Installation and configuration of Ubuntu firewall

Ubuntu Install UFW firewall sudo apt-get install ufw For general users, only the following settings are required: sudo apt-get install ufw sudo ufw enable sudo ufw default deny The above three commands are safe enough. If you need to open some services, you can use sudo ufw allow. Enable sudo ufw enable sudo ufw default deny #Aft ...

Added by konn on Fri, 10 Jul 2020 19:12:17 +0300

Huawei -- DHCP experiment

@Huawei - DHCP experiment preface DHCP (Dynamic Host Configuration Protocol) is a protocol designed by IETF to realize automatic IP configuration. It can automatically assign TCP/IP parameters such as IP address, subnet mask, IP address of default gateway and DNS server for clients 1: Experimenta ...

Added by mikeweb on Mon, 29 Jun 2020 11:02:44 +0300

Example of network planning

Article catalog 1, Demand analysis 2, Network topology 3, ip address planning and design 4, Main equipment configuration scheme 1. Three layer switch 2. Router 0 3. Router 1 4. Layer 2 switch 5. Network test 1, Demand analysis Simulator: Cisco packet tracker version 5.3.3.0019 As shown in the ...

Added by bazza84 on Wed, 24 Jun 2020 10:17:53 +0300

Electronic builder packaging configuration + electronic Updater application update complete tutorial And step pit summary

Electronic packaging and application automatic update 1, Electronic builder 1. Installation and configuration of electronic builder 2. Problems and solutions in packaging of electronic builder 2, Electronic Updater 1, Electronic builder 1. Installation and configuration of electronic builder ...

Added by designerguy on Sat, 13 Jun 2020 12:43:52 +0300

MacBook Pro builds maven environment to download jar package

Today, I want to use itext's jar package. I went to the official website and found that I can only download it with maven, but I changed my phone number before. I can't help it. Please try to set up Maven again. Record here and share it or find it in the future The first choice is to make sure that the jdk is installed on your environment. If n ...

Added by wizzkid on Sun, 31 May 2020 18:19:59 +0300

Password RSA encryption of iqiyi login implemented by python

preface The text and pictures of this article are from the Internet, only for learning and communication, not for any commercial purpose. The copyright belongs to the original author. If you have any questions, please contact us in time for handling. Add Penguin Group 695185429 and you can get it for free. All the information is in the group f ...

Added by daniellynn2000 on Tue, 26 May 2020 18:18:13 +0300

Kubernetes practice - build microservices from scratch 1 - build a single tier Node/Express network application with kind

Using kind to build a single tier architecture Node/Express network application Kubernetes practice - build microservice1 from scratch preface Prepare to write a series of practical Kubernetes tutorials. After all, cnblogs, as the earliest technology blog in China, have started to move to Kubernetes. Here, we need to give applause to ...

Added by BrettCarr on Wed, 20 May 2020 08:27:22 +0300

Three solutions of verification code recognition in Python crawler

In the process of Python crawler, some websites need to pass the verification code before entering the web page. The purpose is very simple, that is to distinguish between human reading and machine crawler. The problem of verification code seems simple. It is not easy to achieve high accuracy. In order to learn more about reptiles, the followin ...

Added by j05hr on Mon, 18 May 2020 11:41:05 +0300

C ා basic knowledge series - 17 practical writing a small tool

0. Preface This is a summary of the C ා Foundation Series. Now we use the knowledge we learned before to make a small tool for us to use. If you have read the IO article, you should have an impression. At that time, I mentioned a scenario description. When we use the system, we often worry about finding the location of a file. Now let's try to ...

Added by bampot on Thu, 07 May 2020 08:46:29 +0300

Linux learning notes - supplemental

1.find command Command format: find directory condition value 1.find -name find /etc/ -name passwd ##Find the file named passwd under / etc 2.find -user -group -a -o -not find /mnt -group root find /mnt -user westos find /mnt -group root -user student ##and find /mnt -group root -a -user student ##Both c ...

Added by GaryC on Fri, 01 May 2020 11:04:56 +0300