Website System Security Configuration (Nginx) prevents websites from being malicious GJ s.Websites such as DDos, CC, etc.They all work the same way, sending large amounts of request data to the server.
Nginx Active Defense MethodThere are two modules in Nginx that control the "number" and "speed" of accessing user connecti ...
Posted by cdjaco on Tue, 17 Mar 2020 12:28:51 -0700
1, Environment deployment
1. Build docker environment
yum -y install docker
2. Install docker compose
curl -L https://github.com/docker/compose/releases/download/1.23.2/docker-compose-`uname -s`-`uname -m` -o /usr/bin/docker-compose
chmod +x /usr/bin/docker-compose
3. Create project directory
mkdir -p /data/jms
4. Download the doc ...
Posted by efron on Tue, 17 Mar 2020 11:02:24 -0700
A server with public IP
One filed domain name (not required)
Prepare corresponding procedures
Download address: https://github.com/fate/frp/releases
## Server side
wget https://github.com/fatedier/frp/releases/download/v0.32.0/frp_0.32.0_linux_38 ...
Posted by gunabalans on Tue, 17 Mar 2020 00:42:56 -0700
Application instance of collaboration: timer expiration event response
1. Time scheduling center
2. Event handling based on cooperation process
. Its event re ...
Posted by shaunno2007 on Mon, 16 Mar 2020 22:15:30 -0700
1, Environment introduction
Operating system introduction: ubuntu 18.04
FFMPEG version: 4.4.2
Camera: USB camera, virtual machine attached camera of the machine
2, Download and compile FFMPEG and X264
X264 download address: http://www.videolan.org/developers/x264.html
FFMPEG download address: ...
Posted by itarun on Mon, 16 Mar 2020 21:57:27 -0700
Response output - > write
This is how it is defined in the source code
def write(self, chunk: Union[str, bytes, dict]) -> None:
Write chunk data to buffer
Four ways to refresh buffer
When you write a print, it is not directly displayed on t ...
Posted by chyan on Mon, 16 Mar 2020 20:31:09 -0700
Ansible's specified user and password login, secret-free login, specified ssh port, and host list Inventory configuration
It is not necessary to modify the ansible configuration in practice, or it is only necessary to modify the ansible configuration.
Add user account
1. Login accounts used by operations and maintenance personnel;
Posted by artist-ink on Sun, 15 Mar 2020 09:06:45 -0700
The iostat command reports cpu statistics and disk i/o statistics. The iostat command monitors the i/o load of the system by observing the actual working time of the storage devices and their average transmission rate.
This does not need root permission, and the data source can be obtained directly by a ...
Posted by chrislead on Sat, 14 Mar 2020 23:18:00 -0700
Redis is the largest cache middleware we use today, and it is widely used because of its powerful, efficient and convenient features.Redis released 3.0.0 in 2015, officially supporting redis clusters.This brings an end to the era of redis without clusters, which used to be Twemproxy published by twitter and codis developed by pea po ...
Posted by snarkiest on Sat, 14 Mar 2020 13:18:07 -0700
Link to the general outline of this series of articles: surface flinger series of articles of Android GUI system
Summary & description of key points in this chapter:
The mind map of this chapter is as above. This paper mainly introduces the concept of FrameBuffer, mainly focuses on the basic ...
Posted by russia5 on Fri, 13 Mar 2020 22:37:38 -0700