site:http: 192.168.2.1 advance.asp

sponsored links

Router of 192.168.1.1

MAC MAC (Media Access Control, Medium Access Control ) MAC address is burning in the Network Interface Card (NIC, NIC) inside. MAC address, also known as the hardware address is 48 bits long (6 bytes), 16 hex .0-23 bit numbers assigned by the manufacturer

mysql odbc does not recognize 192.168.1.22

Today, the reverse with the power designer mysql database and found that actually can not establish 192.168.1.22 mysql odbc data source, reports: Connection Fialed: [HY000] [MySQL] [ODBC 5.1 Driver] Access denied for user 'xxx' @ '192 .168. 19

Authorized to resolve Host '192 .168.1.180 'is not allowed to connect to this MySQL server

Authorized to resolve Host '192 .168.1.180 'is not allowed to connect to this MySQL server GRANT ALL PRIVILEGES ON *.* TO 'root'@'%' IDENTIFIED BY' mypassword 'WITH GRANT OPTION

Web site domain name change and implementation of ASP | PHP | JSP | HTML 301 Jump

Prepared to modify the CDC home forums directory, the original http://www.cdcman.com/bbs/ directory into http://www.cdcman.com/, are now collecting article. 1, with the HTML Here is the code snippet: <html> <head> <metahttp-equiv=" ...

RROR 1045 (28000): Access denied for user 'root' @ '192 .168.2.12 (using password:

This is a mysql permissions not reported on a solution: 1, landing mysql, mysql-uroot-hlocalhost-p 2, use mysql (must be the library system) 3, update user set host = '%' where user = 'root'; (can be anonymous and no password will be able

Linux, the Apache reverse proxy ProxyPass IIS Web site summary

Linux, Apache reverse proxy ProxyPass IIS Web site summary of the collection in the write down this conclusion, I would like to say a few words: Do not mix work and love together, anxious edge distressed ah! In order to complete a seemingly simple past an

Common SQL injection code

/ / To see what rights and 1 = (Select IS_MEMBER ('db_owner')) And char (124)% 2BCast (IS_MEMBER ('db_owner') as varchar (1))% 2Bchar (124) = 1; - / / Test whether the permission to read a database and 1 = (Select HAS_DBACCESS ('m

ADSL 2M CNC routing cat set

ADSL 2M CNC routing cat set: From the above description, we can know the new route using Netcom 2M biggest problem is that the cat Bell - Alcatel RG100A-AA itself can not be achieved PPPOE auto-dial function, this function has been simplified out of

wip330 upgrade, the sound of small problems to solve

http://rapidshare.com/files/87010718/wip330_USB_driver.rar http://rapidshare.com/files/86603479/wip330_v1_01_00.bin 1) upgrade to support MSN and skype version, and will support activesync, voice can also be increased Open a browser, enter the http:/ ...

Apache UrlRewrite Study Notes

1, Rewrite Rule Description: Rewirte main function is to realize the URL of the jump, it is based on Perl regular expression language. Can be based on the server level (httpd.conf) and directory level (. Htaccess) in two ways. If it is to use rewrite modu

apache and django integration

Under Ubuntu apache integration with Django 1. Download mod_python http://www.modpython.org/ Linux source code is usually provided in the form of downloadable source code needs to be compiled before use, to download off standby 2. Compile mod_python

Jsessionid can not be delivered in settlement iframe session loss problem caused

Interface for the realization ISMP2.1.1 need to use sso , but the interface is defined in ISMP need iframe embedded in the page such as call sso interface found in the actual development session can not be properly delivered. Reproduce the problem sc

The URL from the registry browser to IE Trusted Sites

Do not know why, IE trusted sites add button grayed out, is likely to be domain administrator to engage the ghost, but fortunately there is no sealing of the registry, you can add trusted sites through the registry. IE browser add trusted sites which

svn + trac + apache (centos5.4)

Svn + trac + apache installation configuration SVN + Trac + Apache Raiders complete installation, but the original is lacking in the SVN user and privilege management interfaces, also by Trac to get the plug-in, best of both worlds. Familiar with SVN, but

Windows Server 2003 (Enterprise Edition) Web site on the IIS process and the deployment of Asp.net 2.0 Precautions

1. "/" Application server error. The current identity (NT AUTHORITY \ NETWORK SERVICE) does not on the "C: \ WINDOWS \ Microsoft.NET \ Framework \ v2.0.50727 \ Temporary ASP.NET Files" write access. Solution: Run the following statemen

Records - Notes-html-web site performance optimization

A WEB site performance tuning, Preface: In the development of increasingly sophisticated technological age, using software to solve their daily work, life and even entertainment, friends have become a very common thing. With the rapid development of Inter

Multi-site deployment of IIS blog transferred from tenderloin

Server using IIS server deployment of multi-site environment: Shenzhen XX company with a win2000 server to provide virtual hosting services, the address is 192.168.1.2. Server, Internet service is already installed IIS 5. Requirements: the server usi ...

Asp.net technology ------ session cookie cache

Introduction Session Model Session what is it? It simply means the server to the client a number. When a WWW server is running, there may be several users are browsing this server is being transported on the site. When each user the first time that Taiwan

How to configure iis local publishing site

Finally the site to get the total transfer of a successful, could put my heart and put a big stone to go. However, thinking he is still above the test should iis It needs. Ever since, the Internet to find how to set up in the local iis, and publish a loca

Multi-site deployment of IIS

Server, Internet service is already installed IIS 5. Now the company to ask the network administrator on the server using an IP ABCD four companies for the establishment of an independent Web site, each site has its own unique Established domain name

What is a reverse proxy, how to use reverse proxy to improve site performance

Often see these days talking about in the blog kangzj agent, the article notes also mentioned reverse proxy, and some students use the absolute path of the accelerated play around ghs not quite understand, then to summarize the knowledge of the reverse pr

Site visits to enhance the speed with Nginx

About Nginx Quote Nginx ("engine x") is a high-performance HTTP server and reverse proxy, but also a IMAP/POP3/SMTP proxy server. Nginx by Igor Sysoev of Russia's second Rambler.ru site visits developed, it has been running for more than two

ASP.NET session state services and solutions to problems losing Summary

The notes are reproduced in CNBLOG, the original address: http://www.cnblogs.com/weixing/archive/2009/09/08/session.html ASP.NET2.0 system, made in the program to delete or create file operation occurs when session lost problem. Using the following method

(Rpm) using squid reverse proxy to improve site performance

Article Category: Web front-end text: http://www.ibm.com/developerworks/cn/linux/l-cn-squid/ This paper describes the working principle of squid reverse proxy based on that reverse proxy technology to improve site access speed, enhanced usability, se

asp.net ajax sys is undefined exception handling

sys undefined solution asp.net ajax 2009-08-04 09:47 Error: The Ajax applications when the custom script "Sys not defined" error. Solution 1: to obtain the statement PageRequestManager instances (such as: var prm = Sys.WebForms.PageRequestM

IIS + peanut shells + tomcat: build a Web site with free domain name

On the Web by chance found a peanut shell, their Daoteng a pass, set over set in the past, or the external network can not access my computer, added a customer service QQ, then, is not always online. Yesterday, suddenly found the customer service line a p

Grails to achieve with the API, a web site ideas

As we know, many sites offer API services, including JavaEye. Call the site's API can provide interfaces to other systems use to facilitate the developers to implement mashup. The API can be a general web service, it can be returned xml, json, in fact

Asp.Net access to Oracle database implementation of SQL statements and stored procedure calls

Asp.Net simple example to access Oracle 1. Is a flexible set, will be connected characters written in the web.config file <appSettings> <add key="oracleconn" value="User"/> <add key="oracleconn" value="User (ADDRESS = (PROTOCOL = TCP)(HOST=

Asp.Net access Oracle database implementation of SQL statements and stored procedure calls

Asp.Net simple example to access Oracle 1. Is a flexible set, will be connected characters written in the web.config file 2. For the Web application, add reference to System.Data.OracleClient assembly 3. The following are testing procedures aspx file ...

In the absence of shielding route designated under authority IP (used to mask a malicious Web site)

Since in the evil "rpcss.dll murderous" virus recurrence every day, try the N species is still no way to clear the way, do not want to format the overall (a lot of green soft, easy to collect, format the dismay). Bing Ren found that the dru

In the case of no shielding routing authority designated IP (used to mask a malicious Web site)

Since in the evil "rpcss.dll murderous" virus recurrence every day, try the N species is still no way to clear the way, do not want to format the overall (a lot of green soft, easy to collect, format the dismay). Bing Ren found that the dru

java httpClient4.0 visit the Web site through a proxy authentication

httpClient4.0 visit through a proxy authentication import java.io.IOException; import org.apache.http.HttpEntity; import org.apache.http.HttpHost; import org.apache.http.HttpResponse; import org.apache.http.HttpStatus; import org.apache.http.auth.AuthScop

to deploy jsp linux web site (reproduced from the network)

1. Overview Overview Website deployment process. The deployment guide is about how to deploy in the server main site, as well as related hardware and software configurations, relevant terminology introduced. 2. Hardware and software environment 2.1 Master

Using python to crawl a site data

Mission: Crawl a web site data (items, parameters, image) Recently, enthusiasm for higher learning python, felt it was easier to use, efficient Ye Hao, decided to use python to do the above tasks, Mysql to store data. Mysql version: mysql-5.1.35-win3

Detailed asp.net web.config file

A, Web.Config XML file specification is stored, the configuration file is divided into the following format 1. Configuration section handler declaration Features: Located in the top of the configuration file, included in the <configSections> lo

ADSL sharing on the Internet, the client can not access the site problems

Each holiday home, Dad and I shared notebook is wireless ADSL Internet access, has been very successful. The results come back, do not know why the client can ping all the sites can also log qq, but strangely can not access any site except google. I

APPSERV configure multiple domain names and multi-site

Under the httpd.conf configuration file to add the following, the simplest configuration Open the \ AppServ \ Apache2.2 \ conf httpd.conf configuration file under, Any of the above configuration is not to move directly with the following passage in t

XSS Cross Site principle of attack and vulnerability

What is XSS (Cross Site) attack · XSS (cross site) attacks the concept of XSS also known as CSS (Cross Site Script), cross-site scripting attacks. It refers to a malicious attacker to insert malicious Web page, html code, the time when the user browses th

Build a web site apache peanut shell

4 points to go install the peanut shell -> Installing apache-> configure apache-> configure the router 1. Download and install the peanut shell.'ll Get a free domain name. If xx.gicp.net. 2. Download and install apache. So I downloaded P

Access to some web site through a proxy

import java.io.IOException; import java.io.InputStream; import java.net.Authenticator; import java.net.HttpURLConnection; import java.net.MalformedURLException; import java.net.PasswordAuthentication; import java.net.URL; import java.util.Properties;

C + + source code for a good site

C / C + + is the most important programming languages. Here are 50 outstanding list of sites and pages, these sites provide c / c + + source code. This list provides a link to the source code, and their small description. I have tried to include the best

Wordpress mobile site can not be displayed after the files and pictures to solve the problem

Before the wordpress installation to the root directory of Apache has been no problem. But recently, after moving the directory before the discovery can not download attachments, pictures can not be displayed. After reading some documents found very

Web site submission collection

Following on a collection of resources in English outside the chain, this one I have collected most of the sites submitted to directories, not to say nonsense. We want to help 1, Google submitted http://www.google.com/addurl/?hl=zh_CN 2, Baidu submit

Software life cycle to create B2C e-commerce site

Case 1: Use the software life cycle to create B2C e-commerce website [1] First, the software life cycle Everything has production, development, maturity, die, or update stages, e-commerce website is no exception. [2] any e-commerce system in the course of

Detailed Apache httpd.conf

Apache server configuration file located in / usr / local / apache / conf / directory, the traditional use of the three configuration files httpd.conf, access.conf and srm.conf, to configure the Apache server's behavior. httpd.conf provide the most ba

Apache httpd.conf Xiangjie

Apache server configuration file located in / usr / local / apache / conf / directory, the traditional use of the three configuration files httpd.conf, access.conf and srm.conf, to configure the Apache server's behavior. httpd.conf server configuratio

Common abnormalities resolved

ConcurrentHashMap and CopyOnWriteArrayList comparison. Blog categories: Java ConcurrentHashMap ConcurrentHashMap introduced Segment, each Segment is a hashtable, the equivalent of two Hash table, and then lock in the Segment level, and increased concurren

JDBC technology and database connection pooling feature (reprint)

JDBC Basics First, access the database using JDBC basic steps: A. loading JDBC driver B. definition connection URL C. establish a connection D. create a Statement object E. execute a query or update F. The results dealing with G. Close the connection Seco

js and jsp pages to obtain access to the source and its application

Sometimes we want to know before an address of this page (this page is a link where visitors come's) time, just use the "Access source" approach. javascript for any extension of the pages, but need to talk with other languages (such as ...

Notes from Tomcat and IIS integration

Documents and version: Download Tomcat: Apache Tomcat 6.0.18 File Name: apache-tomcat-6.0.18.exe Java JDK: JDK 1.6.11 (JDK 6 u11) the file name: jdk-6u11-windows-i586-p.exe Connector: jk2 file name: isapi_redirector2.dll Registry file name: jk2.reg IIS: 6
Recent
Recent Entries
Tag Cloud
Random Entries