can be built very strong Han, will contain the Client so server-side program is very large.
11G RAC scan that IP address using DNA analysis, oracle recommended configuration 3, so you can play the role of redundancy and load balancing. System conditions: rac01, rac02 Operating system platform: red hat enterprise 5.4 2 virtual machines where
Mysql cluster cluster configuration of personal experience. Preparing for installation: 1 the required software. Management node: MySQL-Cluster-gpl-management-7.1.9a-1.rhel5.i386.rpm MySQL-Cluster-gpl-tools-7.1.9a-1.rhel4.i386.rpm sql node: MySQL-Clu
Environment: host is win7, the virtual machine using xp The following is quoted: Assuming your network card ip win7 is 192.168.1.55, VMWare will give you install two virtual NICs, one is NAT, the virtual machine's network card using NAT, then thi
Although the workflow is still immature stage of development, not even a recognized standard. But its application has already been launched in the Express, indicating the market's demand for job-flow framework are urgent and enormous. Backgrounds of o
Liux under the latest tomcat5.5.25 + mysql5.0.45 + jdk18.104.22.168 + eclipse3.3.1 + myeclipse6.0 one configuration, install the required packages: 1.JDK 5.0 Update 13 (jdk-1_5_0_13-linux-i586-rpm.bin) Download Address: http://sdlc-esd.sun.com/ESD36/JSCDL/jdk/
1, ping It is used to check whether the network or the network connection speed of smooth order. As a living in the network administrator or a hacker who, ping command is the first one must master the DOS commands, using the principle that it is this ...
1. A simple internal command batch Introduction 1.Echo Command Open the Echo Request Echo feature on or off, or display a message. If no arguments, echo command will display the current echo setting. Syntax: echo [(on │ off )] [message] Sample: @ echo off
<? xml version = "1.0" encoding = "UTF-8"?> <beans xmlns = " http://www.springframework.org/schema/beans " xmlns: xsi = " http://www.w3.org/2001/XMLSchema-instance " xmlns: aop = " http://www.springfra
Content: 1, Log4J configuration files to learn 2, Log4J Database 3, Log4J package 1, Log4J configuration file to learn: Log4j supports two configuration file formats, one is XML-formatted file, a file is a Java properties (key = value). Here we first intr
I. Preface knew maven project management in java distinguished reputation, so the thought of learning to master, so access to a large number of documents. The authors found that these documents are the biggest names in java, most of them are all on the ma
Related to network management and backup software brand Symantec (Symantec) Network Microsoft (Microsoft) Network Network management and backup software Acronis Hewlett-Packard (HP) network management and backup software Poly Health Network Management (Ne
Spring configuration with C3P0 Reprinted 2008-09-11 10:54:34 Read 55 Comments 0 Adjust Font Size: applicationContext.xml file: <? xml version = "1.0" encoding = "UTF-8"?> <beans xmlns = "http://www.springframework.org/sch
Keywords: tomcat clustering, load balancing, session synchronization (A) Environmental description (1) The server has four units, one to install apache, three to install tomcat (2) apache2.0.55, tomcat5.5.15, jk2.0.4, jdk1.5.6 or jdk1.4.2 (3) ip configura
(A) Environmental description (1) The server has four units, one to install apache, three to install tomcat (2) apache2.0.55, tomcat5.5.15, jk2.0.4, jdk1.5.6 or jdk1.4.2 (3) ip configuration, a single installation of apache's ip as 192.168.0.88, three
[Change] http://www.cnblogs.com/zhangyi85/archive/2009/04/15/1436786.html Cluster Background 1.1 Definition of Terms Services software is b / s, or c / s structure, s part of the b or c for the provision of services of software systems. Services, har ...
Transfer must have the cmd command line eight  Articles Category: Operating system Must have the cmd command line eight  1, ping It is used to check whether the network or Internet connection speed smooth order. As a living network administrator ...
Sybase Chinese problem solving (http://blog.csdn.net/kingspider/) (Http://blog.sina.com.cn/u/1163490885) 1. JDBC connection string must have character sets jdbc: sybase: Tds: 192.168.3.11:5000 / Wfis_db? charset = cp936 2. Server configured cp936 (1) ...
Linux face questions Daquan http://jythoner.javaeye.com/blog/348231 http://blog.chinaunix.net/u3/108239/showart_2195301.html 1. Fill in the blank: 1. In the Linux system in order to file access device. 2. Linux kernel boot time, from the file / etc / fsta
In the database table is missing or corrupted, the backup of your database is very important. In the event of system crashes, you want to lose your table at least as far as possible the data back to the time of the collapse of the state. This article ...
Notes did not add order for reference purposes only friends can not understand to explore. Oh one network card installed on the host host dell Optiplex 780, pre-installed version is ubuntu, its format is windows 2003 server edition, it was found not recog
NET use \ \ IP \ IPC $ "" / User: "" the establishment of air links IPC NET use \ \ IP \ IPC $ "password" / user: "User name" non-establishment of air links IPC NET use H: \ \ IP \ c $ "password" / user:
Linux vsftpd installation configuration to use (more) In this paper, a number of previous articles written on many occasions with their own installation and configuration experience, written in more detail, the article finally ftp command set with all the
maven2 authoritative guide to Britain: http://xizhenyin.javaeye.com/blog/609409 Transfer from: http://itren2006.blog.ccidnet.com/blog-htm-itemid-60879-do-showone-type-blog-uid-21308.html MAVEN2.0 Practical Guide Author: Li, Haipeng I. Introduction Kn ...
MySQL's Replication Implementation After In the MySQL 3.23.15 version, MySQL provides database replication features, you can achieve the two databases synchronized in real time, enhance the MySQL Database the stability, but also the Qi Ye-class applic
1 , Weblogic10.3.1.0.0 cluster configuration requirements 1, two in the same segment, and can visit each other's computers. 2, two computers are installed Weblogic10.3.1.0.0 version of the application server. 3, the installation media Note: the cluste
(Transfer from: http://bbs.cz88.net/t413693p1p1) 1, ping It is used to check whether the network or Internet connection speed smooth order. As a life on the network administrator or hacker is, ping command is the first to grasp the DOS command, using the
1. Simple internal command batch Introduction 1.Echo command to open or close the request echo echo function, or display messages. If no parameters, echo command will display the current echo setting. Grammar echo [(on | off)] [message] Sample: @ echo off
1. Fill in the blank: 1. In the Linux system to access the device file. 2. Linux kernel boot time, from the file / etc / fstab to read the file system to load. 3. Linux file system each file is identified with i nodes. 4. All disk block consists of four p
Messaging middleware in use rabbitmq do when you send a message of a problem is that when calls come when the remote interface connection aborts, then the local implementation of the successful implementation of the remote with no success. View rabbi ...