Now, a lot of people are using Mac computers. In the course of use, many users found that, at any time iOS devices linked to Apple Mac computer, the computer's itunes software will automatically synchronize and backup iOS devices. Although backup is very useful, we can directly recover the Iphone/ipad data when our iphone/ipad problems occur. But some friends want to tu
these genuine software also increased the piracy crackdown, inexplicably wonderful, often prompted information appears, there are unsafe factors exist, according to the experience of long-term access to know that this is the legitimate toxic upper body. So, as you turn off automatic Updates for a variety of reasons, what should you do to make your system a little bit more secure? Please look at some of my
Nginx Log recently a large number of access Favicon.ico unable to find 404 error log, small weave feel very affected server performance, for a high concurrent server each error will affect performance, so need to turn off access to the Favicon.ico logging function.
Copy Code code as follows:
# put the following configuration into the server {} block.
Logging when #关闭favicon. ico does not existL
services that Windows must prohibit. You can disable itTCP/IP NetBIOS Helper:netbios is often used to attack under win 9X, and then writes this data to the log or triggers an alert to prevent the data from being searched by a remote computer, it must be bannedPerformance Logs Alerts: Performance Logs and Alerts collects performance data from local or remote computers based on preconfigured schedule parame
The keyboard lamp is a handy little setting to remind us that some keys on the keyboard are enabled. But for Mac novice users, how to switch the MacBook keyboard lamp is a very annoying thing. Now let's teach you a little story.
Turn on and off the Mac keyboard LEDs:
Step One: Open System Preferences and select keybo
out 10.0. 0.201 Ping statistics for: 4 1 3 (% lost),Check to see if the remote Connection service is turned onUse command: TelnetFormat: Telnet Server IP Address port numberCases:[e:\~]$ telnet 10.0. 0.20010.0. 0.200:... Connection established. (with this sentence to represent success)If the wrong thing to do is to open the service to remote connection, of course, there are Linux servers above the Ip
to open.ATD and Anacron are similar, I turn it off.Bluez-utiles legendary Bluetooth service, and then regretted that I did not, so shut up.BOOTLOGD seems to be using it to write log, and it may be better to keep him open during security.CRON specifies the time to run the program's service, so it's better to open it.Cupsys printer service, so if you have one, just turn it on.Dbus message bus system, very im
Windows family system after installation will have the default shared partitions, these default shared partitions in the convenience of local area network sharing files at the same time there are security risks, although there are protective measures, there will always be unexpected things happen on the network. If you don't use them often, it's best to turn it off, whether it's Win7, Win8 or a Win8.1 syste
Recently, I've been trying to get native MAC addresses from the NDK with C + + on Android, but with the IOCTL (SIOCGIFHWADDR), the return value is less than 0, which means that the interface information is not available. At first I thought it was my own missing access rights, so I have been increasing uses-permission, and later found that no matter how this is the case, found that the original Android studio virtual machine did not
Close the lid with an external monitor will affect the Apple notebook cooling, open, encountered at all without dual screen display users are very wasteful. If you want to not affect the heat dissipation, and only with the external monitor, completely turn off the MAC comes with the screen, you can use the following 2 methods:
Method 1, with a small magnet, I ge
First of all, the SELinux, full name security enhanced Linux.selinux is a kernel module for the process, file and other permissions set based on.Second, the traditional file permissions and account relationship and the policy rules to develop a program to read specific files1. Traditional file permissions and account relationships: Autonomous access control, DACWhen a process wants to access the file, the system will compare the permissions of the file against the owner/user group of the process
turning off unnecessary network ports can effectively protect network security, so do you know how to shut down these network ports ?
We can enter the service and close the corresponding port in the following way.
Turn off Port 7.9: Close Simple TCP/IP service and support the following TCP/IP services: Character generator, daytime, discard, Echo, and Quo
-virus software comes with a firewall, so you should turn it off .), Sit in front of the Client
6> download a client called Remote Desktop Connection, which is produced by Microsoft. It is said that office for Mac comes with it. I didn't find it. You can find it or download it on the Microsoft website for free, google
portIptables-i input-p UDP--dport 137-j ACCEPTIptables-i input-p UDP--dport 138-j ACCEPTIptables-i input-p TCP--dport 139-j ACCEPTIptables-i input-p TCP--dport 445-j ACCEPT2) Save configuration/etc/init.d/iptables Save3) Restart the firewall/etc/init.d/iptables restartSELinux settingsBy default, SELinux prohibits the network from writing to the shared directory on the Samba server, even if you allow this operation in smb.conf. Assuming you've configured the shared directory/share and allowed us
Turn Off laptop heap sleep standby using CentOS 7.0 Power Management
Make full use of computing resources, and install the old HP6325 notebook in the House into CentOS 7.0 for remote control. One problem occurs when CentOS 7.0 power management closes the notebook by default and goes to sleep for standby mode. FTP and SSH cannot be accessed unless manual or
Storage bytes [carriage return] data block specifically stored④ Delete command:delete KeyNameIv. Summary of LearningIn this article we have a preliminary understanding of what is memcached, download and install the memcached, and set it as the Windows Self-boot service, through telnet to the memcached login using commands for data read and write operations. Overall, memcached is a high-performance Key/value cache system that can accommodate the distributed cache service needs of large Web sites
The automatic update of chrome is convenient, but not all users like it. For example, users who use the Dev branch are automatically upgraded to a version that crashes after startup ... For the stability of the user, may wish to try the method described in this article, turn off the Chrome browser Automatic Updates.
Windows operating system-individual users
Open Registry Editor (start-run-regedit) and loc
saved.
To turn off the 1:30 device that will not be needed, it is most convenient to operate in Device Manager, where we can "deactivate" the mouth, serial port, floppy interface and 1394, infrared interface and so on that are not commonly used. More simply, we can not listen to the song when the sound card is also shielded-this is not too much, the notebook is configured to need CPU service AC ' 97 "soft
Problem Description: A program developed on a Linux server that interrupts the execution of a remote connection, but the running program shuts down automatically as a child of the terminal window. I want the program to run in the background of the terminal, and the program can still run after the terminal is closed.
(1) To enable the program in the background to run the method
Typically, we add to the command (such as the following statement execut
Linux users often use the SCP and SFTP commands when they are transmitting remote files. But these two commands also have some risks for our computers, so we can turn them off when we don't need to transfer files remotely. So how do you ban the SCP and SFTP? Here is the concrete method.
SFTP Introduction
SFTP is a secure File Transfer protocol abbreviation for
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.