bad)* Facebook (install from the market, contact sync works perfect on sapphire)* Google Voice (install from market, push your y works perfect)
What's wrong ded:* Everything that goes with eclair* 3D, video, camera, camcorder, BT, WiFi, etc are all of course working
Cyanogenmod extras:* Can be used with or without Google applications* Kernel 2.6.33.3 with tethering support, compcache, VPN/TUN, and other modules (CIFS, NFS, aufs, fuse)* New ipv2sd method implemented mostly by Chris soyars.* Buil
Because n2n is used, the TAP Nic is used. It is very easy to use in Windows. Download The openvpn installer and install only the TAP in it. However, you sometimes need to run the batch processing program under the installation directory, the system will prompt that the driver has not passed the authentication and is not compatible. Force the installation. After the installation is complete, a NIC icon will appear in the network connection. However, in
virtual networks
Packer-Create the same machine image from a single source configured for multiple platforms
Vagrant-Tools to create a complete development environment
VirtualBox-Virtualization products from Oracle Corporation
Xen-Virtual machine monitor for 32/64-bit INTEL/AMD (IA 64) and PowerPC 970 architectures
VpnVPN software
OpenVPN-Use SSL/TLS with a custom secure key exchange protocol.
PRITUNL-
development environment
VirtualBox-Virtualization products from Oracle Corporation
Xen-Virtual machine monitor for 32/64-bit INTEL/AMD (IA 64) and PowerPC 970 architectures
VpnVPN software
OpenVPN-Use SSL/TLS with a custom secure key exchange protocol.
PRITUNL-OpenVPN-based solution for easy setup
softether– Multi-protocol VPN software with advanced features
Sshuttle-The P
. The main website (link above) offers information on the commercial and cloud versions; The easiest-to-get, the open source version is from GitHub. Operating System:linux, Unix, OS x.Time Tracking (Tracking)
TimetrexTimetrex track and manage employee scheduling and attendance. Work costs and wages.You can deploy locally or use a cloud-managed version number.Operating systems: Windows,linux and OS X.Timetrex tracks and manages employee scheduling, attendance, job costing and payroll. You can d
the company server and mailbox all do a unified certification, to achieve batch management.Linux---------help developers to achieve the convenience of the test environment, can be deployed on the public network OpenVPN, easy for developers to use OpenVPN dial to the intranet to the test machine development.Linux---------assists developers in deploying Java environments and debugging various development env
Linux If you delete files that cannot be deleted through the I node
ECS Linux builds enterprise-level monitoring platform based on Zabbix
ECS Linux system Yum unloading load
ECS CentOS 6.5 OpenVPN Configuration
ECS Linux uses SFTP login times error: Received unexpected end-of-file from SFTP server
How ECS Linux increases the number of inode in the data disk
ECS Linux View directory no color
Security settings for the ECS Linux system tmp direct
VPN (Virtual private network) is an extension of a private network that sends data between a local computer and a remote computer by sharing an Internet or public network connection to simulate point-to-point private connections.
It has good confidentiality and immunity from interference, allowing both sides to be free and secure point-to-point connection.
There are two common VPN services under Linux, one is PPTP and the other is OpenVPN. The forme
automatically encapsulate the source IP address for me, such as obviously when using OpenVPN. So what do we do? In the "OpenVPN client's Source address selection problem" http://blog.csdn.net/dog250/article/details/9823205, I've solved this problem through the bridge interface, In the case of no dual NIC or multiple network card, I mean in the single card (more in line with the common situation), arbitrary
must buy or assemble a tall PC, Like 10 years ago, many people were fond of the large machines that were almost extinct today. In this post-terminal era, buy a small board can be loaded with Linux may be a good idea, it consumes less power, no noise, small, anywhere can be plugged in, long-term boot also does not matter, it is to do the best choice of home internet agent. Colleagues bought a small board like this, it is said to be very good. What do you need to do now when you want to be able t
must buy or assemble a tall PC, Like 10 years ago, many people were fond of the large machines that were almost extinct today. In this post-terminal era, buy a small board can be loaded with Linux may be a good idea, it consumes less power, no noise, small, anywhere can be plugged in, long-term boot also does not matter, it is to do the best choice of home internet agent. Colleagues bought a small board like this, it is said to be very good. What do you need to do now when you want to be able t
assemble a tall pc, just like 10 years ago when a lot of people love a mainframe that is almost extinct. In this post-terminal era. Buy a small board that can carry Linux may be a good idea, it consumes less power, no noise, small, anywhere can be plugged in, long-term boot also does not matter, it is to do the best choice of home internet agent.Colleagues bought a small board like this, it is said to be very good. What do you need to do now when you want to be able to surf the Internet through
a flash.If you want to ignore uppercase and lowercase, you can use the-I option, such as the following:A few more lines in an instant.Use option-V to filter lines that do not contain a specified string:# grep-v "A"/etc/passwd bin:x:1:1:bin:/bin:/sbin/nologinsync:x:5:0:sync:/sbin:/bin/syncshutdown:x:6:0: Shutdown:/sbin:/sbin/shutdownnobody:x:99:99:nobody:/:/sbin/nologinpolkitd:x:999:999:user for polkitd:/:/sbin/ Nologinusbmuxd:x:113:113:usbmuxd User:/:/sbin/nologinunbound:x:997:997:unbound DNS
computer. Just receive the selected connection.
Internal (internal)For internal networks. You can basically trust other computers within your network to not threaten your computer. Just accept the selected connection.
Trusted (Trust)All network connections can be accepted.
Some common commands for manipulating firewalls:
--Show firewall status
[Root@localhost zones]# Firewall-cmd--stateRunning
--List a few zone currently[Root@localhost zones]# Firewall-cmd--get-zonesBlock DMZ drop externa
intranet routeRoute add-net 10.0.0.0/8 gre1
The eight-bit network to 10.0.0.0 goes through the gre1 exit, that is, all go through the GRE tunnel.
Then, we use our own software to obtain DNS data content, which is inconvenient for posting.
After several days of dns hijacking, I saw that they had a clearer understanding of the Intranet after several days of access. Further modify the HTTP packet and add a probe. After finding out the problem, you are ready to join EXP to obtain the Intranet permi
Since a Linux server is installed in the lab, more and more things are available. Although the main job of this server is WebServer, it is a good choice to let it do more work, because the pressure on our small site is very small and the vast majority of server resources are still wasted. Since the lab has installed a Linux server, more and more things are available. Although the main job of this Server is Web Server, it is a good choice to let it do more work, because the pressure on our small
How to configure point-to-point VPN on Linux
A Traditional VPN (such as OpenVPN and PPTP) is composed of a VPN Server and one or more clients connected to this server. When any two VPN clients communicate with each other, the VPN Server needs to relay the VPN data traffic between them. The problem with such a central radiation VPN topology is that when the number of connected clients increases, the VPN Server can easily become a performance bottleneck
pressure on our small site is very small and the vast majority of Server resources are still wasted. There are many useful resources in the internal network of the laboratory, such as scientific research documents and personal experiment data. Once the lab leaves, such content is not so easy to access. The best solution to this problem is VPN. There are many methods to build a VPN Server on Ubuntu, including PPTP, L2TP/IPSec, and OpenVPN. Among the t
PS: There are two common methods to implement VPN in linux: poptop and openvpn. Here we mainly introduce poptop. If there is time, we will write it and prepare it before openvpn is installed. 1. the VPN Server has two NICs with different IP addresses. Tip: You can use netconfig to configure the NIC. If you want to configure the second Nic, enter netconfigeth12. enabling the linux route forwarding function i
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.