password of the background users of the site too simplistic, to conform to 10 to 18-bit uppercase and lowercase letters + numbers + symbol combination.4. Site management path must not be used by default admin or Guanli or manage or file name is admin.asp path to access.5. The basic security settings of the server must be done in detail, the security policy of the port, the security of the Registry, the security of the underlying system, or the server is not secure, the site is no longer safe.Ho
Mepis magic with a set of environments suitable for old computers. Antix's goal is to provide a lightweight but fully functional, flexible, free operating system for Linux novices and veterans. It should run on most computers-a PII system from MB memory but with 128 MB swap partitions to the newest high-end machine. The minimum memory configuration recommended for Antix is 128 MB RAM, while Setup requires at least 1.2 GB of hard disk space. Antix can
The tutorial to friends of the triple introduction of the use of PS mouse Painting super real old people and children photos. The figure is the author's grandmother and baby, the whole work of the difficulty is the figure of the grasp, and character color, excessive processing, which involves some perspective and a lot of details of the treatment. Mouse painting more exquisite details of the processing, just learn to have patience. Final effect
Draw an example of an old red brick wall.
1. Create a new file in fireworks with a width of 800 pixels high 310 pixels. Of course, you can define the image size yourself.
Draw a rectangle with the size of the file. Properties are: filling (gray) filling Category: (linear gradient). In point effect → miscellaneous points → add miscellaneous points. The property is (number 15) The effect of the following figure:
2. Copy (Ctrl + C) Paste (
the portrait of the old tree of Photoshop's quick synthesis creative
Final effect
1, open the tree material, and then open the character material, all selected portrait, dragged to the tree material. Portrait add mask, with a black brush smear, wipe out the edge of the face, this does not have to be too accurate, almost.
2, will be the character to color. Copy the background, move the background copy to the portrait la
Photoshop adds a beautiful sunrise effect to the old bridge
Final effect
Original
1, the original material large picture saved to the machine, and then opened with PS; Create an optional color adjustment layer, adjust the yellow, green, parameters and effects as shown below.
2, press CTRL + J to copy the current optional color adjustment layer, the effect of the following figure.
Although the original material is very old, but the character part is not how to damage, but there are some color block and noise. The repair works are relatively small in number. Only need to rub the skin of the character, and then the dark and high light part of the call out.
Original
Final effect
1, open the original material, press CTRL + J to copy a layer of background layer, layer blending mode to "soft light", the effect is as shown in Figur
The Apple MacBook product line was fully updated at the recent spring release, with a new MacBook in addition to the MacBook Air and MacBook Pro getting a processor update. So the question is, what's the best deal for a new MacBook in contrast to the old MacBook, for fruit powder with a cost-effective first?
From the price of the first look is a MacBook Pro, both the value of more than 9000 yuan. But from a portability standpoint, the MacBook'
It's mainly about rsync.On-Machine experimentand write some scripts.Here is the script for automatic backup#bak Site and logscd/var/html tar zcf/backup/www_$ (date +%f). tar.gz./wwwCd/app tar zcf/backup/logs_$ (date +%f). tar.gz./logs#bak SYS confCD/ tar zcf/backup/etc_$ (date +%f). tar.gz./scripts/bin/cp/var/spool/cron/root/backup/#rsync data to BakserverRsync-avzp/backup/rsync [Email protected]::backup/--password-file=/etc/Rsync.password#del data 7 days agoFind/backup-type f-name "*.tar.gz"-
Or is that sudo and su?When you log in with Su, add the following-Because of this, the environment variable will become the switch user'sThis can cause unnecessary trouble if you do not use environment variables.General Sudo is not allowed for remote logins, because passwords are plaintext and are very insecureBut you can use ssh-t [email protected] sudo-l this way to log inOkay, I'm done.20161129l04-09 old boy Linux OPS training-linux system user and
Sersync pressure test in the next sectionThis section focuses on the pressure test text of the previous section to do a real stress testTest out exactly what the sersync pressure limit is.From 10 to 100 per second# Tree |wc-l #查看写了多少文件# uptime #查看负载Here is the test script#!/bin/shcount=100While TrueDoFor ((i=1;iDo/BIN/CP 10k.jpg/backup/test/$i/10k_echo $ (date) $RANDOM |md5sum |cut-c 1-8.jpgDoneSleep 1For ((i=1;iDo/BIN/CP 30k.jpg/backup/test/$i/10k_echo $ (date) $RANDOM |md5sum |cut-c 1-8.jpgDon
Reference Answer:Create a normal fileTouch filenameCreate a catalog filemkdir dirnameCreate a linked fileln-s filename linknameCreate a block device fileMknod/dev/sdb B 16 8Create a character type fileMKNOD/DEV/CCC C 20 5Create a socket fileMksock A.sockCreate a pipeline fileMkfifo PipeNoteToday is the 109th Day of the day to accompany you and look forward to your progress .For questions and answers, please leave a comment in the blog comments section .Index of the topic of the previous periodht
];//Note Char Type the last character after one more atstrcpy (P, (*iter). C_STR ()); -Parr[ix] =p; - } -cout "Content of vectors:"Endl; - for(vectorstring>::iterator iter = Svec.begin (); Iter! = Svec.end (); ++iter) - { incout Endl; - } to +cout "Content of character arrays:"Endl; - for(ix =0; IX! = Svec.size (); ++ix) the { *cout Endl; $ }Panax Notoginseng - for(ix =0; IX! = Svec.size (); ++ix) the Delete[] parr[ix]; + Delete[] Parr; A the
Business scenarios, remote computer room automatically pull back up the TAR.GZ database compressed package, and only 3 days to keep the compressed package files, with Python implementation#!/usr/bin/env pythonImportRequests,time,os,datetime,platform fromThreadingImportThread#cd backup dirifPlatform.system () = ='Windows': Os.chdir ('D:\python\mysqlbackup_all')elifPlatform.system () = ='Linux': Os.chdir ('/data/mysqlbackup_all/')#Get 3 days agoNow_time =Datetime.datetime.now () yes_time= Now_time
This first occurs when you want to locate the error in the program, and if there is no problem, look at the declaration and definition of the class carefully. It is possible that the corresponding class is not added later;The second reason is that you may have forgotten to add the header file "StdAfx", if so you can add #include "stdafx" try.The third reason is that a function declared in a class may be defined without the addition of a class name. Therefore, you must add the class name when you
jquery has been adding properties since the 1.6.1 version, using these new properties whenever possible, such as: selected, checked. It is best to use prop when assigning values in a higher version, and if you use attr, the assignment is unsuccessful.General custom attributes with attr, intrinsic properties with propThe following are the official recommendations for the use of attr (), prop ():
Attribute/property
.attr()
.prop()
AccessKey
√
) # {' E ', ' m '} is exactly what I understand.Collection, very good very strong. Good bye.Hungry ... 15 years ago, when beginners to programming, often go to the computer center, in order to debug often miss food points, and put the change out. Get off the machine and run to dinner with the boss (there should be a smile on your face). After so many years still like programming, it seems to be true love.It's also possible that I didn't think of it as a means of earning a living.Dictionary:A dic
Today to explain the thing is the database connection, a day down or relatively easy, the team leader is also easy enough, the player loading interface itself is not imported, the final is not, or refueling to catch up. Look at the Shang that group of interface, finally is hehe. But after the seniors have finished reading (graduate students, but also very powerful), the final question is-what is your division of labor?The great gods are very powerful, they can distinguish the pros and cons at a
Are you still writing code in Java?Are those simple applications written?Do you know that it is possible to develop artificial intelligence with Java?Do you know how many lives you've wasted on mediocre code?Maybe you know, but you don't have a choice!"Self-written neural network" turned out! This is the only one in the domestic Java-built neural network books!Have you seen a textbook on neural networks? Dull, dull, sleepy!This time, we redefined the neural network.Let your Java program have an
var_window=newExt.Window({title:‘窗口‘,width:‘800‘,height:500,modal:true,//模态的后面的页面就不能点了frame:true,layout:‘fit‘,items:[...]});Plus modal:true, this configuration item can beExtJS pops a new window, how to make the old page non-editable
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.