according to their own needs to choose;14, set up the disk, create users, please edit according to the actual situation;15, installation overview, this time more important, you can make software changes ;----Here you can increase the installation of gc++/dhcp/ftp and other software sources.16. Installing openSUSE17, automatic installation (do not control him, automatic configuration can be)18, the installation is complete.Iv. Configuring the virtual
Original: http://blog.anxpp.com/index.php/archives/1080/
(OCD patients want a clean system) the use of virtual machine to minimize the installation of Centos 7, the installation is definitely not on the net, search the next, the results are stereotyped.
Centos official website Download the latest minimal version Cetos ISO package, installation process is not too simple (optional Chinese installation process, surprised not pleased with the surprise.)
First, call the command prompt start-All Programs-Accessories-Right click on "command Prompt" to run as Administrator (1) Open "command Prompt" and enter the following command directly: Netsh WLAN set Hostednetwork Mode=allow. (2) "Command Prompt" input: netsh wlan set hostednetwork ssid= you want the wireless network name key= The password you want to set, remember that there is a space in front of the key. (3) Click "
Article title: Virtual Machine network settings. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
1. let's first contact the virtual system with the Master System.
When VMware is i
already in the same network segment as the host IP address. At the same time, according to the official instructions of VirtualBox, the control chip automatically selects the Intel PRO/1000 MT desktop. There are multiple control chips to choose from, intel PRO/1000 MT desktop is preferred when the host version is Windows Vista or later.
At this time, after the h
VLAN (Virtual LAN) technology is an important technical measure to ensure the safe and stable operation of large networks. with the active participation of many vendors and the widespread acceptance of end users, it has been widely used in actual network construction. The reason why VLAN technology is attractive is that it has enhanced its network management func
Centos6 configure vnc to log on to a remote physical machine and copy vdi to start the Virtual Machine network. centos6vdi
1. Install vnc and vncserver
# Yum install tigervnc-server
2. Start the VNC service# VncserverYou will require a password to access your tops.Password:Verify:You will be prompted to enter the password, which is required for remote logon. I tried to log on without a password. It seems th
wireless network connection. The following dialog box is displayed:Select the attribute button in the lower left corner:Set "allow" in "sharing" and select VirtualBox Host-Only Network in the home Network connection.Note that the global settings are as follows:The above function is to disable the DHCP server in the global ne
P-link method of setting up virtual AP for wireless network card
Plug the wireless card into the USB port and install the wireless network client (not the focus of this article), open the Tp-link wireless client application after the installation completes, click the Advanced tab, and select Open in Softap (virtual AP
Article title: Linux study notes virtual private network VPN experiment PPTP. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
The full name of VPN is "Virtual Private
First!
CCDISK (Remote Chi network hard disk sharing expert)
Advantage: high peak speed. 8 Mbit/S. Super cache is easy to operate.
Disadvantage: the disk loading speed is average. Poor compatibility with XP SP1.
Ccdisk1.4 (500 cracked version ):Http://down.89zz.com/ccdisk142512.16.4 (500 ..rar
Ccdisk operation video:Http://down.89zz.com/ccdiskinstall mongo.rar
Second!
WINISCSI V9.0 (1200 user Edition)
This virtual
Article title: comprehensive network settings for VMware and Qemu virtual machines. Linux is a technology channel of the IT lab in China. Includes desktop applications, Linux system management, kernel research, embedded systems, open source, and other basic classification Qemu Internet access methods:
User mode network
Three virtual machines are installed on a 2G memory desktop and run well, that is, swap is used more often. See the previous article. Now the platform is basically ready, with its own laptop as the general control, and four machines running on the lab desktop (one solid and three virtual machines), coupled with one ser
1, first in the desktop mouse right click to select a new TXT text document, and then rename it to "VPN connection. pbk";
2, then double-click this file, will pop-up prompts "phone book is empty, whether to add items?", click OK button here;
3, in the pop-up window select click on the "Workspace network, through the Internet using Virtual
Use the bridge to connect to the Internet, you need to configure the Linux system IP, the following steps:
1, in the command line mode or desktop access to terminal mode, find/etc/sysconfig/network-script/ifcfg-eth0 file;
2, using VI to open the file VI ifcfg-eth0, note that some Linux system this file may not have ifcfg prefix.
3, need to change:
Bootproto=static
#默认是dhcp, automatic acquisition, automati
In some special cases, we need a "virtual NIC" in the Windows system to achieve certain working environments, Windows 8 is created in a way that is different from other systems, and this article uses pictures to demonstrate how the "virtual network card" is created.
First of all, under the traditional desktop, the mou
Article title: using IKE to build an enterprise virtual network (I ). Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
At present, there are two main risks facing internet communication: 1. information is peeked at or illegally
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.