
-
All
-
web3.0
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Backend Development
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Web Front-end
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Database
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Operation and Maintenance
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Development Tools
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
PHP Framework
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Common Problem
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Other
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Tech
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
CMS Tutorial
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Java
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
System Tutorial
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Computer Tutorials
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Hardware Tutorial
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Mobile Tutorial
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Software Tutorial
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Mobile Game Tutorial
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-

ZTE new pivot system offline installation ceph 16.2.10
About ZTE New Pivot System ZTE New Pivot Operating System is based on the Linux stable kernel and is divided into embedded operating system (NewStartCGEL), server operating system (NewStartCGSL), and desktop operating system (NewStartNSDL). After nearly 10 years of accumulation and development by a professional R&D team , the product has the outstanding advantages of security reinforcement, independent controllability, and easy-to-use management. At present, ZTE's new pivot operating system has been put into use in major domestic and foreign telecom operators, state-owned large and medium-sized enterprises and e-government solutions, serving the bottom layer of switching networks, core networks, backbone networks, smart cities, video surveillance and other systems. The above is reproduced from someone. Background Against the background of national digital transformation and localization substitution, especially
Jun 08, 2023 pm 03:33 PM
What is observability? Everything a beginner needs to know
The term observability originates from the engineering field and has become increasingly popular in the software development field in recent years. Simply put, observability is the ability to understand the internal state of a system based on external outputs. IBM defines observability as: Generally, observability refers to the degree to which the internal state or condition of a complex system can be understood based on knowledge of its external output. The more observable the system is, the faster and more accurate the process of locating the root cause of a performance issue can be without the need for additional testing or coding. In cloud computing, observability also refers to software tools and practices that aggregate, correlate, and analyze data from distributed application systems and the infrastructure that supports their operation in order to more effectively monitor, troubleshoot, and debug application systems. , thereby achieving customer experience optimization and service level agreement
Jun 08, 2023 pm 02:42 PM
Operation and maintenance: Have you used any of the commonly used command line clients for Windows?
For IT operation and maintenance personnel, dealing with commands is essential. Having a useful CMD command line tool is very necessary to improve efficiency. Today I will share with you a commonly used command line client for Windows. I hope It can be helpful to everyone! 1. PowerShell PowerShell is a command line tool that comes with Windows system, with more powerful functions and richer script support. Official documentation: https://docs.microsoft.com/en-us/powershell/. Here are some example commands for you. You can study more interesting commands by yourself. Example of command function Set date and time Set-Da
Jun 08, 2023 pm 02:19 PM
Google's case study on building static code analysis tools
Software bugs cost developers and software companies a lot of time and money. In 2014, for example, a ("gotofail") bug in the widely used SSL protocol implementation caused invalid SSL certificates to be accepted, and another bug related to date formatting caused widespread service outages on Twitter. Such errors can often be detected by static analysis. In fact, they can be quickly identified during the reading of code or documentation, and the final reality is that the situation still occurs in the production environment. Previous work has well reported experiences in applying bug detection tools to software development. But while there are so many success stories among developers using static analysis tools, there are still reasons why engineers are not always willing to use static analysis tools.
Jun 05, 2023 pm 10:22 PM
What are the network devices that Zabbix 3.0 monitors?
Introduction to SNMP 1 Overview of SNMP SNMP has developed to become the most widely used network management protocol. The currently applied versions mainly include SNMPv1, SNMPv2c and SNMPv3. The main differences between the versions are in the definition of information, the operation of communication protocols and the security mechanism. At the same time, two extensions of SNMP applications, remote network monitoring RMON (Remote Network Monitoring) and RMON2, have also appeared. From the perspective of the physical layer, using SNMP to manage the network should include: network management station (NMS), agent (Agent), and proxy server (proxy). NMS can generate commands and receive notification information. There must be at least one in the network management
Jun 04, 2023 am 08:44 AM
What are the benefits of deploying an SSL certificate?
1. Definition of SSL certificate An SSL certificate is a server digital certificate that complies with the SSL Secure Socket Layer protocol. The SSL security protocol was originally designed and developed by Netscape Communication Company of the United States. Its full name is: Secure Sockets Layer Protocol (SecureSocketsLayer). It specifies the provision of data between application protocols (such as HTTP, Telnet, FTP) and TCP/IP. The security layered mechanism is a security protocol implemented on the Transport Communication Protocol (TCP/IP). It uses public key technology to provide data encryption, server authentication, message integrity and reliability for TCP/IP connections. Selected client authentication. Since this protocol is well
Jun 03, 2023 pm 06:54 PM
How to install and use Fiddler
Introduction to Fiddler ① Fiddler is a powerful packet capture tool. Its principle is to work in the form of a web proxy server. The proxy address used is: 127.0.0.1, port The default is 8888, we can also modify it through settings. ②Proxy is to set up a barrier between the client and the server. After the client sends the request data first, the proxy server will intercept the data packet, and the proxy server will intercept the data packet. The proxy server then pretends to be a client and sends data to the server; similarly, the server will return the response data, and the proxy server will also intercept the data and return it to the client. ③Fiddler can capture support
Jun 03, 2023 pm 06:18 PM
Solution to USG address mapping problem
The USG6000 series firewall I use, the situation overview: 1. The internal network address business of accessing the server from the internal network address is normal 2. The public network address business mapped by the external network access server is normal 3. The solution to the exception of the public network address business of the internal network address access server : 1. Whether the firewall server mapping policy is written properly. Do not join the security domain. 2. UNtrust in the security policy -> trust whether to allow access to the server address 3. In the NAT policy, source NAT adds trust to the trust zone to allow normal access to the server address. I failed in the third item, so it caused the intranet The public network address mapped by the address access server is abnormal. Attached is a picture
Jun 03, 2023 pm 05:31 PM
How to use Masscan, Nmap, and ELK to collect intranet assets
Install install masscan#yuminstallgitgccmakelibpcap-devel#gitclonehttps://github.com/robertdavidgraham/masscan#cdmasscan#make#cpbin/masscan/bininstall the latest nmap7.8wgethttps://nmap.org/dist/nmap-7.80-1.x86_64 .rpmrpm-ivhnmap-7.80-1.x86_64.rpm install es and kibanadockerrun -d --namees-
Jun 03, 2023 pm 03:43 PM
What is file sharing in Windows 2008?
Work task implementation 1. Create users and user groups in "Work Order 2" (only two users can be created for information, sales and financial user groups); (1) Create user groups and users in batches, and add users to user groups (2) Save the desktop, change the extension to .bat, and run (3) Successfully created 2. Create a shared folder named "share" on the C drive, and create a folder with the group name in the folder. , create a folder named after its own name in each folder; (1) Create a shared folder named "share" on the C drive, right-click and properties Advanced Sharing (2) Create a folder named after the group name ( 3) Create a folder with the employee’s name in each folder 3. Ensure that employees in each department are on another computer
Jun 03, 2023 pm 03:39 PM
What is the Turla organization?
Turla Organization Overview Turla, also known as Snake, Uroburos, Waterbug, WhiteBear. After being disclosed by GData in 2014, Kaspersky, Symantec, and ESET continued to track and analyze the organization. The malicious files used by the group were compiled as far back as 2011. Through comparison of codes and functions, it can be traced back to 2006 that a malicious file named Agent.BTZ was detected to be associated with this organization. Therefore, it can be inferred that the organization has begun to carry out attacks as early as 2006. The Turla organization uses rootkit technology to monitor computers and complete data theft. This method works on Windows
Jun 03, 2023 pm 01:44 PM
How to analyze reflected XSS
1 Test environment introduction The test environment is the DVWA module in the OWASP environment 2 Test description XSS is also called CSS (CrossSiteScript), a cross-site scripting attack. It refers to a malicious attacker inserting malicious HTML code into a Web page. When a user browses the page, the HTML code embedded in the Web will be executed, thereby achieving the special purpose of maliciously attacking the user, such as obtaining the user's cookie. Navigate to malicious websites, carry attacks and more. This vulnerability could be exploited by an attacker to hijack the session of an authenticated user. After hijacking an authenticated session, the virus originator has all the permissions of that authorized user. 3. Test step: Enter the javascript script code in the input box: al
Jun 03, 2023 pm 12:09 PM
How to implement MPLS and LDP label distribution
Experimental requirements: 1. Purpose-based LDP session 2. Control label notification through LDP 3. MPLSLDP inbound label bundling filtering Topology environment description: 1. All interconnection IPs are as shown in the figure 2. The Loopback0 port address of all devices is X.X.X.X/ 32, :mplslabelrange100199mplslabelprotocolldpmplsldprouter-idLoopback
Jun 03, 2023 am 11:32 AM
How to use Performance to monitor front-end performance
Performance.nowPerformance is an API that is indispensable for front-end performance monitoring. It is best to use it after the page is fully loaded, because many values must be obtained after the page is fully loaded. The simplest way is to read various data in the window.onload event. The performance.now() method returns a DOMHighResTimeStamp accurate to milliseconds. According to MDN: This timestamp is not actually highly accurate. In order to reduce security threats like Specter, various browsers round off the value of this type to varying degrees. (Firefox starting with Firefox59
Jun 03, 2023 am 09:02 AM
Hot tools Tags

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

vc9-vc14 (32+64 bit) runtime library collection (link below)
Download the collection of runtime libraries required for phpStudy installation

VC9 32-bit
VC9 32-bit phpstudy integrated installation environment runtime library

PHP programmer toolbox full version
Programmer Toolbox v1.0 PHP Integrated Environment

VC11 32-bit
VC11 32-bit phpstudy integrated installation environment runtime library

SublimeText3 Chinese version
Chinese version, very easy to use
