reduce the development workload of R D personnel. The next step is the platform selection of developers, selecting Linux can minimize the workload. With the network accelerator and Linux, anyone can DIY a super-powerful Gateway by themselves. Currently, I want to find the cheapest accelerator card and then use the cheapest PC that has been eliminated, add free Linux
1. OpenVPN relies on a virtual TUNTAP device to implement SSLVPN. Therefore, the kernel must support the TUNTAP device module. This configuration option is located in the 2.6.x kernel and is in the DeviceDrivers-Networkdevicesupport menu. It is called UniversalTUNTAPdevicedriversupport, in the standard kernel
1. OpenVPN implements ssl vpn Based on Virtual TUN/TAP devices. Therefore, the kernel must support
Linux If you delete files that cannot be deleted through the I node
ECS Linux builds enterprise-level monitoring platform based on Zabbix
ECS Linux system Yum unloading load
ECS CentOS 6.5 OpenVPN Configuration
ECS Linux uses SFTP login times error: Received unexpected
Linux View process startup time (how long does it run)Reproduced
Tags: ps -eo lstart etime
Ps-eo Lstart Start time
How long does the Ps-eo etime run?
Ps-eo Pid,lstart,etime | grep5176 use Linux PS query process start time PS Command common usage (easy to view system process) 1 PS A shows all programs under current terminals, including other user programs. 2) ps-a shows all
1, the VPS (server) on the operation as follows
The code is as follows
Copy Code
Mkdir-p/root/software/vpnCd/root/software/vpn # Download Packageswget http://www.oberhumer.com/opensource/lzo/download/lzo-2.05.tar.gzwget http://swupdate.openvpn.net/community/releases/openvpn-2.2.1.tar.gz # Decompression and InstallationTar zxvf lzo-2.05.tar.gzcd/root/software/vpn/lzo-2.05./configureMakeMake install Tar zxvf
: Www.google.comAddress:173.194.33.178Name: www.google.comAddress:173.194.33.179Name: www.google.comAddress:173.194.33.180Perfect! Now that you have a normal domain name service in your system, the next step is to configure OpenVPN.Installing and configuring OpenVPNOpenVPN is an open source VPN solution that uses SSL/TLS as a key exchange. It is also very easy to deploy in a Linux environment. Configuring Op
: 173.194.33.179Name: www.google.comAddress: 173.194.33.180Perfect! Now a normal Domain Name Service is working in your system. Next, configure OpenVPN.Install and configure OpenVPNOpenVPN is an open-source VPN solution that uses SSL/TLS as key exchange. It is also very easy to deploy in a Linux environment. It may be a little difficult to configure OpenVPN, but you do not need to make too many modificati
about a need to get specific app data out of a specific route!Unfortunately, in the previous version of Android kernel, such a simple requirement is very difficult to implement. Now the Linux 4.10 kernel has brought a new feature, that is, to configure different policy routes for different UID, which is enough to solve my problem, just about two or three years later:ADD support for Per-uid routing. It allows the administrator to configure rules such
How long has it been running for a novice on a Linux system to see a process on my Ubuntu Server (or, depending on the process ID )? The following brothers share Linux with a good way to everyone.··· You need to use the PS command to view information about a set of running processes. the PS Command provides the following two formatting options. ETime shows the time that has passed since the process started
level, both can provide secure remote access. However, IPSecVPN is designed to connect and protect data streams in a trusted network. Therefore, it is more suitable for providing communication security for different networks, because of the following technical features, SSLVPN is more suitable for the secure access of remote scattered mobile users. OpenVPN is an application-layer VPN implementation based on the OpenSSL library. For details, see http:
and P2:Ip netns exec netns1 P1P2Okay, it's all over.I always think that in Linux, the problem can be solved without modifying the source code, but I still like to modify the code. Why? Very simple, the source code is easy to obtain, and the source code is easy to modify. I write a lot of Netfilter extensions and made a lot of nf_conntrack modifications, even some damn socket filters... although these behaviors are self-entertaining and not applied at
Linux kernel updates are super-frequent, but is it necessary to upgrade at all times?Personal feeling is not necessary, but you should always focus on the new feature list, and then upgrade your kernel to a month or two from the latest version of the release instead of the latest version, to ensure stability, because a month or two enough of the eye will find enough problems, since they are not Alan Cox that Echelon Daniel, It is best not to use the l
Linux kernel updates are super-frequent, but is it necessary to upgrade at all times?Personal feeling is not necessary, but you should always focus on the new feature list, and then upgrade your kernel to a month or two from the latest version of the release instead of the latest version, to ensure stability, because a month or two enough of the eye will find enough problems, since they are not Alan Cox that Echelon Daniel, It is best not to use the l
not have to modify the source code can solve the problem, but I still like to modify the codes, why? Very simple, the source code is easy to obtain, and the source code is easy to modify, I have been obsessed with writing a lot of netfilter extension and do a lot of nf_conntrack changes, and even added some damn socket filter ... Although these behaviors are self-entertaining, and are not used in the work, but these behavior shows that I am not a network administrator, but a programmer, haha, s
openvpn, it is much easier to understand the SSH Pseudo Terminal. Such terminals use the SSH protocol to communicate with the host, SSH is an application layer protocol. Therefore, users who log on to the SSH terminal must be shielded from the information "data arrives at the application layer", which makes them feel that the data is directly driven by the device, that is to say, when users remotely connect to a
entered the safe mode3. Safe mode does not load any configuration, so you also need to connect the router via Telnet 192.168.1.1 via the first mentioned method4, Mount root partition: Mount_root5, Erase the previous configuration: Firstboot6. Set Password: passwd root7, restart: reboot-f
You can then restart the configuration, if the process through the Firstboot erase configuration encountered errors, can be openwrt in the way to brush the machine to solve.
Prepare a U disk
I use only 2MB s
, when there is new data//ready, simply exit, let the send path self-processing! if (!tcp_can_forward_retransmit (SK)) break; if (hole! = NULL) {SKB = hole; Hole = NULL; }//Only "forward send" fwd_rexmitting = 1 when tcp_can_forward_retransmit does not break; Goto BEGIN_FWD; } else if (! ( Sacked Tcpcb_lost) {if (hole = = NULL !) ( Sacked (tcpcb_sacked_retrans| tcpcb_sacked_acked))) hole = SKB; Continue } else {//Send lost dat
Today's world's popular operating systems have 3 categories,Linux,MacOS and Windows operating system,Linux operating system because of its open source, free, cross-platform, Good interface and other characteristics, by the broad masses of programmers favor!Linux operating system is widely used in the enterprise Server domain, the current network equipment on the
not have to modify the source code can solve the problem, but I still like to modify the codes, why? Very simple, the source code is easy to obtain, and the source code is easy to modify, I have been obsessed with writing a lot of netfilter extension and do a lot of nf_conntrack changes, and even added some damn socket filter ... Although these behaviors are self-entertaining, and are not used in the work, but these behavior shows that I am not a network administrator, but a programmer, haha, s
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.