(if need to add, general reference Terrylee article can understand).
Ialarm is the alarm interface. When our system needs to add alarm mode, we only need to implement the Ialarm warn method. Email class is the realization of email alarm, SMS class is the realization of SMS alarm.
Monitorcontainer is the monitor (abstract class) equivalent to the observer. Only responsible for notification changes, when subclasses call the Notify method it will notify the alarm module alarm, such as email an
Recently I encountered a very troublesome problem and I have never found a good solution.Problem:You must obtain both the NIC utilization and the NIC connection speed.
Solution:You can use the PDH library to obtain the network adapter's transmission rate and other information.
Obtain the network adapter connection speed1. Use WMI to query2. Use the IP helper Interface3. Use the NetMonitor Interface4. Check the Registry
The trouble here is that if w
from/etc/sysctl. conf
Starting tuned: [OK]
[Root @ SICS-MIGPC-DB enterprise-storage-no-thp] #
Determine whether to use the Huge Page parameter settings.
[Root @ SICS-MIGPC-DB enterprise-storage-no-thp] # cat/sys/kernel/mm/redhat_transparent_hugepage/enabled
Always [never]
To restore the default settings, you only need to disable the tuned service.
[Root @ SICS-MIGPC-DB etc] # service -- status-all | grep tun
Current ktune sysctl settings:
Tuned (pid 32429) is running...
The ps-ef command shows
registry editing and browser monitoring functions are added. The client can now perform remote monitoring through IE or Navigate without using NetMonitor. After the server program is executed, the netspy.exe file is generated in the C: windowssystemdirectory. At the same time, the key value Cwindows systemnetspy.exe is created under the HKEY_LOCAL_MACHINEsoftware microsoftwindowsCurrentVersion Run in the registry for automatic loading and running at
, because the remoteaddress seen by the server is a vast collection of the internet, it is enough for each address, more than 60000 ports.
At first, I thought using LB would greatly limit the number of TCP connections, but the experiment showed that this was not the case. The number of requests processed by One Windows Server 600 after LB reached, does the TIME_WAIT status not work? After observing with NetMonitor and netstat, we found that after the
-3.00# ftp 127.0.0.1Connected to 127.0.0.1.220 (vsFTPd 2.0.5)Name (127.0.0.1:root):
3. Test the mail service. Run telnet 127.0.0.1 25 and telnet 127.0.0.1 110 on the console to check the running status of the email server.
4. view the ports opened by the system.Nmap is a good choice, and the output result is far more intuitive than netstat.
[root@netmonitor ~]# nmap 127.0.0.1Starting nmap 3.70 ( http://www.insecure.org/nmap/ ) at 2007-0
status.Getextrainfo (): Get additional information.Getreason (): Get the reason for connection failure.GetType (): gets the network type (generally mobile or Wi-Fi ).Gettypename (): Get the network type name (generally set to "WiFi" or "mobile ").Isavailable (): determines whether the Network is available.Isconnected (): determines whether a connection is established.Isconnectedorconnecting (): determines whether a connection is established or is in progress.Isfailover (): determines whether th
connection port is 7306. In this version of the new addition of registry editing and browser monitoring capabilities, the client can now do without netmonitor, through IE or navigate can be remote monitoring. When a server-side program is executed, a Netspy.exe file is generated in the C:windowssystem directory. At the same time, create a key value Cwindowssystemnetspy.exe under Registry Hkey_local_machinesoftwaremicrosoftwindowscurrentversion Run, w
]Description: Trojan WinCrash1.03 Open this port.
Port: 6267Services: [NULL]Description: Open this port for girls outside Muma.
Port: 6400Services: [NULL]Description: Trojan The thing open this port.
Ports: 6670, 6671Services: [NULL]Description: Trojan Deep Throat open 6670 ports. and Deep Throat 3.0 open 6671 ports.
Port: 6883Services: [NULL]Description: Trojan Deltasource Open this port.
Port: 6969Services: [NULL]Description: Trojan Gatecrasher, priority open this port.
Port: 6970Service: Real
Pcanywere scan packets often contain UDP packets with Port 22.Port: 5742Services: [NULL]Description: Trojan WinCrash1.03 Open this port.Port: 6267Services: [NULL]Description: Open this port for girls outside Muma.Port: 6400Services: [NULL]Description: Trojan The thing open this port.Ports: 6670, 6671Services: [NULL]Description: Trojan Deep Throat open 6670 ports. and Deep Throat 3.0 open 6671 ports.Port: 6883Services: [NULL]Description: Trojan Deltasource Open this port.Port: 6969Services: [NUL
Contact Us
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.