DNS is used whenever you use the Internet. Every time you send an email or surf the web, you have to rely on DNS. DNS is responsible for mapping between host names and Internet addresses, which is handled by the computer, and latency occurs if the process of connecting to a DNS server is delayed or if the DNS server resolves an address for an excessive length of time. And if you can speed up domain resolution in some way, you can speed up surfing the internet, here is an acceleration method: use
DNS is used whenever you use the Internet. Every time you send an email or surf the internet, you must rely on DNS. DNS is responsible for the ing between host names and interconnected network addresses, which is handled by computers. If the connection to the DNS server is delayed, or if the DNS server resolves an address too long, the access will be delayed. If domain name resolution can be accelerated in some way, the speed of surfing the Internet can be accelerated. The following describes a
Some friends may already know the opendns service, but I did know it through a foreigner's blog today. This website provides free DNS resolution, which is faster, safer, and smarter than the average ISP:
FasterThe two features ensure that opendns is faster. First, it has a large and intelligent cache, which ensures that users can make profits from the huge opendns
DNS is used whenever you use the Internet. Every time you send an email or surf the web, you have to rely on DNS. DNS is responsible for mapping between host names and Internet addresses, which is handled by the computer, and latency occurs if the process of connecting to a DNS server is delayed or if the DNS server resolves an address for an excessive length of time. And if you can speed up domain resolution in some way, you can speed up surfing the internet, here is an acceleration method: use
anyone who wants to learn. Today, we can all connect to the Internet.
But you must remember that when you connect to the Internet, your computer becomes the target of an attack. Become the target of viruses, Trojans, and other programs.
For this reason, it is recommended that anti-virus and anti-spyware be used to protect computers connected to the Internet. In some cases, even using these software cannot completely guarantee your security. It is always a good idea to add another security layer
Use the hosts file on the local machine to solve the problem of slow opendns
Because the Gae part of GFW can be solved temporarily by using opendns, but sometimes it is intolerable to use opendns to resolve the slow speed of domestic websites. However, in order to access x.appspot.com, you have to set the DNS server to the o
3. Go online to investigate the current popular source program version management software and project management software, what are the pros and cons?(1) Advantages and disadvantages of Microsoft TFS:Advantages: It is the support of agile, Msf,cmmi and other projects, process management, process improvement. On the task page, you can take a glance at the requirements and project progress, which is more useful for small teams than Gantt charts.Cons: T
1. Introduction to tcprstat
Tcprstat is a tool developed by percona to investigate mysql response time. It can also be used to investigate typical request-response services. The time consumed by gameserver of yujian was recorded using this tool some time ago.
Details:
Http://www.percona.com/docs/wiki/tcprstat:start
Download:
Binary:
Http://github.com/downloads/Lowercases/tcprstat/tcprstat-static.v0.3.1.x86
MySQL optimizationPersonal originality, permission to reprint, please indicate the source, the author, otherwise investigate legal responsibility.Number of MySQL connectionsQPS number of queries per secondPV Page viewPeak Qps= Peak PV number * PV to connect to the database% of total PV * Average number of requests per PV185 * 10% * 20 = 3701 thread reuse number of threadsShow variables like "%thread%";Thread_cache_size the maximum number of connection
Investigate how CVE-2015-5477 CloudFlare Virtual DNS protects its users
Last week, ISC released a patch to fix a remote vulnerability in the BIND9 DNS server. This vulnerability causes the server to crash when processing a certain data packet.The announcement indicates that an error occurs when the server processes a TKEY-type query. This error causes assertion fail, which causes the server to crash. Because assertion occurs in the query parsing proc
set up the phone, it is necessary to set the phone to the USB debugging state. As the test result:In this installation, configuration process, encountered a lot of problems, but through the query for reference to some other methods, has been resolved, but also experienced the installation, test success after the happiness. This article is the personal installation process encountered some of the problems of the collection, I hope to be able to meet similar problems of students some help. Experi
to the place, then you might as well not pretend. 5 above only represents my personal opinion, perhaps you will encounter other problems in the installation, then I can only say, haha haha, I did not meet. Above.(P.S: Because of the limitations of personal ability, and the use of better experience without in-depth development, and the inability to produce a different environment for different tools to review, of course, I will look at the experience of the installation of Android students)
The experimental steps are organized:Conn Scott/tigerdrop table t;CREATE TABLE T as select * from dept;View a few undo table spacesSelect Tablespace_name,contents,extent_management from Dba_tablespaces;Set time onShow parameter undo confirms the currently used undo tablespace, deleting the unused undo tablespace and preventing confusionConn Scott/tigerDelete from T;CommitAlter system checkpoint;alter system flush Buffer_cache;SELECT * from t as of timestamp to_timestamp (' 2016-12-08 17:04:05 ',
Thoroughly investigate the problem of intermittent machine interruption in some network segments
Two servers need to be installed two days ago. As a result, the network that has been faulty in the early stage has come up again. It is clear that the vlan can be pinged, but it is different from that outside the vlan. This phenomenon is like an arp virus, so we conducted a thorough investigation over the weekend, and we must find out the root cause of t
array elements that you want to modify:Modifier Speed:$inc does not need to change the document size, so it is very fast. The array modifier may change the document size, which is slower.$set speed is faster when the document size does not change, otherwise performance will decrease. MongoDB has reserved some padding for the document to accommodate the size change, but if it goes beyond the original space, a new space is allocated. if $push become a bottleneck, you can separate the inline array
Pay attention to mobile phone number Security: Reporters investigate that new numbers are not "new" Harassment is followed
As mobile Internet is used more and more frequently, in the virtual world, we need to provide mobile phone numbers when enjoying services. Sometimes, we need to use mobile phone numbers to prove our identity. For example, mobile phone numbers often act as ID cards in the online world. However, have you considered the security of
=(HttpServletResponse) servletresponse; Map Map=Request.getparametermap (); String v= Request.getparameter ("Content"); //continue execution of the next filter, no next filter executes the requestChain.dofilter (request, response); }}For the above filter to take effect, you need to add the following configuration in Web. XML, note the filter invocation order and the sequential migration of the write in Web. xml Filter> Filter-name>MyfilterFilter-name> Filter-class>Org.jiagoushi.
SpringMVC cannot obtain the request parameters to investigate and solve the problem (2). springmvc Parameters
Because once the Request getInputSteam () is obtained, it will no longer be available.
In actual projects, the following problems occur:
1. When multiple interceptors and filters need to retrieve data from InputStream, they cannot be processed;
2. InputStream is intercepted and the Filter is taken away. The Controller layer cannot getParameter
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.