First, the server planningThe following are the latest versions of Yum installed directly.Server operating system is centos6.2Puppetmaster1 10.168.32.116 puppstmaster1.jq.comPuppetmaster2 10.168.32.117 puppetmaster2.jq.comPuppet1 10.168.32.120 ag1.jq.comPuppet2 10.168.32.121 ag2.jq.comPUPPETCA1 10.168.32.118 puppetca1.jq.comPUPPETCA2 10.168.32.119 puppetca2.jq.comFacter.x86_64 1:2.3.0-1.el6Puppet.noarch 0:3
[Andorid development framework learning]-Mina development 1, andoridmina
Today, I will introduce the basic concepts and APIs of Apache MINA, including I/O services, I/O sessions, I/O filters, and I/O processors.
1. Introduction to MINA
Apache MINA is a network application framework that helps users develop high-performance and high-reliability network applications. It provides an event-driven asynchronous
What is 1.1.1 Spring?Spring is an open source lightweight Java SE (Java Standard Version)/java EE (Java Enterprise Edition) Development application framework designed to simplify enterprise application development. An application consists of a set of objects that work together. In traditional application development, a complete application consists of a set of mutually collaborative objects. So, in addition to developing business logic, the most commo
principle and the practice.
Basic Conceptual model
WebSphere Commerce is not an isolated system, it is based on a complex application on WebSphere, such as an error: The reference source was not found as shown is a basic WebSphere application concept model, which is itself made up of WEB servers, application servers, and database servers , a firewall is set up between the three layers of the system and between the WEB server and the extranet to improve the security of the system. In many case
Original works, allow reprint, please be sure to use hyperlinks in the form of the original source of the article, author information and this statement. Otherwise, the legal liability will be investigated. http://freeloda.blog.51cto.com/2033581/1285332Outline
First, preface
Second, the way the Web server provides services
Three, multi-process, multi-threading, Asynchronous Pattern comparison
Iv. WEB Service Request process
V. Linux I/O model
Six, Linux I/O model spe
public key to the client, causing the client to mistakenly assume that it is interacting with the correct server. (Attackers can intercept client requests at the proxy server level and redirect to their servers)
At this point we need an authoritative third-party agency (CA) to confirm that the public key is indeed the public key of the real server, and the server sends its own public key and some private information to Ca,ca to encrypt the data with its own private key, which is the di
] Hangzhou-mr. Bug 23:12:23But I keep writing code.[Villagers] Knitting Weaving Pig 23:12:37Where can an architect not write code.[Villagers] Knitting Weaving Pig 23:12:53Do not write code. Who should tackle the core technical issues?[Chairman] Dongguan-trade service-itnmg? 23:12:58I have been there for seven years, but I really don't pay attention to the architecture.[Mayor] Hangzhou-mr. Bug 23:13:26However, what I write is irrelevant to the business
proxy is "equivalent" to a TCP connection established with the server. Of course we have already said that this direct connection is just an illusion. The packet sending and receiving process is as follows:
[Client]-http connect a. B. c. d: port-> [proxy]-TCP SYN-> [server][Client] [CLIENT]-ssl client hello-> [proxy]-ssl client hello-> [server] # SSL handshake P
the context of the request.
ASP introduces several internal objects, such as
RequestAnd
ApplicationTo help track the context of the HTTP request. ASP.net completes the next step and bundles these objects together with several other context-related objects to form an extremely convenient internal object
Context。
Contextis an object of type System.Web.HttpContext (English). it as ASP.net
PageThe properties of the class are exposed. You can also get the object from the user control and
to the directory
Cd/data/web/
Chown-RNobody. nobody * for security, recursively change the owner and group of all files to the nobody with limited permissions.
6. webpage Logon
① User: admin
Password 123456
② Parameter settings: connect to your own database
You can also connect your own database on the command line:
Vim/data/web/data/config. php
③ Write the data to the database and restore the data
7. The experiment is successful. log on to view
Log on to the backend and modify it as neede
machine is still running.
1 S +
Think about other things ......
10 S +
I will try again later ...
The above table also applies to the performance of pages: rendering pages should at least give a response within ms to attract users. This is simply targeted at speed. From Google, Amazon, Microsoft, and thousands of other sites, the extra latency directly affects page performance: A smooth page will attract more browsing, m
information about installing and downloading software packages-or even compiling applications from source code-see section 9th of this series of articles.
Even If Webmin has been installed, its version may be earlier than the latest available version. In this case, you can use the following command to upgrade or reinstall it:
rpm -Uvh webmin-1.090-1.noarch.rpm
When a lengthy update is performed, a progress bar with the # mark is output.
1. Business Intelligence (INTELLIGENCE,BI) gain knowledge and insight through data analysis2. Analysis and reporting are two of the main business activities for data in BI systems3. The method of organizing data in BI system is called online analytical processing (Online analytical Processing,olap)4. Microsoft SQL Server Analysis Services is rich in capabilities
Friends who often use online banking will not be unfamiliar with the term "certificate", because they are often asked to verify digital certificates when logging on to online banking. In fact, this is a very effective security measure that can maximize the security of your account, and this security is implemented based on the network security protocol HTTPS.1. http data transmission process
WWW is one of the most popular network services on the netwo
= "//cdn.staticfile.org/jquery/3.2.1/jquery.min.js" >
Note:
1. The link address can generally not add the protocol header (HTTP/HTTPS), the browser will automatically identify the protocol header.
2. If you want to join the protocol header, please first determine their own website, if it is HTTPS website (SSL encryption), directly in//before adding https:, otherwise add h
data;
Secure Sockets Layer filter: sslfilter supports SSL, TLS, and starttls. You can perform SSL encryption on your own. In the following blog, I will explain how to implement SSL encryption.
Vi. Precautions
We can see that Mina only supports adding one I/O processor. If multiple processors are added, the last processor is used by default;
, the codec framework is indispensable for the channelhandler of the coding and decoding framework.
Let's take a look at the topic in detail from a few angles, first of all, to see the logical architecture diagram of Netty:
Figure 2-1 Netty logical architecture Diagram
The inbound message read from the network needs to be decoded to convert the binary datagram into Application layer protocol message or business
(not null)CREATE TABLE Student (ID INT,NAME VARCHAR (20),Gender VARCHAR (2) NOT null-- non-null)-- non-empty fields must be assigned valuesINSERT into student (Id,name) VALUES (1, ' John Doe ');-- non-null characters cannot insert nullINSERT into student (Id,name,gender) VALUES (1, ' John Doe ', NULL);
2.4 Unique function: The value of a field cannot be duplicatedAttention:
considerable understanding of OO.
Third, the attractive Java technology
First, let's talk about Java technology. It needs to be explained that, unlike the computer languages commonly heard or used in C, C + +, Visual Basic, Delphi, Java technology refers specifically to the application, not the Java language.
Anyway Java technology is the technology that helps you to experience interconnection and enjoy interconnection. Since Sun Microsystems invented Java in 1995, Java technology has been w
", eliminating the need for redundant encryption mechanisms. It is necessary to note that thesession key is not a true symmetric encryption key, but the session key is a hash algorithm to get a hash value, from this hash value to infer the symmetric encryption process required key (that is, symmetric encryption required in the plaintext cipher part), salt (called Mac secret in the RFC document) and IV vectors .In the future, each time the client transmits data, it is necessary to use the key + s
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.