First two BIND DNS servers to function correctly.Primary DNS server ip:192.168.1.100Client DNS server ip:192.168.1.1011 Primary DNS-side configuration:cd/etc/Generate Rndc.conf FileRndc-confgen > rndc.confView FilesCat rndc.conf# Start of Rndc.confKey "Rndc-key" {Algorithm HMAC-MD5;Secret "vcl5wc2ghczcu7ju+ajc1q==";};Options {Default-key "Rndc-key";Default-server 127.0.0.1;Default-port 953;};# End of Rndc.c
RNDC: Remote Control DNS Server[[email protected] ~]# vim randomThere is no random generator on the server, manually forge a file instead of the/dev/random function create a new random file and enter a string of numbers, remember to longVim RandomAsdkfjalsjdflajsldfjlasjdflajsldfjalsjdflajslfjalsjflasjfl[Email protected] ~]# Rndc-confgen >/etc/rndc.conf[[email protected] ~]#
Dc:connect Failed:connection refusedRndc:connect Failed:connection refusedWorkaround:It is not possible to use the NDC or RNDC commands directly after the default installation of BIND9.Regenerate rndc.conf FirstRndc-confgen >/etc/rndc.confWillrndc.confThe following comment sectionCopyTo/etc/rndc.keyFile (the previous # must be removed).Such as:# key "Rndc-key" {# algorithm HMAC-MD5;# secret "xbpnygocwjp8pej
DNS service/etc/rndc. keywasfound solution after the dns service is configured in RHEL6, the following problems may occur. rndc cannot find the key, and the named service runs normally. In fact, it can also be used, however, based on the principle that we cannot let go of a problem, we found a solution [root @ server... DNS service/etc/rndc. key was found solutio
DNS Service/etc/rndc. key was found solution after the dns service is configured in RHEL6, the following problems may occur. rndc cannot find the key, and the named service runs normally. In fact, it can also be used, however, based on the principle that one problem cannot be spared, the solution [root @ server named] #/etc/init. d/named statusrndc: neither/etc/rndc
rndc-Instructions for useRNDC Settings (local)Produce/etc/rndc.keyAfter executing the "rndc-confgen-a" command, the Rndc.key file is generated in the/etc directory,The resulting file contents are as follows:"Algorithm Hmac-md5" means that we use the "HMAC-MD5" algorithm to generateEach execution of "secret" produces a different "secret".Generate/etc/rndc.conf File1. After executing the instruction, the rndc
After passing the zone file through rsync. Need to direct RNDC from DNS so ... I can write a script to finish it at once. It's convenient.
There are several conditions to remotely RNDC DNS
First: In the name.conf on the server to be controlled by RNDC, you must write this:
Controls {inet 192.168.1.241 Port 953Allow {127.0.0.1;192.168.1.243} keys {"
Another autumn September, a group of crying, laughed, proud, frustrated students through the "Black June" purgatory, to the long-awaited university gate ....
A college dream driven US 10 years bided, bitter ah bitter, tired, tired, everything is for college. When I was in elementary school, I felt very remote at college. And when the high school feels close to college, there's a pair of college-hungry eyes.
Although the dream of pursuing a
This letter is from1949a (a letter from Professor Peking University to students).
Liu Ping, Liu zizhen, and other students:
You have gradually understood the significance of the University. It is not only a school for cultivating children, but also a place for training skills for future generations. It is not only an organization for instructors to teach human principles and social ideals, but also a scien
Today, with the development of computer technology, computer application technology is a hard indicator to measure the informatization technology of a country. Why can foreign computer talents reach such a high level in terms of technology? Are we really inferior to others? Is there a problem with our education system? Or why does it restrict our technical learning? Is everything worth thinking about? Now I will talk about my views from the perspective of a training institution.
In China, the
My Sina Weibo:Http://weibo.com/freshairbrucewoo.
You are welcome to exchange ideas and improve your technology together.
I finally made up my mind to write a little bit about it technology I learned during my college years. I had been thinking about IT technology life for a long time ago. Why have you always wanted to write this series of blogs? During college life, I changed too much. The biggest reason for changing myself was that I was lucky enough to read my computer Major that I was mos
From: http://kinslover.info/%E4%B8%8D%E8%83%BD%E8%86%9C%E6%8B%9C%E6%9B%B4%E5%A4%9A/
There are always many aspects of life.
A vulgar word is: reading a thousand books is a thousand miles. The goal is to broaden your horizons and thinking. Due to my unfortunate failure to reverse my thinking, it was a waste of time at the Hong Kong University in the past six months and I failed to understand the culture and values at the core of Hong Kong and its large
Today, came to a new university, is I completely feel the incredible university, the environment is too good! Here have a good learning environment, really want to keep on campus learning, but only here to stay for a year! Since it is a receiver, it is necessary to look at the relevant books, and then C + + and other related courses may only be selective learning, this estimate is not the focus of the futur
_ {x \ to 0} \ lim _ {Y \ to 0} f _ {XY} (sx, Ty) \ frac {f_x (\ Theta X, 0)} {f_x (sx, 0 )} \ =\ LiM _ {x \ to 0} \ frac {1} {x} \ lim _ {Y \ to 0} f _ {XY} (0, 0 ), \ quad \ sex {F _ {XY} \ mbox {continuous at origin }}. \ EEA \ eeex $
8 ($ 20' $) known pairs real number $ n \ geq 2 $, formula $ \ Bex \ sum _ {P \ Leq n} \ frac {\ ln p} {p} = \ ln n + O (1 ), \ EEx $ the sum is the sum of all prime numbers not greater than $ N $ p $. verification: $ \ Bex \ sum _ {P \ Leq n} \ frac {1} {p}
\ lm_n (). \ EEx $
32. set $ A and B $ to level $ M $ and level $ N $ matrices respectively. test evidence: $ A, B $ a matrix equation $ AX = XB $ only has zero solutions.
33. Test Certificate: $ N $ level matrix $ X, Y $ makes $ XY-YX = e $.
34. if $ A (t) = (a _ {IJ} (t) $ is set, each $ A _ {IJ} (t) $ is bootable. test certificate: $ \ Bex \ frac {\ RD} {\ RD t} | A (t) | = | A (t) | \ cdot \ tr \ SEZ {A ^ {-1} (t) \ cdot \ frac {\ RD a (t) }{\ rd T }}. \ EEx $
35. set $ N $ level antisy
Spoors
Time
Limit: 1 Sec
Memory Limit: MB
Description
Some of know when a snail crawls; He'll leave a spoor after him tour. Then all the you'll know that when many snail crawls, they'll leave many spoors. In this problem, you'll be given n snails ' spoors and then calculate the sum of length of their spoors. To make it harder, we assume this all the snail crawl on the same line. That was to say, when the snails ' spoor overlaps, the length of the overlap part was c
Recently, I read the new book "The Road of the university" by Wu. In this book, the author of the daughter chose the University as an "opportunity" to systematically study the European and American many world-class universities, and personally accompanied her daughter visited some well-known institutions. As always, the author will be fluent in writing, beautiful language, Oxford
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.