Installation and configuration of Ubuntu firewall
Ubuntu Install UFW firewall
sudo apt-get install ufw
For general users, only the following settings are required:
sudo apt-get install ufw
sudo ufw enable
sudo ufw default deny
The above three commands are safe enough. If you need to open some services, you can use sudo ufw allow.
Enable
sudo ufw enable
sudo ufw default deny
#Aft ...
Added by konn on Fri, 10 Jul 2020 19:12:17 +0300
MCU platform libjpeg9 porting instructions
MCU platform libjpeg9 porting instructions
With the performance of MCU platform becoming more and more powerful, it is possible to use jpeg soft decoding on MCU. This paper will explain the migration of libjpeg.
libjpeg is a widely used JPEG image compression / decompression open source library, which ...
Added by milind24 on Sun, 21 Jun 2020 13:26:51 +0300
Junzheng darwin Source Synchronization Tutorial
Environment: Ubuntu 18.04
1. Acquire license certification
Get the document from darwin source, use "Alt+Ctrl+T" to open the command window, enter
$ssh-keygen
All the way back, back, back
You can see that the generated id_rsa file, at / home/wangcen/.ssh/id_rsa location (different computer ...
Added by mridang_agarwal on Fri, 12 Jun 2020 04:25:17 +0300
Raspberry school learning notes - temperature and humidity detection (local OLED display, ONENET cloud platform display)
Article catalog
preface
1, Hardware connection
2, Raspberry pie enable I2C function
1. Enable I2C Kernel Module
2. Install I2C tools
3, Local temperature display
1. Installation luma.oled 's bag
2. Light up the oled screen
3. Local temperature and humidity detection
4, ONENET cloud platform displ ...
Added by matts12290 on Thu, 11 Jun 2020 10:48:32 +0300
[reptile] Selenium actual combat notes
selenium initialization
Note that if Chrome is not installed in the default path, you need to use the option.binary_location sets the path of chrome. If the chrome driver is not in the same path as the current code, you also need to set the path of the chrome driver.
option = webdriver.ChromeOptions() ...
Added by rachae1 on Tue, 09 Jun 2020 08:30:54 +0300
A concise guide to firewall D on Linux
Firewall D is the front-end controller of iptables, which is used to implement persistent network traffic rules.
It provides command line and graphical interfaces, which are available in the repositories of most Linux distributions. There are two main differences between using firewall D and controlling iptables directly:
Firewall D uses zone ...
Added by 01706 on Thu, 28 May 2020 07:10:56 +0300
docker installation and use under CentOS 7
docker start stop
sudo systemctl start docker.service
sudo systemctl stop docker.service
sudo systemctl restart docker.service
sudo systemctl status docker.service
sudo systemctl enable docker
sudo docker ps -a ## <-- List existing images ##
sudo docker stop 17dd4ab4cda2 ##<-- 17dd4ab4cda2 by container id ##
sudo docker rm 17dd4ab4cda ...
Added by Phirus on Thu, 21 May 2020 17:37:51 +0300
CentOS 7 installation using the Shadowsocks client
Experimental background: since the installation of k8s requires the use of an agent to use the official source, it is necessary to configure an agent in CentOS7 for scientific Internet access
Install the Shadowsocks client
Install epel source and pip package management
sudo yum -y install epel-release
sudo yum - ...
Added by aconway on Thu, 30 Apr 2020 13:53:43 +0300
Configure SQL Server 2019 AG in Azure CentOS VM-
Preceding text
Assume you have basic knowledge of Azure and SQL Server HA
Assume you have basic knowledge of Azure Cli
The goal is to create an availability group with three replicas on Azure Linux VM and implement listener and Fencing configuration
Environmental Science
SQL Server 2019 Developer on Linux
Azure VM Fencing agent
Azure Cli imp ...
Added by Trey395 on Wed, 29 Apr 2020 12:50:01 +0300
Using Rest api to manage Ceph gateway
background
The development of microservices based on Ceph RadosGW requires that callers can create users and obtain user information through rest api.
Realization
Ceph's RadosGW has this function itself. These functions of creating users, obtaining user information, obtaining usage, etc. are called admin operation. We can access and perform adm ...
Added by everogrin on Wed, 15 Apr 2020 19:31:16 +0300