Suppose the intranet has its own computer A (running Win7) and wants to access the intranet resources at home with another Computer B (running Win7).Prerequisites1. A on-machine access to the external network and can install virtual machines.2. With an extranet VPS server s (running Debian), you can purchase bandwagon's cheap Service (http://bandwagonhost.com/), more than 100 yuan a year. PrincipleInitiates a connection to s from a machine and maintains this connection. Based on this connection,
an encryption scheme, and then the tunnel initiator encrypts the package to ensure security (in order to enhance security, a validation process should be used to ensure that connected users have the appropriate permissions to access the target network.) Most existing VPN products support a variety of authentication methods. )
Finally, the VPN initiator encapsulates the entire cryptographic package as an IP packet. OK, now whatever protocol it was originally transmitting, it can be transmitted
users take effect[[email protected] ~]# vi/etc/profile #修改配置文件, all users are in effect http_proxy=110.199.131.137: 8005https_proxy=110.199.131.137: 8005ftp_proxy=110.199.131.137: 8005no_proxy=192.168.20 Network segment 192.168.20.0/24 do not use proxies, separate multiple addresses with commasExport Http_proxy https_proxy Ftp_proxy[Email protected] ~]#source /etc/profile[[email protected] ~]# vi/etc/resolv.conf Modify DNS, whether the item is modified does not affect the Internet proxySearch L
Set up your proxy.The Bellow proxies as follow:(1) http-proxy:proxy.xxx.com port:911(3) socks5-proxy:proxy.xxx.com port:1080 Set The Bash proxy environment value $ echo "Declare-x http_proxy=\" http://proxy-shz.glb.intel.com:911\ "declare-x https_proxy=\"/http/ Proxy-shz.glb.intel.com:911\ "Declare-x no_proxy=\" ' hostname ', localhost,127.0.0.1,127.0.1.1,.local,10.238.154.0/ 24,10.248.2.5,10.239.27.228,172.17.6.9,172.16.0.1,192.168.253.10,192.168.253.11,192.168.253.12,192.168.253.13,192.168.253
Today in the early morning to work, the agency software to carry out charges. Alas. Without resistance, find a day of the Protocol conversion tool. Although very boring, but still learned a little dongdong. At the very least, the principle of HTTP conversion to socks is known. (In fact, if you want to open socks words, to their own and network management relationship, Ah, no problem d. ^o^)
In the process o
With the introduction of a
Hair: Elf Gold
Dress: Athena Armor Yellow
Socks: Galaxy Socks
Shoes: Stars
Headdress: Lily Gem
Hand Ornaments: flower-ling Gloves
Waist ornament: Lily Waist Ornament
Match Strategy Two
Hair: Warp zheng. Blue
Dress: White Words
Coat: Suit coat
Socks: Middle Net socks
Shoe
Briefly:The MO team algorithm is an algorithm for offline (online) Maintenance of intervals, trees, or other structures based on basic algorithms such as brute force maintenance, tree arrays, chunking, minimum Manhattan distance spanning trees, and a simple, easy-to-read and short-written algorithm for blending. In many cases, this algorithm can easily cut down some complex and difficult-to-write data structure problems.Example: Bzoj2038descriptionAs a rambling person, little Z spends a lot of t
We are doing SEO optimization process, how to use good Baidu Word segmentation technology, improve keyword and user search match degree, so easy to get accurate conversion rate of high flow. For example, the author is currently doing the keyword "fashion socks", users in the search "fashion socks" and "where to find fashion socks" These two words, out of the natu
The SOCKS proxy I created following proxy Using SSH tunnel works very well on both Linux and Windows. However, when I-try to configure my iPhone and IPad with iOS, I-find iOS does not the support SOCKS proxy in its settings inte Rface. I don ' t know why it's not added while socks proxy was indeed supported by the IOS operating system. This post introduces how to
With parentheses on the URL part we want to capture, Django passes the captured text as a positional parameter to the view function. In more advanced usages, you can also use named regular expression groups to capture URLs and pass them as keyword parameters to the view.
A Python function can be invoked using keyword parameters or positional parameters, which can be used at the same time in some cases. In the keyword argument call, you specify the name of the parameter and the value passed in.
required. In SSL version 3, client-to-server authentication is only optional, but is not widely used. An SSL session contains a handshake phase in which both parties exchange certificates, generate session keys, and negotiate the encryption algorithms used for future communication. After the handshake is completed, the application can transmit data securely for B/S applications without making significant changes, in addition to calling SSL APIs rather than traditional socket APIs during data tr
the function.
sell('Socks', '$2.50', 6)
To use a keyword parameter to call it, you must specify the parameter name and value. The following statements are equivalent:
sell(item='Socks', price='$2.50', quantity=6)sell(item='Socks', quantity=6, price='$2.50')sell(price='$2.50', item='Socks', quantity=6)sell(price='$2
Lab MYPC Server7000-590010800Internet 1080015900-5900Github:22RINITD runs at lab pc1081-108017000-7000TestPCX--vnc-> lab:17000 to connect mypc OKPcx:vnc Connect lab:17000 VNC client protocalLAB:RINITD redirect 17000 to 7000 RINITD tunnellab:7000 redirect via ssh tunnel to mypc:5900 SSH tunnelmypc:5900 is VNC server VNC server protocalLab--firefox (using socks) to access internet OKLab:firefox Connect to lab:1080 s
through the proxy server.
More importantly, the Proxy Server is an important security function provided by the Internet link-level gateway. It mainly works in the Open System Interconnection (OSI) the dialog layer of the model.Proxy is so useful to us, so how can we find these servers on the novogene network? This depends on some software that specifically looks for proxy. Below is an introduction to several common software:
1. Proxy HunterThis is the old brother of the Proxy search software. s
authentication.The protocol framework described here is designed to make it easier and safer for customers using TCP and UDP to/server applications using the services provided by the network firewall. This protocol is conceptually a "mediation layer (Shim-layer)" between the application layer and the transport layer, and therefore does not provide the services provided by the network layer gateway, such as transmitting ICMP information.2. The existing agreementThere is currently a protocol
. Session layer VPN Socks4 Protocol: Socks is in the Session Layer of the OSI model. In the Socks protocol, the client program initiates a connection through the firewall through port 1080 of the Socks client to establish a VPN tunnel to the Socks Server, then the proxy application client communicates with the applicat
The premise is that you need an SSH account "Windows System" 001 ssh + bitvise tunnelier Implementation Socks Proxy
Tools that need to be used:
1, Bitvise Tunnelier
Set up:
1, SSH server ip:port, verify the way
2, generally remove on Login inside the Open Terminal
3, the default
4, the default
5, open socks/http Proxy forwarding,listen Interface According to need to fill out, if only allow their own hos
Nowadays, many people think of ftp downloading software outside China. They are forced to go abroad and can only find a proxy. I will talk about how to use a proxy on the ftp client. In general, ftp can use three proxies: http, ftp, and socks, generally, the client supports socks and ftp proxies. For example, in FlashFXP, choose Option-> Preferences from the menu, and then the Setting dialog box appears, on
-operation]
All labels must be written in a line of shelf followed by no colons
All instructions cannot be shelf written.
Instruction mnemonic case Sensitive cannot be case mixed can only be all uppercase or lowercase
; for comment
@ Code line comment with;
#整行注释或直接操作数前缀
\ is a newline character.
ENTRY for the entrance of the program
End is the ending of the program
common structure of ARM programs
1. Sub-functions and main functions
Using the BL directive, the command will store the re
successful matchFor example: Print (Re.search (' super ', ' superstition '). span ()) return (0, 5)Print (Re.search (' super ', ' insuperable '). span ()) return (2, 7)17: How do I use Python to query and replace a text string?You can use the sub () method to query and replace the sub method in the format: Sub (replacement, string[, count=0])Replacement is replaced with textString is the text that needs to be replacedCount is an optional parameter that refers to the maximum number of replacemen
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.