Iptables and network segment port forwarding Environment Description: You need to submit all packets accessing port 80 of the 192.168.1.20 host to 192.168.1.31 host for processing. Therefore, you need to perform the following operations on the host 192.168.1.20: 1. enable the routing forwarding function 1 echo "1">/proc/sys/net/ipv4/ip_forward2. add iptables Rule 1 iptables-t nat-I PREROUTING-p tcp -- dport 80-j DNAT -- to-destination 192.168.1.31: 802 iptables-t nat-I POSTROUTING-p tcp-d 192.16
Js Regular Expression Knowledge Summary
Regular Expressions:1. What is RegExp? RegExp is the abbreviation for regular expressions. The RegExp object is used to specify what is retrieved in the text.2, define Regexp:var + variable name =new RegExp ();3. The RegExp object has 3 methods:1) test () retrieves the specified value in the string, and the return value is true or false.var p1=new Reg ("E");d Ocument.write (Reg.test ("Welcome to china!"));2) EXEC ()var p1=new Reg ("E");d Ocument.w
character in the First Matching group in str. If no matching is found, the function returns a NULL pointer. For example:
char string[20]="Hello there";char *check;check=strpbrk(string , "aeiou");
Check points to the string + 1 position, because this position is the first occurrence of the character in the second parameter. It is also case sensitive like the previous one.7. Character classification functions
The following function returns true if the parameter meets the conditions (including in
Python supports normal assignment, chained assignment, incremental assignment, but does not support expression assignment.Normal Assignment: x =1Increment assignment: x = 1; x + = 1Chain Assignment---Assign values to several variables at the same time, as in the example below
>>> x = 1>>> x = y = x + 1>>> x, y(2, 2)
In other languages, such as C, expressions are supported, meaning that the expression has a retur
Regular Expressions:1. What is RegExp? RegExp is the abbreviation for regular expressions. The RegExp object is used to specify what is retrieved in the text.2, define Regexp:var + variable name =new RegExp ();3. The RegExp object has 3 methods:1) test () retrieves the specified value in the string, and the return value is true or false.var p1=new Reg ("E");document.write (Reg.test ("Welcome to china!"));2) EXEC ()var p1=new Reg ("E");document.write (Reg.exec ("Welcome to china!"));3) Compile ()
version upgrade. The following command uploads the version file from the TFTP server to FLASH: zte (cfg-tffs) # tftp 192.168.1.102 download kernel. z5. restart the vswitch. Check the running version and confirm whether the upgrade is successful. 6.2 version upgrade when the system is abnormal The following describes the specific steps for upgrading the version when the switch fails to start running normally. 1. Use a random configuration line to conn
The *.su grid derived from pointwise does not have the relevant configuration of the FfD box, but to optimize it, it must first be parameterized. The following steps can be implemented to initialize the FfD box:1. Configuration files such as Rae2822.cfgThe input and output grids should be explained%-------------------------input/output Information--------------------------%%% Mesh INPUT filemesh_filename = rae2822.su2percent Mesh input file format (SU2, CGNS, netcdf_ascii) mesh_format= SU2 perce
RHEL7 currently supports architecture:1,64-bit AMD2,64-bit Intel3,IBM POWER4,IBM System Z5, no longer supports x86 32bitInstallation Interface:1, New Installation interface2, one-stop configuration3, the new kickstart structure4, the new partitioning tool5, support 2TB or more HDD as System boot disk6. Large changes in installation configuration stepsTo start the boot tool:1, the new GRUB2 boot tool2, support for CPU architecture including PowerPC3, s
been disabled for security reasons ...650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M01/54/07/wKioL1R16lywzjMYAAEiLx1z_mI055.jpg "title=" Zw9.png "style=" Float:none; "alt=" wkiol1r16lywzjmyaaeilx1z_mi055.jpg "/>Edit the php.ini file and find the Disable_functions line to remove the Scandir function./ETC/INIT.D/PHP-FPM restart Restart the php-fpm.22, Zabbix Client installation, here with the RPM convenient installation, if there is a source of equipment, many very troublesome#rpm-IVH h
variable . A $ X7 L * n,] 9 D2 O7 E: T5 Z Set displays all current environment variables0 r % QC9 G-H3 z5 n I love Computer Technology Forum Set P (or other characters) displays all environment variables starting with P (or other characters). I love the Computer Technology Forum 9 o * Q1 ?, E: K "V * E7 oPause pause the batch processing program and display: press any key to continue .... (V: y9 O3 [5 I (U9 k'n $ E If you execute conditional processin
is shown. After 8-round iterative operation, the w81,w82,w83,w84 and z48,z49,z50,z51 operations are y1,y2,y3 and Y4 respectively. The method is as follows:Figure 2-3-3 Output transformation after 8-wheel iterative transformation2. Idea Key generation processAs can be seen in Figure 2-3-3, there are 52 sub-key blocks involved in the encryption process, each block is 16 bits long. These 52 key blocks are generated by a 128-bit key, and we record these 52 key blocks as z0,z1......,z51. The initial
.
Represents any one of the characters in a string
[Character Set]
Match any one of the characters in the character set
[^ Character Set]
Match any one of the characters in the character set
s1| s2| S3
Match any one of the characters in the S1,S2,S3
*
Represents more than one character before the symbol, and also includes 0 and 1
+
Represents more than one character before thi
delete session6 K when the browser is closed; G "_ 7 H #} 0X7 h1 sStrictly speaking, this cannot be done. One way to do this is to use the javascript code window. oncolose on all client pages to monitor the closing action of the browser, and then send a request to the server to delete the session. However, there is no way to break down the browser or forcibly kill the process.-I 'o, f! J; i5 v) A: n0 M-_ '{, c; t T % c (P4 ^4. What is an HttpSessionListener? 2 @ 2 v + V-Q % Q/mYou can create l
'Ello world' from the string 'Hello world '? ______.A. select substr ('Hello world', 1) from dual;B. select substr (trim ('Hello world', 1,1) from dual;C. select lower (substr ('Hello world', 1) from dual;D. select lower (trim ('H' from 'Hello World') from dual;
9) which are DML statements (choose all that apply )______.A. commit B. merge C. update D. delete E. creat F. drop
10) in the Select statement, the character used to connect strings is ______.
DA. "+" B. "" C. "|" D. "|"
Q: What is a cl
checks the data and uses a callback to tell you what data has been found.2 z5 F + q (K! Z7 W5} "] 2 v2 K. S * s # Y" C2 {% G F7 N:] 7 \ 1 | 9 D9 B6 |-} OI .2 exec callback
Copy content to clipboard
Code:
typedef int (*sqlite3_callback)(void*,int,char**, char**);
Your callback function must be defined as the type of the above function. The following is a simple example:5 E9 d $ K3 C "U (A9 U l5 d: S * \ 3 G7 R; j9 i8 O5 Q// Sqlite3 callback functio
content to clipboard
Code:
int sqlite3_get_table(sqlite3*, const char *sql, char ***resultp, int *nrow, int *ncolumn, char **errmsg );
The 1st parameters are no longer mentioned. refer to the previous example. ?. X [9 x, t % R5 o, J
* V * r )? : Y6 L R4 H 2nd parameters are SQL statements, which are the same as SQL statements in sqlite3_exec. Is a common char * string ending with \ 0 .) W D % I M $ ^ 0 n-S $ d# R. z5 \ # E' @/U9 IThe first paramet
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.