In the previous blog, I spoke about the use of powerDNS. Today, I want to talk about the configuration and usage of mydns. There are many mydns configurations on the Internet, but the web management of myconfig will be explained later in the editor).
Four machines in this article: Centos6.0
Lv1 and lv2 are used as the httpd frontend and keepalived for high availability. A virtual vip is provided for the client to access.
Node1 and node2 use the drbd technology to implement file image storage,
I believe that the packages engaged in linux Server O & M are the same as those of me. They are dealing with various system logs and service logs every day. These logs record the status of the system or service that occurs every day. By observing
Deduplication has been widely used in data backup. We found that for backup applications, we can delete and compress data by repeat data about 20 times, thus saving a lot of storage space. How can I retrieve duplicate data blocks? If byte-level
The communication Protocol used by the Remote Desktop service is Microsoft-defined RDP (Reliable Data Protocol) Protocol, and the TCP Communication Port Number of the RDP Protocol is 3389. For the sake of security, we often need to change its port.
Use a third-party fax server web service. The server is from WINDOWS Server, and the Remote Desktop Connection is enabled to remotely control the server:
In WINDOWS, the PROFESSIONAL version cannot enable the Remote Desktop function for others to
I. Too many programs are loaded at startupDo not load too many applications at startup, especially if your memory is smaller than 64 MB. Under normal circumstances, the system resources should not be less than 90% after Win9X is started. It is best
In Win 2000 and Win 98 systems, reinstalling Win 98 will destroy the boot records generated by Win 2000, resulting in loss of the boot menu and failure to enter Win 2000. So what method can we reinstall Win 98 in the dual system and keep the
1. Prerequisites: The Exchange frontend and backend servers must be in the same Domain, and both the frontend and backend servers must run the Exchange2000 Enterprise Edition. Use the Exchange backend server as the domain controller and Global
Lftp is a tool that supports downloading, uploading, and screen usage. It is equivalent to an ftp client that supports file access.Protocols include ftp, ftps, http, https, hftp, and fish.
1. login method:
Lftp User name: password @ IP Address
[root@
Virtualization brings unprecedented vitality to Hadoop. From the perspective of IT production management, the performance is as follows:
· Deploying a shared data center with Hadoop and other applications that consume different types of resources
Using the samba service, you can easily build an enterprise-level file sharing service, which is easier to configure than the NTFS + sharing permissions of windows. samba can directly interact with users through the kernel, higher access efficiency.-
Detailed explanation of win8 remote hyper-v Server Authentication failures
Today, companies use a domain environment for management, but sometimes some PCs or servers are separated from the domain environment based on the company's confidentiality
IIS Server is short for Internet Information Server. It is a WEB Server promoted by Microsoft. Currently, the commonly used version is IIS 6 in Windows2003 or IIS 5 earlier. Let's introduce the six new features of IIS Server 7.0 today. Let's take a
We all know that Web services are the most vulnerable to attacks on any network. Maybe you are using the most popular Web server, Microsoft's Network Information Server (IIS server ). Although the recently released IIS Server 6.0 has enhanced
Attracted by ASP dynamic web pages, I decided to use Dreamweaver to create an ASP-format school homepage. However, when I replace the Htm web page in the IIS server with the newly created ASP Web page, I find that: newly created ASP Web pages cannot
We know that script commands for backup and restoration are also provided in IIS Server 6, allowing you to back up and restore local or remote IIS configuration information in the command line state. In this way, when you work in other departments,
We know that the IIS server can be used independently as a Web server or together with compatible tools, it can be used to establish Internet business, access and operate data from different data sources, and create Web applications. These
We learned how to use TMG to protect Exchange 2010 Server with Forefront TMG. This article introduces how to detect tmg https to prevent viruses and trojans from intruding into the server in disguise.
1. Introduction to tmg https Inspection
Tmg
BKJIA you may encounter some obstacles when you need to restart a Windows server. For example, if the remote desktop service cannot work normally, how do you restart the server? This is some of the techniques I have collected over the years to
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service