.
5, the last of course is the Internet calibration.
What kind of agent is a good agent
Agent easy to use the standard: fast, stable, of course, the premise is free.
In the agent Hunter more than 3.0 version, the Verification time bar is "The time characteristic", displays the situation to be similar: "0.9│1.3│2.6", "26.3│0.0│26.3", these three time in turn represent: The connection time, first receives the data time, the total verification time. Of
When it comes to proxy servers, the first thing we can think of is a dedicated Proxy server Web site that, in some cases, speeds up access to the Internet. In fact, in the need to access the external LAN, we can set up the agent, the number of visits to save the page in the cache, thereby "improve" the network speed. More importantly, we can use the
more. Disable if you do not need it.
Windows Image Acquisition (WIA)
Specifically for scanners and digital cameras, such as providing image capture and acquisition capabilities. There is on the open, not on the off.
Windows Media Center Service launcher/windows Media Center Receiver service/windows Media Center Scheduler Service
Using the network to transfer multimedia files for Windows Media Extender (like the Xbox) is recommended, unless you ne
.
Windows Image Acquisition (WIA)
Specifically for scanners and digital cameras, such as providing image capture and acquisition capabilities. There is on the open, not on the off.
Windows Media Center Service launcher/windows Media Center Receiver service/windows Media Center Scheduler Service
Using the network to transfer multimedia files for Windows Media Extender (like the Xbox) is recommended, unless you need this feature.
Windows Modules In
the Xbox) is recommended, unless you need this feature.
Windows Modules Installer
If you do not use Windows Updates, you can prohibit this service.
Windows time
and server synchronization time, generally I have to close it.
Windows Update
This functionality is up to you, and it is associated with Background Intelligent Transfer Service, Modules installer services.
WinHTTP Web Proxy auto-discovery Se
groups of IP addresses that allow caching to be used. The "http_access allow local_net" command line mentioned earlier.
4. Run tests in a browser
In the browser Mozilla in turn select "Edit-preference-advanced-proxies", and then select "Manual Proxy Configuration" After the point "View", The SQUID server's IP address (172.21.101.132) can be used as the proxy
Mail transport Protocol (SMTP) service, which provides the ability to transfer e-mail across the network.
4, turn off 21 ports: Shut down the FTP Publishing service, it provides services through the Internet information Services snap-in to provide FTP connection and management.
5. Turn off the 23 port:
a firewall or through a proxy server. In general, you do not need to use it for dial-up Internet users. Note that the commonly used proxy server for browsing Web pages is typically a dedicated HTTP proxy, which is different from socks. Therefore, you can browse the Web page
When you use PHP for Web development, the entry needs to pay attention to some security configuration items, turn off some features, to prevent users inadvertently appear a variety of problems.
1. turn off the PHP prompt error feature
Change the display_errors to off in php
point:In Test3 (), because dout = new DataOutputStream (Newbufferedoutputstream (Mysocket.getoutputstream ())), buffered is used, So after the Dout.writeutf () method, if Dout.flush () is not used, the data will be present in the output cache and will not be sent out.If our team Dout's statement is, dout = new DataOutputStream (Mysocket.getoutputstream ()), then the data will be sent out immediately. (unless the other party does not call read () to read the data, and the amount of data is enorm
When installing a Linux operating system, some unnecessary packets and applications are automatically installed without the user noticing. In this article, we'll discuss how to disable some of the unnecessary applications and services in your Linux system to protect your system resources.
First let's look at what services are running on the system. Use the following command:
Output results
Now let's use the following netstat command to quickly browse through processes (ports) that accept conne
* * How to optimize Linux systems:1 without root, add a normal user, with sudo authorization management.2 Change the default remote connection SSH service port and prevent the root user from connecting remotely.3 Timing automatically updates server time.4 Configure the Yum update source to download the RPM package from the domestic update source.5 Turn off SELinu
When you open IE Explorer in Windows Sever 2012, IE10 prompts you with the "enabled Internet Explorer Enhanced Security Configuration" message.
is set to "high security" in the security level, and if I want to turn off Internet Explorer Enhanced Security Configuration, how do I set it?
The cause of the problem
In Windows Server 2012, which usually
Turn off Network-manager Network setup problem in Ubuntu!"Server Version"In the Ubuntuserver version, because there is only command-line mode, you can only modify the/etc/network/interfaces if you want to set the network parameters. Here's how to set it up:(1) ubuntuserver Modify IP AddressOpen/etc/network/interfacessudo vim/etc/network/interfacesAdd the followin
Pay by Volume: Release instances, turn off automatic release
Description: This document applies only to users who pay by volume .
Releasing instances
If you no longer need an instance, you need to release it as soon as possible. Otherwise, even if you stop, Aliyun will continue to charge until you release the instance.
There are two modes of release:
Immediate Release: Immediately release the Pay-a
MAC OS turn off the FTP command first: Turn the shutdown on by the command line as follows: Open FTP Server sudo-s launchctl load-w/system/library/launchdaemons/ftp.plist off FTP Server sudo-s launchctl unload-w/system/library/lau
How does the Mac turn SSH on/off through the terminal?
SSH (Secure Shell) is a versatile, powerful, software-based network security solution. Each time the computer sends data to the network, it is automatically encrypted by SSH. Newer MAC devices running OS X, or MacOS, will have SSH installed by default, but the SSH daemon is disabled by default. Today we'll come together to learn how to
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.