The speed limit configuration is as follows:
Access-list rate_limit_1 Extended Permit ip any host 192.168.1.2 //(limit 192.168.1.2 download)
access-list rate_limit_1 Extended Permit IP host 192.168.1.2 any //(limit 192.168.1.2 uploads)
access-
H3C MSR 3016 and Cisco 5510 ipsec vpn connection preface: Book connected to the http://www.bkjia.com/net/201210/162034.html, a previous branch of a VPN (cisco5510) device is damaged, temporary find a backup VPN (H3C Msr3016 ), after the system is refreshed, set ipsec vpn. Fortunately, the CISCO5510 configuration was backed up and H3C msr 3016 was reconfigured according to the original configuration. Www.2cto.comThis is the overall network topology. Th
3 is not the maximum value we want to get, we continue to start from (2), compare (2) and (1), find (1) also not (2) substring, then look (1) is not(3) (6) The substring, found (1) is not (6) of the substring, the result of the I is 6, is not greater than the previous result 3, so the final result is 6 (these processes can be done with a recursive function)(Is it a little unclear ^_^!.... Debug This example again, OK)#include #include#includestring.h>#include#includeusing namespacestd;Const int
script_filename $document _root$fastcgi_script_name;
Include Fastcgi_params;
}
#取消FastCGI the comment for the server section location, and note the parameters of the Fastcgi_param row, instead
$document _root$fastcgi_script_name, or use an absolute path
/etc/init.d/nginx Restart #重启nginx
Copy Code
13. Testing
Copy Code
cd/usr/local/nginx/html/#进入nginx默认网站根目录
rm-rf/usr/local/nginx/html/* #删除默认测试页
VI index.php #编辑
Phpinfo ();
Chown www.www/usr/local/nginx/html/-R #设置目录所有者
chmod 700/usr/local/ngin
Title Link: http://acm.hdu.edu.cn/showproblem.php?pid=5510Ideas:First directly with KMP rash hair, timed out, and later found that if the preceding string is included in the following string, then we do not need to use the preceding string to compare, mark him off.Implementation code:#include #include#include#includeusing namespacestd;Chars[505][2050];intvis[510];intnext1[2050];intSlen,tlen;voidGet_next (Char*mat) { intj,k; Tlen=strlen (MAT); J=0; k=-1; next1[0]=-1; while(jTlen) { if(
Test instructions: Given n strings, let you find out the maximum R, so that there is a SL is not a sub-string of SR (L Analysis: KMP algorithm, but the direct violence don't think about, definitely tle, so we think about, with two pointers L, R, if SL is not a string of SR, then we can update R, continue back, until the last found.The code is as follows:#pragma COMMENT (linker, "/stack:1024000000,1024000000") #include HDU 5510 Bazinga (KMP)
Input45ABABCZABCABCDZABCD4YOULOVINYOUABOUTLOVINYOUALLABOUTLOVINYOU5DEDEFABCDABCDEABCDEF3ABACCCSample OutputCase #1:4Case #2: -1case #3:4Case #4:3Source2015ACM/ICPC Asia Shenyang Station-Replay (thanks to Tohoku University)Test instructions:, in turn, give n strings, find the subscript maximum and cannot contain the string of the preceding string (that is, all the strings are the substring of the string). #include Analysis:1. Complexity did not think of a reasonable way down, the right way is to
Topic Links:http://acm.hdu.edu.cn/showproblem.php?pid=5510Test Instructions:Given n strings, the largest string is evaluated, and there is a string in the string that is smaller than the subscript in it is not his substring.The following:First can think of kmp+n^2 violent match, but the feeling will time out, so we need to add some pruning, water problem, not to be frightened by his data range.Code:#include #include #include #include using namespace STD;intt,n,m,vis[505];intnex[505][2005];Chars[
#%d:%d\n", TM, ans+1);98 } About - intMain ()101 {102scanf"%d", t);103 for(intTM =1; TM )104 { the init ();106 Work ();107 Outit (tm);108 }109}View CodeKMP Algorithm--Http://www.cnblogs.com/mypride/p/4950245.htmlPS. Look at other people's code, some directly using the iterative method, the complexity of N^2/2, but with a feeling less reliable pruning. I figured it out, worst case time seems to explode. But the result of the operation is not much slower than mine, drunk. Maybe ther
accessed through the extranet IP.To turn on NAT:Global (outside) 1 interfaceNat (inside) 1 192.168.3.0 255.255.255.0Do port mapping:static (inside,outside) TCP interface 192.168.3.222 3389 netmask 255.255.255.255To do access control for an external network port:Access-list outside_access Extended permit IP any anyAccess-group Outside_access in Interface OutsideThe above directive realizes, the external network user accesses the internal terminal through the public network IP, but the intranet u
Cisco ASA Advanced Configuration first, to prevent IP Shard Attack 1 , Ip the principle of sharding; 2 , Ip security issues with sharding; 3 , Prevention Ip Shards. these three questions have been described in detail before and are not introduced here. For more information, please check the previous article:IP sharding principle and analysis. Second, URL Filter Use ASA Firewall IOS the characteristics URL
One of the most important features for a firewall product is logging events. This blog will show you how to log management and analysis of the ASA, the principle and configuration of ASA transparent mode, and implement URL filtering using the iOS features of the ASA firewall.First, URL filteringWith the feature URL filtering of the
ASA-防火墙-cisco
The role of the ASA firewall1, in the network to isolate dangerous traffic, no point.The principle of the ASA firewall1. Distinguish different areas by security level: internal area, external area, demilitarized zone.By default: High-level traffic can go to lower levels,Low-level traffic can not go to high-level,The same level of unb
For many years, Cisco PIX has been a firewall established by Cisco. In May 2005, however, Cisco launched a new product, the Asa,adaptive security appliance, as an adaptive safety product. However, PIX is still available. I've heard a lot of people asking about the difference between the two product lines on a number of occasions. Let's take a look.
What is Cisco pix?
CISCO Pix is a dedicated hardware firewall. All versions of Cisco PIX have a 500-seri
For many years, Cisco PIX has been a firewall established by Cisco. In May 2005, however, Cisco launched a new product, the Asa,adaptive security appliance, as an adaptive safety product. However, PIX is still available. I've heard a lot of people asking about the difference between the two product lines on a number of occasions. Let's take a look.
What is Cisco pix?
CISCO Pix is a dedicated hardware firewall. All versions of Cisco PIX have a 500-se
1. The targets of ASE and ASA are different.The Sybase Database Engine has three products:The ASA lightweight database server is suitable for mobile computing (PDA, mobile phones with operating systems, etc.), Embedded Computing (POS machines, routers, etc.), and working group-level OLTP environments, especially for mobile computing and Embedded ComputingASE enterprise and database server, suitable for ente
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.