II. Installation
Mkdir/dataCd/datagit clone https://github.com/mengskysama/shadowsocks.git Backendgit clone https://github.com/orvice/ss-panel.git FrontIII. Configuration
Front
# 1. Create a database and set up a local user shadowsocks@localhost, and give permissionsCREATE DATABASE IF not EXISTS shadowsocks DEFAULT CHARSET UTF8 COLLATE utf8_general_ci;GRANT all privileges in
Ubuntu is based on the Global Proxy of shadowsocks, shadowsockspac
1. Start the shadowsocks-qt5 and connect to it.
First, make sure that you have connected to shadowsocks. Install shadowsocks-qt5 ?. Such .?2. Configure the Global Proxy for PAC 1. Install GenPAC
GenPAC is a Proxy Auto-config file generation tool based
We all know that Shadowsocks only provides SOCKS5 proxies, not HTTP proxies, and many software offers only HTTP proxy support, such as the need to use shell command line to help the wall, or use Git to sync the source code of Android, or update the Android SDK, what do we do?
Old Gao here introduces a software privoxy, it can act as agent for us to solve the above problems!
Privoxy is a non-caching Web proxy with advanced filtering capabilities for
In view of the poor bandwidth of Hong Kong host, Linode also chose not to Tokyo Room, tried the conoha of the Tokyo engine room, in addition to start registering some problems, but also relatively satisfactory, mainly bandwidth in out are Mbps, loaded with tax speed, speed that is called a cool. However, due to the installation of the system is CentOS 7.1, there are some small problems, but eventually resolved! The complete installation process is documented here as a memo.
First, download the
Configure the Shadowsocks5 proxy server on Centos7
Shadowsocks is a lightweight SOCK5 proxy software, while Shadowsocks-libev is a proxy software based on Shadowsocks. It consists of three parts:
Ss-server: deployed on a remote server
How to Set up ss (single-user and multi-user) on a VPS server )?, Vpsss
My environment is CentOS6. The commands of the CentOS7 firewall are different from those of CentOS6.
Install shadowsocks
yum updatewget --no-check-certificate https://raw.githubusercontent.com/teddysun/shadowsocks_install/master/shadowsocks.shchmod +x shadowsocks.sh./shadowsocks.sh 2>1 | tee shadowsocks.log
Configure the password, port,
I. Preparation 1. first, buy a foreign server. if you only want to experience the download force process, we recommend a $3.99 centos6 server at the URL budgetvm.com. 2. get the corresponding configuration, connect to the server through securecrt, then you can start to install B 2. focus on start 1. shadowsocks
The method is very simple, thanks to the N16 group of good friends provided by the Tutorial!
1, first do some necessary preparation!
#!/bin/sh
Yum install-y gcc automake autoconf libtool make build-essential autoconf libtool Curl curl-devel zlib-devel Openssl-deve L perl perl-devel cpio Expat-devel Gettext-devel Unzip
2. Download installation package
Wget–no-check-certificate Https://github.com/madeye/shadowsocks-libev/archive/master.zip-O
Build a vpn code server in CentOS
I. Preparation
1. First, you must buy a foreign server. If you only want to experience the Download force process, we recommend a $3.99 centos6 server. Purchase URL: budgetvm.com.2. Get the corresponding configuration and connect to the server through securecrt. Then you can start t
I gave you the CentOS configuration shadowsocks service end of the wall, today found that if it is a foreign server, the use of shadowsocks to carry over the wall, the speed is a bit unacceptable, here we can use net speeder to accelerate, If your VPS limit traffic and loan, I suggest you still do not use net speeder to accelerate, otherwise your VPS will be seal
Label:How to deploy Rstudio server on a Linux server, configure ODBC after you remotely access SQL Server through the RODBC package background: before writing an article that mentions the recent deployment of Rstudio server (building the analytics environment for the data Analysis Team), it took one weeks to set it up.
Domestic Professional Server rental hosting Chess Server game Server video server open area Hang -up serverWonderful solution! Ignore the attack!High-protection Special: website, game, chess best choiceHengyang Telecom (30G single-defense) 8h/8g/1t/exclusive 20M-800 yuanHengyang Double Line (30G single defense) 8h/8g/1
PHP is a scripting language that requires the PHP interpreter to parse and run PHP files. When PHP is used as a CGI service Web request, it needs to be embedded in some kind of Web server, most commonly integrated into Apache or IIS, that is, before using PHP, you need to install Apache or IIS, and correctly configure them and PHP integrated parameters. Although this configuration is already very prescriptive and the documentation is very rich, we oft
Platform Description: Two SQL SERVER2005 servers with two identical databases installed on top of each otherRecently, because of the project needs, you need to copy the database on one of the servers on a database on another server, after a lot of Google has finally finished, here to do a detailed record, hoping to help everyone and themselves.One, the first step: SQL Add serverFirst, we need to connect to another
Many corporate LANs now have their own file servers for storing or sharing files for use by local area network users. However, in the process of setting up shared file access, it is common for shared files to be randomly copied, modified, or even deleted, which makes the security management of shared files face a greater risk. How can you make it possible for users to access shared files and prevent improper operation of shared files? I think that can be achieved through the following two ways:
The difference between Linux server and Windows ServerWhat are the advantages of using Linux as a server versus Windows Server?First, the average failure time is less, and as long as it is configured and used properly, the average failure of Linux (which requires shutdown or restart) is more than a year,Restarting maintenance once a year isn't too much, is it? Ca
---- Set a non-primary key to clustered index [Step 4] to: http://king123654789.iteye.com/blog/1169191
1. View All indexes. Clustered indexes are created on the primary key by default.Sp_helpindex person
2. -- delete the primary key constraint and remove the index constraint on the primary key queried in [1], for example, PK _ person _ 117F9D94. Remove the primary key constraint from the primary key field. This field is not the primary key.Alter table person drop constraint PK _ person _ 117F9
In many cases, we need to write a script to schedule some tasks so that it can work on a regular basis.
After the build 1219 of Ux_pax, this feature was started to be supported. Specific as follows:
Under the Ux_pax directory, create a subdirectory named Cronlist
Edit two scripts, one named On_minutely.pas, the other named On_hourly.pas,
Represents execution once per minute and once per hour, respectively.
The script for timed tasks is run according to Cmd-line mode. Predefined variables i
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.