. set ssh rules to allow other hosts to connect to the SSH service of the terminal (the terminal is an SSH Server). the default rules here are: INPUT chain, OUTPUT chain, and FORWARD chain, which are rejected by default.
# Iptables-t filter-a input-p tcp -- dport 22-j ACCEPT
# Iptables-t filter-a output-p tcp -- sport 22-j ACCEPT
Allow this terminal to connect to the SSH service of the remote host (This terminal is an SSH client)
# Iptables-t filter-
a command link. When data needs to be transmitted, the server uses the PASV command on the command link to tell the client: "I opened Port XXXX, and you came to connect to me ". Therefore, the client sends a connection request to Port XXXX of the server and establishes a data link to transmit data.
# Allow all ftp incoming connections
Iptables-a input-p tcp -- dport 21-m state -- state ESTABLISHED-jACCEPT
Iptables-a output-p tcp -- sport 21-m state
the various products, the first color to tell us the characteristics of the group, and then the possibility of conversion between products, you can drag the left side of the slider to view, first with water bottle is associated with Sport-100, that is, after selling the kettle, The first to Buy is Sport-100, then sold out women ' s Mountain shorts, the first to buy is Long-sleeve Logo ...It is interesting
mind that the expected effect and the actual effect of a strategy can be completely different.Set Firewall PolicyScenario: You want to configure a firewall with restrictive policies for your workstation.
Tip #1: Set default rule to discard
# Set a default policy of DROP
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT DROP [0:0]
Tip #2: Set the minimum number of services required for the user to do their work to allow
This policy
-- Test Data
Declare @ tab table (ID varchar (3), Class varchar (10), sums INT)
Insert @ TabSelect '001', 'computer ', '65' Union all
Select '002 ', 'computer', '75' Union allSelect '001', 'artbe', '77 'Union all
Select '003 ', 'sport', '54' Union allSelect '004 ', 'artbe', '65' Union all
Select '005 ', 'sport', '55' Union allSelect '001', 'sport', '56'
A map data structure is defined as follows: Map
The key-value type is tuple4, which stores the TCP tuples and is defined as follows:
Struct tuple4
{
U_int32_t sourceip;
U_int32_t destip;
Unsigned short sport;
Unsigned short dport;
};
The associated value type is ctcpmanage, which is responsible for various operations on a TCP connection. Its constructor is as follows:
Ctcpmanage (tuple4 tuple4, bool bc2s );
Problems:
1. when the key value is used
Js operation xml source, as the dynamic news of the page
See the JS source code below (saved as an rss. js file ):
Copy codeThe Code is as follows: var main = document. getElementById ("content"). getElementsByTagName ("DIV ");
/*
* The current directory contains a sub-folder named xml, and the referenced source is stored in the directory.
* The colon in each row is followed by the file name and the xml source address (you can download the xml file from the source address and save it as the corr
world? You can take a rest if you are an old player or an electronic player. When the news of "making millions of dollars in gaming" came out, many young people were eager to try and want to enter the industry where they could "play. Really? Sure enough? Of course it is not that simple. In fact, e-sports and games are really not the same thing. For example, playing games is like playing badminton and fitness in the community, while e-sports are participating in the Olympic Games. As a nationa
. There is an important difference between the two methods. The equal operator performs the filter operation. However, the oftype
IenumerableProduct> Products =FromPInCTX. ProductsWherePIsShoeSelectP;IenumerableShoe> Shoes =FromPInCTX. Products. oftype Shoe> ()SelectP;
Because of this tiny difference, it is entirely a personal problem to choose which method. Suppose you have several product types, and you need to find the only shoes and shirts.
In this example, using oftype
In other case
] + = Class 2 [parent_id] = 53) [2] = = Array ([ ID] = [name] + 3 class [Parent _ID] [3] = = Array ([id] = 63 [Name] = 4 class [parent_id] + 53 ) [4] = = Array ([id] =gt ; [Name] + 5 class [parent_id] = 53))) ))
The exact array is like this.
Because this layer is not fixed, there may be children,
First, generatorThe data type that can be traversed by for is an iterative type, which can be iterated by next as an iterator. such as the listThe generator does not generate elements when it is not called. A new element is generated only by a call, such as a For loop, or next ().Examplec= (i*2 for I in range) for I in C: print (i)This is a generator.Functions can be converted to generators by yielddef sal (max): n=0 while NThis is also a generatorSecond, iteratorsYou can use nex
Description: The local test host IP is 172.16.110.11The system's input and output default policy is drop;[[email protected] ~]# iptables-p INPUT drop[[email protected] ~]# iptables-p OUTPUT DROPNote: The default rule is rejected, thus the following rules match the data of interest in the exile line (similar to whitelist)1. The Web server that restricts the local host is not allowed to access in Monday;[[email protected] ~]# iptables-a input-d 172.16.110.11-p tcp--dport 80-m time! --weekdays 1-j
the user-defined chain-D removes a rule from the chain-e renames a user-defined chain without changing the chain itself-F empty Chain, delete all rules on the chain-I inserts a rule in the chain-L lists rules on a chain, such as Iptables–l input, which lists the rules of the input chain-N Create a new chain-P defines the default policy for a chain-R replaces a rule on a chain-X Delete a user-related chain-Z zeroing all the chain bytes and packet counters for all tables2.) iptables Command param
Show
"to root path format dim stempurl stempurl = URL if Left (Stempurl, 1) = "/" Then relativepath2rootpath = Stempurl end If dim swebeditorpath Swebeditorpath = Request.ServerVariables ("Script_name") swebeditorpath = Left (Swebeditorpath, InstrRev ( Swebeditorpath, "/")-1 do while left (Stempurl, 3) = "... /" stempurl = Mid (Stempurl, 4) swebeditorpath = Left (Swebeditorpath, InStrRev ( Swebeditorpath, "/")-1 loop relativepath2rootpath = swebeditorpath "/" Stempurl nbsp; '
("hbase.table.name" = "hive_vv");
Creates a hive surface that identifies the HBase table named Hive_w to hive.
4. Use binary to store data
By default, HBase stores data as strings, and hive also supports saving data in HBase using binary mode
CREATE EXTERNAL TABLE hive_filter (key string, sport int, cout int, ctx string)STORED by ' Org.apache.hadoop.hive.hbase.HBaseStorageHandler 'With Serdeproperties ("hbase.columns.mapping" = ": key,cf2:
, and the output chain is not allowed by what packets pass.This setting is quite reasonable, of course, you can also drop three chains, but I think it is not necessary, and to write the rules will increase. But if you only want a few rules that are limited, such as just Web servers. It is recommended that all three chains are drop.Note: If you are a remote SSH login, you should drop it when you enter the first command. Because you didn't set any rules.How to do, go to the machine operation Bai!(
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.