Css
Deliberately online search for a bit, about Div, saying a lot.
Think of div as a layout element this view I want to be the most, like "use div instead of table layout", "Actual combat css+div layout" and so on, too much, there are many people to use the definition of Dreamweaver, called Div for the layer, Use the concept of the layers in Photoshop ... A friend simply called Div and span as the auxiliary layout element.
What do you say? Although I would like to say that the div similar to thi
# vim etc/sysconfig/saslauthd check MECH = shadow check whether startup # ps aux | grep saslauthd # chklevel -- 2345 saslauthd on #/etc/init. d/saslauthd start verify sasl #/usr/sbin/testsaslauthd-u root-p '000000'-s smtp0: OK "Success. "If you select mta, there will be two sendmail and one postfix # alternatives -- config mta. if you do not select sendmail, we can use postfix to enter the preceding number, which can be vi/usr/lib/sasl2/smtpd. modify
= permit_mynetworks, permit_sasl_authenticated, reject_unauth_destination limit (very important) message_size_limit = 15728640 limit indicates that the maximum email size is 15 MB.
Configure SMTP authentication options
To improve security, we will not use the password of the system user as the password for SMTP authentication for the corresponding user, but will create a dedicated password for SMTP authentication for the user later.
# Vi/usr/lib/sasl2/smtpd. confpwcheck_method: saslauthd loca
, localhost # Set the host name or domain name for receiving emails
Mynetworks = 127.0.0.1 # sets which network mails can be forwarded
Relay_domains = $ mydestination # sets which domains can forward emails
Save the file.
Check the postfix Configuration:
[Root @ rhel5 Server] # postconf-n
[Root @ rhel5 ~] # Chkconfig postfix on
Add postfix to the root group:
# Usermod-G root postfix
SMTP authentication Configuration
Install cyrus-sasl
1. Check whether cyrus-sasl is installed.
[Root @
emotional outpouring. Emotion is the ability of humans to be independent of primates, but does the robot (AI) have that ability? is Ai's emotions generated by itself? Or the program settings? Or do you imitate yourself?When we saw the sci-fi movie "Mech", Samantha in the movie could be seen as a revolt against the creator and a role to fight for freedom. Her most terrible place is to learn to cheat, learn to forge feelings! But does Samantha really
.
Service sendmail stop
Chkconfig sendmail off
3. Install postfix to send emails
Yum-y install postfix
Vim/etc/postfix/main. cf
Myhostname = mail.sina.comMydomain = sina.comMyorigin = $ mydomainInet_interfaces = allMydestination = $ myhostname, $ mydomainMynetworks = 192.168.1.0/24,192.168 .2.0, 127.0.0.0/8Relay domains = sina.com, yahoo.com set which domains can be forwarded for mailAdd at the end of the configuration file
Smtpd_sasl_auth_enable = yesSmtpd_sasl_local_domain =''Smtpd_reci
://192.168.1.107:8080/", "The origin of the room server")Start ~/collider_root/bin/collidermain -port=8089 -tls=falseCoturn Hole-Punching server1. Download http://turnserver.open-sys.org/downloads/Find a suitable Linux system, I here is ubuntu32 bit so chose turnserver-4.2.1.2-debian-wheezy-ubuntu-mint-x86-32bits.tar.gzAfter downloading, unzip into the extract directory cat INSTALL 查看安装须知 sudo apt-get install gdebi-core sudo gdebi coturn_4.2.2.2-1_i386.deb2. Edit the conf
filesDovecot: Provide POP3 service4. Edit the SendMail configuration file/ETC/MAIL/SENDMAIL.MC, change the following two:Uncomment the two lines of "Trust--auth--mech" in 1 (remove the dnl# before this line)650) this.width=650; "title=" sendmail-1.jpg "style=" Float:none "src=" http://s3.51cto.com/wyfs02/M00/27/6B/ Wkiol1ny1u3boeecaaiq2pu5dpu589.jpg "alt=" Wkiol1ny1u3boeecaaiq2pu5dpu589.jpg "/>The addr=0.0.0.0 in the change, which is SMTP binding on
an information string in the command.
$cowsay "Linux is Fun"
We saw an interesting image:
Basically, we'll see a cow tell us what we've entered. Although there is only cow in this order, it can actually have the effect of sheep.
$cowsay-F sheep "I too Love Linux"
Effect as shown:
Just use '-l to see all the animals it can provide. Input:
$cowsay-L
The system will pop up with the following information:
Cow Files In/usr/cowsay/cows:
Apt Beavis.zen bong bud-frogs
the STOMP messaging.Section 21.4.2, ' Enable STOMP over WebSocket ' demonstrates how to configure STOMP support in Spring. Section 21.4.4, "Annotation Message Handling" and the following sections explain I-write annotated message handling m Ethods, send messages, choose message Broker options, as as and work with the special "user" destinations. Finally, section 21.4.16, "Testing annotated Controller Methods" lists three approaches to testing stomp/websocket tions. 21.1 Introduction
The WebSock
line:smtpd_sasl_auth_enable = yes server uses SMTP authenticationSmtpd_sasl_local_domain = $myhostname Specify the SMTP authenticated local domain name (hostname)Smtpd_sasl_security_options = noanonymous does not allow anonymous authenticationSmtpd_recipient_restrictions = Permit_mynetworks, permit_sasl_authenticated, reject_unauth_destination Message_size_limit = 15728640 The maximum size of the message is 15MB
2, configure the SMTP authentication related optionsIn order to improve s
Stack Basic ConceptsStack is a special kind of linear tableStacks can only operate at one end of a linear tableTop: One end of the allowed operationBottom of Stack (Bottom): One end of operation is not allowedCommon operations for StacksCreating stacksDestroying stacksEmpty stackInto the stackOut of the stackGet top of stack elementGet the size of the stackAnalysis of relationship between stack model and linked list modelSequential storage design and
Stack is a special kind of linear tableStacks can only operate at one end of a linear tableTop: One end of the allowed operationBottom of Stack (Bottom): One end of operation is not allowedStackCommon operations ofCreating stacksDestroying stacksEmpty stackInto the stackOut of the stackGet top of stack elementGet the size of the stack
The design and realization of C language description ====="accumulation of life wealth storehouse
First of allA stack is a constrained linear table, that is, he is first a linear table, a special linear tableSpecial : restrict insertion and deletion of linear tables to only one end of the tableTop: The one end of the table that allows insertions and deletions is called the top of the stack ( general dynamic changes)Bottom: The other end of the table is called the bottom of the stackempty stack : no elements in tableinto the stack : insert operatio
391. Twilight Cloud
And fade away in the distance
That desolate landscape.
A lights of light and a row of lights
Light up the day in this twilight
The people who went home sped up their footsteps
The people of the house put the tempting delicacy on tabletop
The mist rising in the soup pot is the mirror of happiness.
Shining brightly on the Earth's fireworks
Finally, the tongyun of the horizon disappears in the sky
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.