H3C MSR 3016 and Cisco 5510 ipsec vpn connection preface: Book connected to the http://www.bkjia.com/net/201210/162034.html, a previous branch of a VPN (cisco5510) device is damaged, temporary find a backup VPN (H3C Msr3016 ), after the system is refreshed, set ipsec vpn. Fortunately, the CISCO5510 configuration was backed up and H3C msr 3016 was reconfigured according to the original configuration. Www.2cto.comThis is the overall network topology. Th
3 is not the maximum value we want to get, we continue to start from (2), compare (2) and (1), find (1) also not (2) substring, then look (1) is not(3) (6) The substring, found (1) is not (6) of the substring, the result of the I is 6, is not greater than the previous result 3, so the final result is 6 (these processes can be done with a recursive function)(Is it a little unclear ^_^!.... Debug This example again, OK)#include #include#includestring.h>#include#includeusing namespacestd;Const int
script_filename $document _root$fastcgi_script_name;
Include Fastcgi_params;
}
#取消FastCGI the comment for the server section location, and note the parameters of the Fastcgi_param row, instead
$document _root$fastcgi_script_name, or use an absolute path
/etc/init.d/nginx Restart #重启nginx
Copy Code
13. Testing
Copy Code
cd/usr/local/nginx/html/#进入nginx默认网站根目录
rm-rf/usr/local/nginx/html/* #删除默认测试页
VI index.php #编辑
Phpinfo ();
Chown www.www/usr/local/nginx/html/-R #设置目录所有者
chmod 700/usr/local/ngin
Title Link: http://acm.hdu.edu.cn/showproblem.php?pid=5510Ideas:First directly with KMP rash hair, timed out, and later found that if the preceding string is included in the following string, then we do not need to use the preceding string to compare, mark him off.Implementation code:#include #include#include#includeusing namespacestd;Chars[505][2050];intvis[510];intnext1[2050];intSlen,tlen;voidGet_next (Char*mat) { intj,k; Tlen=strlen (MAT); J=0; k=-1; next1[0]=-1; while(jTlen) { if(
Test instructions: Given n strings, let you find out the maximum R, so that there is a SL is not a sub-string of SR (L Analysis: KMP algorithm, but the direct violence don't think about, definitely tle, so we think about, with two pointers L, R, if SL is not a string of SR, then we can update R, continue back, until the last found.The code is as follows:#pragma COMMENT (linker, "/stack:1024000000,1024000000") #include HDU 5510 Bazinga (KMP)
Input45ABABCZABCABCDZABCD4YOULOVINYOUABOUTLOVINYOUALLABOUTLOVINYOU5DEDEFABCDABCDEABCDEF3ABACCCSample OutputCase #1:4Case #2: -1case #3:4Case #4:3Source2015ACM/ICPC Asia Shenyang Station-Replay (thanks to Tohoku University)Test instructions:, in turn, give n strings, find the subscript maximum and cannot contain the string of the preceding string (that is, all the strings are the substring of the string). #include Analysis:1. Complexity did not think of a reasonable way down, the right way is to
Topic Links:http://acm.hdu.edu.cn/showproblem.php?pid=5510Test Instructions:Given n strings, the largest string is evaluated, and there is a string in the string that is smaller than the subscript in it is not his substring.The following:First can think of kmp+n^2 violent match, but the feeling will time out, so we need to add some pruning, water problem, not to be frightened by his data range.Code:#include #include #include #include using namespace STD;intt,n,m,vis[505];intnex[505][2005];Chars[
#%d:%d\n", TM, ans+1);98 } About - intMain ()101 {102scanf"%d", t);103 for(intTM =1; TM )104 { the init ();106 Work ();107 Outit (tm);108 }109}View CodeKMP Algorithm--Http://www.cnblogs.com/mypride/p/4950245.htmlPS. Look at other people's code, some directly using the iterative method, the complexity of N^2/2, but with a feeling less reliable pruning. I figured it out, worst case time seems to explode. But the result of the operation is not much slower than mine, drunk. Maybe ther
The speed limit configuration is as follows:
Access-list rate_limit_1 Extended Permit ip any host 192.168.1.2 //(limit 192.168.1.2 download)
access-list rate_limit_1 Extended Permit IP host 192.168.1.2 any //(limit 192.168.1.2 uploads)
access-
panel and go to the Settings menu.2. Click the number key "6" to enter the "Advanced Fax Setup" Advanced faxing setup option.3. Click the number key "7" to enter the "Automatic reduction" option.4. Press the "Start" key to enter the subordinate menu, the default is "on", with the left and right arrow keys to move to "off" words, press the "Start" key to determine.HP Officejet V40, 5110, 5510, 41101. Click the "Settings" button on the Panel to enter t
./Sample.jpgStarting program:/Users/florent/Downloads/php-5.4.0beta1/sapi/cli/php run. php./Sample.jpgReading symbols for shared libraries ++ .......... done
Program received signal EXC_BAD_ACCESS, cocould not access memory.Reason: KERN_INVALID_ADDRESS at address: 0xf25afe240x0008ba9c in php_strnlen (str = 0xf25afe24 Maxlen = 234881127) at exif. c: 296296 if (str maxlen * str ){(Gdb) bt#0 0x0008ba9c in php_strnlen (str = 0xf25afe24 Bounds>, maxlen = 234881127) at exif. c: 296#1 0x0008cf04 in e
digital cameras in Linux, you can usually use the following two methods.
1. operate a digital camera under the command line
After installing the gphoto2 package, you can drive the digital camera. there are usually two commands to query the status of the digital camera, gphoto2 -- auto-detect and gphoto2-. Use the gphoto2 -- auto-detect command for model detection, while gphoto2-a is used for parameter detection:
# Gphoto2 -- auto-detectModel PortHP
the command to erase the firewall configuration is write erase instead of erase flash!When ASA5510 Flash is erase, how do you copy the new iOS to 5510? As follows:1, when the Flash is erase after the device will be unable to find the boot file and continue to restartLaunching BootLoader ...The Default configuration file contains 1 entry.Searching/for images to boot.No images in/Error 15:file not found2, enter the monitoring mode, restore the device sy
/gstudpsrc: udpsrc0:Streaming task paused, reason not-negotiated (-4)
I am confused.
You can tell me what the experts know !!!! Thank you !!
I have found a group on the Internet that has not been tested. If you have any requirements, I can test it.
1) RTP send webcam and audio
gst-launch gstrtpbin name=rtpbin latency=0 v4l2src device=/dev/video0 ! typefind ! ffmpegcolorspace ! videoscale ! video/x-raw-yuv, width=640, height=480 ! videorate ! video/x-raw-yuv, framerate=30/1 ! ffenc_mpeg4 ! rtpmp
-vlan1]igmp-snoopinggeneral-querysource-ip192.168.0.1
SwitchB Configuration:
1. Enable igmp-snooping in the System View
[SwitchB] igmp-snooping enable
2. Enable the unknown multicast discard function in the System View
[SwitchB] unknown-multicast drop enable
3. Go to vlan 1 and enable the igmp-snooping function under vlan 1.
[SwitchB]vlan1
[SwitchB-vlan1]igmp-snoopingenable
The configurations of SwitchC and SwitchD are the same as those of SwitchB.
2 H3C 5500-SI 3610
)Example Description:[Email protected] ~]# BC-VBC 1.06.95Copyright 1991-1994, 1997, 1998, $, 2004, 2006 free software Foundation, Inc.[[em AIL protected] ~]# BC as follows, enter interactive mode:You can also enter multiple calculations on one line, with commas; Separated .[Email protected] ~]# BCBC 1.06.95Copyright 1991-1994, 1997, 1998, $, 2004, 2006 free software Foundation, inc.this Free software with absolutely NO WARRANTY. For details type ' warranty '. 3+101310-
daemon.Echo-dgramEcho-stream
EkloginA service daemon that accepts rlogin session authentication and encrypts it with kerberos5.
Ekrb5-telnet
FirstbootThis service is unique to the installation process of Fedora. It only needs to execute a specific task once when it is started for the first time after installation. It can be disabled.
Functions
GatedGateway Routing Daemon. It supports various routing protocols, including RIP version 1 and 2, dcn hello protocol, OSPF Version 2, and EGP version 2
(Diskdump) are used to help debug kernel crashes. After the kernel crashes it will save a "dump" file for analysis. The network dump (netdump) function is similar to diskdump, except that it can be stored over the network. Unless you are diagnosing kernel-related problems, they should be shut down.Linux Service (Linux services):dundSee bluetooth.Linux Service (Linux services):firstbootThis service is unique to the Fedora installation process. It performs a specific task that only needs to be pe
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.