for this site. If you want to share it with multiple websites, therefore, websites that share cookies must have the same primary domain name, which is implemented by setting the domain attribute. For example, if you want to share cookies with Websites under the two second-level domain names www.jb51.net and bbs.jb51.net, you need to set domain = jb51.net
5. encrypted transmission: If a cookie has the secure attribute, the cookie will be transmitted u
Tags: SQL ODBC
Install the database to set the domain administrator as the database owner.
Click SQL Server Configuration Manager to enable TCP/IP and named pipes in the SQL Native clinet 10.0 configuration (32-bit) \ Client protocol.
The TCP/IP and named Pipes are enabled in the SQL Server network configuration \MSSQLServer protocol.
TCP/IP and named Pipes are enabled in the SQL Native cline
HKEY_CLASSES_ROOT \ Shell. Application \ CLSID \ project value
You can also delete the Trojan to prevent its harm.
Disable Guest users from using shell32.dll to prevent calling this component.
2000 run the following command: cacls C: \ WINNT \ system32 \ shell32.dll/e/d guests.
2003 run the following command: cacls C: \ WINDOWS \ system32 \ shell32.dll/e/d guests.
Note: All operations take effect only after the WEB Service is restarted.
Use cmd.exe
Disable the use of cmd.exe for guests
2000 run
1. Setting up the networkWhen setting up the network, be sure to set up a good network card, the first network card must be set to ' br0 ' (such as), set to other on the network.To modify a network configuration file, command: sudo gedit/etc/network/interfaces
Single NIC configuration file
# Interfaces (5) file used by Ifup (8) and Ifdown (8) Auto loiface lo inet loopback # Set Local loopback
Host hosts | remote machine serverTarget: Login to server from host, password-free inputHost machine:SSH-KEYGEN-T RSATwo files are generated in ~/.ssh/id_rsa.pub and Id_rsaServer machine:Id_rsa is the key, Id_rsa.pub is the public key, and the id_rsa.pub is placed in the ~/.ssh/folder of the serverHost machine:" Cat >> ~/.ssh/authorized_keys " After the password is entered successfully.You only need the SSH URL to log in directly.OpenSSH
In the previous days, I used tortoisegit and to set up a proxy server, every time after the setup, the turn off will always automatically uncheck, through constant attempts and analysis, the solution is drawn.First of all, this configuration item is stored in the. gitconfig file in the corresponding directory of the home environment variable, which means that every time git starts it reads the configurationBy default our%home% is the User/username (yo
Demand
在PHP开发中为了区分线上生产环境还是本地开发环境,如果我们能通过判断$_SERVER['RUNTIME_ENVIROMENT']为 'DEV'还是'PRO'来区分该多好,可惜的是$_SERVER数组里面根本没有RUNTIME_ENVIROMENT这个元素。
First, through the Nginx Fastcgi_param to set
In the Nginx configuration file, it can be set in the Nginx profile nginx.conf, or in a separate site configuration environment, such as: www.tomener.com.conf
Add the appropriate configuration information in the Configure Environment Server segment location:
location ~ \
Table creation is prohibited in SQL server 2000 (permission setting method ).
When I recently helped my website to manage the server, I found that D99_CMD, D99_Tmp, and D99_REG were created in an sqlserver database. I have done a lot in website security and do not know what went wrong, here we will first share the temporary solution
1. Do not create database ta
By default, MySQL only lets you log on locally, and if you want to turn on remote connections, you need to modify the/etc/mysql/my.conf file.I. Modification of/ETC/MYSQL/MY.CONFFind bind-address = 127.0.0.1 this lineChange to bind-address = 0.0.0.0Ii. granting permissions to users who need to log on remotely1. New user remote connection MySQL databaseGrant all on * * to [e-mail protected] '% ' identified by ' 123456 ' with GRANT option;Flush privileges;A computer that allows any IP address (% to
Verbose error: HTTP error 404.2-not Found. The page you requested cannot be provided because of the ISAPI and CGI Restrictions list settings on the WEB server.Presence Environment: Win7 + IIS7.0Workaround: IIS root node, right "ISAPI and CGI restrictions", set the Forbidden Dotnet version entry to allow ~Turn:Hero Yang Chenglin's blog Http://blog.sina.com.cn/wikstoneHTTP error 404.2-not Found The page you requested cannot be provided due to the "ISAPI and CGI Restrictions" list
http://www.mzwu.com/article.asp?id=3557IIS7.5 A site application pool managed pipeline mode to classic, the site page will not open, error message:Reference content HTTP Error 404.2-not FoundThe page you requested cannot be provided because of the ISAPI and CGI Restrictions list settings on the WEB server.WorkaroundOpen IIS7.5, select the root node on the left, find "ISAPI and CGI restrictions" in the features view and open, set the site application pool corresponding to the. NET Framework versi
On the Apache HTTP server, the method for setting up the virtual host is as follows
Open the conf/httpd.conf under the Apache installation directory and add the following two paragraphs
Copy Code code as follows:
ServerName fuwu.jb51.net
Serveralias fuwu.jb51.net fuwu.jb51.net
Documentroot/fuwu
Jkmount/* AJP13
– If you have a mod_jk binding, you can write the above line so that you can compl
The permissions settings for the IIS Web Server are two places, one is the permission settings for the NTFS file system itself, and the other is the site-> site-> Properties-> the home directory (or the site below directory-> Properties-> directory) panel under IIS. These two places are closely related. Here is an example of how to set permissions.
The site-> site-> Properties-> the home directory (or the following directory-> properties-> directory)
still exists. Finally clear the user from the user table: DELETE from user WHERE user= "Test-user"; Overload authorization Table: FLUSH privileges; exit MySQL database: Exit five, MySQL permissions detailed classification: Global administrative permissions: FILE : Read and write files on the MySQL server. PROCESS: Displays or kills service threads belonging to other users. RELOAD: Overloads the Access Control table, refreshes the log, and so on. SHUT
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.