How to Install OpenVPN on Ubuntu in 3 Minutes

OpenVPN is an open source commercial VPN service software, a virtual private network that can provide secure access to remote resources.

MongoDB Enable Authentication Tutorial

Enabling access control for MongoDB deployment will enforce user authentication, requiring users to identify themselves when logging in to the MongoDB system.

4 Ways to Reset The Administrator Password in Magento 2

If you want to log in to the Magento backend, "Username" and "Password" are required fields. Therefore, resetting the administrator password is very important for every website.

Summary of MySQL Synchronous Replication and Solutions

As the data storage service of the application, mysql must realize the high availability of the mysql database. The technology that must be used is database replication.

Understand The Linux Kernel Architecture

In addition to executing code on behalf of the user program, the kernel can also be activated by an asynchronous hardware interrupt and then run in the interrupt context.

Authoritative DNS Server VS Recursive DNS Server

What is the difference between an authoritative DNS server and a recursive DNS server? The Domain Name System (DNS) is the phone book of the Internet.

Linux Kernel Common Sense You Must Know

The kernel is responsible for implementing the core functions of the operating system. The kernel does not include application programs.

Linux Reports -bash: fork: Cannot Allocate Memory

There was a test machine this morning. When I checked with ps, I found that I could not execute the command and returned "-bash: fork: cannot allocate memory".

PfSense Configure Multi-WAN Load Balancing and Failover

In this tutorial, we will configure pfSense's multi-WAN settings to achieve load balancing and failover. Multi-wan settings can increase Internet bandwidth, and bandwidth can be load-balanced and failed over as needed.

Introduction to the Overall Architecture of the Linux Kernel

This article will take the core functions of the kernel as a starting point to describe the overall architecture of the Linux kernel and the main software subsystems under the architecture.

Understand the Linux kernel in one Article

The Linux kernel implements many important architectural attributes. At a higher or lower level, the kernel is divided into multiple subsystems.

How to Use Mumble to Build A Voice Server?

Thinking of building a voice server by myself, I found a voice software called Mumble. Its voice client supports all platforms. Not much to say, the next step is my build process

Study Notes for In-depth Linux Kernel Architecture

Linux supports many different file systems: Such as standard Ext2 and Ext3 file systems, ReiserFS, XFS, VFAT, etc.

Introduction to the Linux Kernel

The kernel is like a library, providing a set of system-oriented commands. System calls are just like calling ordinary functions to applications.

Nginx Reverse Proxy and Load Balancing

Speaking of nginx, we often use two important functions of nginx, reverse proxy and load balancing, today I will share with you Nginx reverse proxy and load balancing

How to Configure, Startup, Restart and Connect VNC Server?

The VNC solution is relatively easy to configure, and the VNC solution supports multiple connection methods, such as accessing the Linux desktop through a browser, eliminating the need to install a client.

Use Percona Xtrabackup to Perform MySQL Innodb Hot Backup

In this article, you will learn to use xtrabackup to perform hot backup and incremental backup of MySQL innodb tables.

What Are The Differences Between InnoDB and Myisam in MySQL?

The Innodb engine provides support for database ACID transactions and implements the four isolation levels of the SQL standard. MyISAM is the default engine of MySQL.

How to Use Table Inheritance Postgres?

PostgreSQL implements table inheritance, which is a useful tool for database designers, SQL:1999 and later versions define a type inheritance feature.

Setting Up A Iptables Stateful Firewall

Here I have to explain the state of the firewall. For example, if you use ssh to access remotely, your host will communicate with the remote host.

Total Pages: 2156 1 .... 15 16 17 18 19 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.