Apache: configure the virtual host and apache Virtual Host
# In httpd. conf enable Virtual hosts Include conf/extra/httpd-vhosts.conf # then configure in the httpd-vhosts.conf # match by ip #
# Configure the host file in window
VMware prompt: Host USB device connections disabled-(the USB device connection is disabled on the VMware Host)
VMware Workstation prompts host USB device connection disabled.
As shown in the figure, the VMware USB arbitration service is not enabled (go to the control panel, administrative tools, services, and find "VMware USB arbitration server" to start
1. Pre-installed site features need to be supported by the main control end after 2007-3-20 and the controlled end after 2007-3-19.
2. First on the managed server, create a directory you want to replicate, such as C:\bbs (note that you can't write a c:\bbs\ this will cause errors), then, in the host platform, product definition, virtual host, point modification, the bottom, enter the directory to copy, yo
The virtual host in the default configuration of Nginx allows the user to access through IP or through a domain name that is not set (e.g. someone maliciously points his own domain name to your IP)This is because the server area in the default configuration has this line:listen default;The following default parameter indicates that this is the default virtual host, accepting all the domain names that are po
build NFS to mount the remote host directory to the local hostPrepare 2 servers centos6.51, first on each server to install First off NFS packetsYum Install Nfs-utilsYum Install nfs*chkconfig--level NFS onService NFS Start2. Perform the following actions on 172.16.11.100 first:Mkdir/vnetooVi/etc/exports, join:/vnetoo 172.16.11.150 (Rw,sync,no_root_squash)3. Then, in 172.16.11.100 (if you are now logged in 72.16.11.100 , of course, SSH login to 172.16
Copyright Disclaimer: During reprinting, please use hyperlinks to indicate the original source and author information of the article and this statementHttp://lnote.blogbus.com/logs/10183525.html
For network services that can be started through the xinetd program, such as FTP telnet, We can modify/etc/hosts. allow and/etc/hosts. deny configuration to permit or deny access to IP addresses, hosts, and users.
For example, we addALL: 218.24.129.In this way, all customers from the 218.24.129. * doma
There may be only one IP outlet, but there are multiple projects, then you need to set up a virtual host based on the port number.
Step 1:
Check whether the httpd-vhosts.conf is enabled
Apache/CONF/httpd. conf file
# Virtual hostsInclude conf/extra/httpd-vhosts.conf
If it is not enabled, it must be in httpd. CONF file; if enabled, you can set in Apache/CONF/extra/httpd-vhosts.conf file, of course, you can also httpd. the configuration in the conf file
Apache Create virtual Directory
Open the Apache configuration file httpd.conf.
At the bottom, copy the following code in, save and restart the Apache server.
The code is as follows
Copy Code
Namevirtualhost *:80#第一个主机, Port 80ServerAdmin admin@phpnow.org#指向本地位置DocumentRoot "F:wwwrootdede"#主机名称 (Note that this is important, is your domain name, accurate input can be successful)ServerName www.111cn.netServeralias ppblog.cn#结束第一个主机配置#第二个主机, Port 80ServerAdmin admin@php
1. Set the host NicDisable VMnet1 for the VM, enable VMnet8 for the VM, set VMnet8 to automatically obtain the IP address, and automatically obtain the DNS server (or use the IP address 192.168.98.1, subnet mask 255.255.0, gateway and DNS server are not required ). Select "Local Connection", right-click "properties", and click "Internet Connection Sharing.
2. Set the guest OS NicSet the "local connection" of the guest operating system in your virtual
Multiplexing (port address Translation,pat)Refers to changing the source port of an out-of-Office packet and port translation, which is Port address translation (PAT, Port addresstranslation). The port multiplexing method is used. All hosts on the internal network can share a legitimate external IP address to enable access to the Internet, thereby maximizing the savings in IP address resources. At the same time, can hide all the hosts inside the network, effectively avoid attacks from the Inter
support information, create a tracker, create mailing-lists, create a forums, source code, documentation, tasks, and each action may has sub-actions, for example, in the "code" action, you can view subversion repository, submit code, view subversion statistics.
Homepage: http://sourceforge.net/or http://sf.net
Google Code:Google Code is well known by Google service users. google Inc. provide its own featured codes, most of which are widely used. it also provides project
Phenomenon:Online settings AllSigned and other methods are invalid. Later consideration may be related to the command line version compatibility, and then found in the registry command line configuration of a ForceV2 set items, holding a try to change the mentality, and indeed resolved!Workaround: Modify the Registry Hkey_current_user\console the value of ForceV2 to 1, restart the computer, and then open the VS-tools-NuGet Package Manager-The package management console is initialized."Original"
Label:To Restore the database on a new host:1. Ensure that the backups of the target database is accessible on the new host.2. Configure the Oracle_sid on HostB.3. Start RMAN on HostB and connect to the target database without connecting to the recovery catalog. For example, enter the following command:% Rman NocatalogRman> CONNECT TARGET/4. Set the DBID and start the database instance without mounting the
Tags: Creating an instance Error host nameThere is a phenomenon, after DB2 installation, using DB2ICRT to create an instance, the host name is not valid, prompting the following:[plain] view plain copy
[Email protected] instance]#/db2icrt-u db2inst1 db2inst1
The host name "Centos-0.msdomain" is invalid. Specify a valid
Google cannot be opened because the Host file is modified with the latest virus. You are prompted to use Baidu for search.
Gseeker message:
In the near future, some users may log on to google.cn/.comand return to China at the prompt: “google. please use a hundred-degree search engine ". This is obviously not normal because Google has not withdrawn from China. The reason why the user will see this jump page is that the system files on the user's comp
with the root account, go to its home directory, create the authorized_keys file, and set the permissions.Cd ~ /. SshCat/tmp/id_rsa.pub> authorized_keysChmod 400 authorized_keysRm-f/tmp/id_rsa.pub
4) testGo to the root account on machine A and try to log on to machine B. Check if the password is not required.Note:The authorized_keys File Permission is very important. If it is set to 777, you still need to provide a password when logging on.Remember to delete id_rsa.pub in the temporary director
1. Description of the problem
In general, there is a limit to the login IP of the database.For Web services and MySQL services on the same machine, the general limit is that only the local computer can access the MySQL service.For web and MySQL service separation, it is generally specified that only the host of the Web service can access the MySQL service. 2. Backup
Suppose 192.168.0.1 is running a Web service, 192.168.0.2 is a MySQL service. Only 1
When the underlying operating system of the ESXi host is installed on the SD card, when the host is configured in Vcenter, if the ESXi host has an error "not configuring system logging on the host XXX.XXX.XXX.XXX" or "the system log on the host is stored in non-persistent st
From the virtual host business, perhaps Hawkhost Eagle host is not considered to be the most outstanding business in our eyes, but from this black Friday activities, as well as such a cost-effective and business reputation for our general user blogs, personal sites, as well as the storage of corporate sites is more reliable. Before the old left also has released their home promotion information, see some no
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.