Nginx learn how to build a file anti-leech Service
Preface
We all know that many websites now charge fees for downloading materials. Whether it's points or gold coins, we can only say that there are very few resources for free. How do these
Amazon AWS (AmazonWebServices) Free EC2 Application
I have long heard that AWS can apply for free, but I need to bind a credit card. I recently applied for one.
It was free, or I deducted 6.28, And then I checked it online. It was used for
Amazon AWS (Amazon Web Services) Free EC2 application, awsec2
I have long heard that AWS can apply for free, but I need to bind a credit card. I recently applied for one.
It was free, or I deducted 6.28, And then I checked it online. It was used
Http://msdn.microsoft.com/zh-cn/library/ms978706.aspx
Context
Many complex software systems run on multiple processors or distributed computers. Software is distributed across multiple computers for a variety of reasons, such:
A Distributed
Physics in online games
By Glenn Fiedler
Translator: trcj
Original article: http://gafferongames.com/game-physics/networked-physics/
Introduction
Hello, everyone. Welcome to read the last article in the game physics series. I'm grenfiler.
In the
This template can set the header of an HTTP packet.
_ Example __:
: expires 24h;: expires 0;: expires -1;: expires epoch;: add_header Cache-Control private;
Command[# Add_header][# Expires]
Add header labelsSyntax: add_header name
This module allows you to use the user name and password based on the Basic HTTP authentication method to protect your site or part of its content.
_ Instance configuration __:
location / {: auth_basic "Restricted";:
Turn on rewrite logError_log/data/log/nginx/error.log notice;At the outermost, approximately the first few lines of the fileAdd one more line in http{} brackets: Rewrite_log on;The rewritten log will be written to/data/log/nginx/error.logKey
Ngx_http_gzip_module (compression module): The response message is compressed based on gzip;Official document :http://nginx.org/en/docs/http/ngx_http_gzip_module.htmlOfficial definition: The Ngx_http_gzip_module module is a filter that compresses
Match different URLs to access different backend
If you want to implement a nginx by accessing different categories of URLs to different backend implementations, first, for example, describe the requirements scenario:
The domain name is:
Understanding the Keep-alive of HTTPIn a previous article about TCP's keepalive, this article speaks of the HTTP plane keep-alive. Two kinds of keepalive in the spelling above is not the same, just the same pronunciation, so everyone is confused.
Here give an example, and detailed.
HTTP {[...][...]Proxy_cache_path/data/nginx/cache/one levels=1:2 keys_zone=one:10m max_size=10g;Proxy_cache_key "$host $request_uri";server {server_name www.centos.bz centos.bz;Root/home/www.centos.bz/web;Index
URL rewriting refers to the direction/jump to a rule by configuring the Conf file so that the URL of the site reaches a certain state, such as common pseudo static, 301 redirects, browser orientation, etc.
RewriteGrammarWritten in the server block
Fastcgi_hide_header
Syntax: Fastcgi_hide_header name
Working with fields: HTTP, server, location
By default, Nginx does not transfer the "Status" and "X-accel-..." headers from the FASTCGI server to the client, which can also hide some other
Third, using DHCP (using DHCP)
The PIX firewall supports Dynamic Host Configuration Protocol (DHCP) servers and DHCP clients. DHCP is a protocol that provides automatic configuration parameters to an Internet host. This protocol has two components:
This scenario is to limit the download speed of a single connection, the number of connections that limit a single IP, or the number of requests per unit of time, and the experimental environment nginx1.9.x. Small examples of the main, specific
Nginx implementation of IP-based access control functions: (Ngx_http_access_module)Official documents: http://nginx.org/en/docs/http/ngx_http_access_module.htmlOfficial Example:The Ngx_http_access_module module allows limiting access to certain
A few days ago, the user wrote to help achieve such a framework: only two machines, the need to implement one of the crash after another can take over the service of this machine, and two machines in normal service, both machines can be used. The
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.