iis

Learn about iis, we have the largest and most updated iis information on alibabacloud.com

IIS6 and IIS7 for static file gzip compression mode

Explain why you're writing this article, and how to get tangled up in this "little problem". First of all, open the static file gzip compression is very advantageous to improve the site's access speed, and effectively reduce the spider crawling stati

Asp. NET seven authentication methods and solutions

In the B/s system development, often need to use "authentication". Because the Web application is very special, unlike traditional C/s programs, by default (no authentication method and authority control means), when your program is publicly availabl

JSP environment configuration Apache2.2 and Tomcat5.5 consolidation

Apache and Tomcat are the two projects under the Apache Foundation. One is the HTTP Web server, the other is the servlet container (servlet container), and the latest 5.5.X series implements the Servlet 2.4/jsp 2.0Spec. In our production environment,

IIS open gzip compression method and failed solution

This article explained the detailed IIS to configure Gzip compression method, and after the correct configuration, still can not open gzip compression solution, these experiences are the actual operation of the site to sum up, share ... To turn on gz

Using IIS to erect an FTP server novice tutorial and precautions

Teach you step-by-step use of IIS to build a powerful FTP server to support multi-user landing and management. Using IIS to erect an FTP server1. Install FTP serverStep: Start--Control Panel--Add or Remove Programs--Add/Remove Windows Components--Sel

Force download of all files in the IIS site force download text files such as Txt,ini

When the configuration is complete, all files in the access site are forced to download, prompting the download window, including all the files such as Asp,php,txt. When making an XP theme download station, for example. bootskin files need to be prov

IIS 301 redirects to the www. Domain name at the beginning

Explain what is the permanent redirection of resources, popular simple understanding, when you enter sina.com.cn in the browser (Sina homepage), the URL is not become www.sina.com.cn? Again, some 163.com, qq.com will become the style of www.xxx.com,

UNIX-based Web server Security Guide

UNIX-based Web server Security Guide One. Security vulnerabilities Vulnerabilities on Web servers can be considered in the following ways: 1. Secret files, directories, or important data that you do not have access to on a Web server. 2. When send

Steps for setting up an FTP server under Windows XP system

Now that the family should be a universal broadband Internet connection, do we consider using existing resources to do something for ourselves when we fully enjoy the thrill of speed surfing? Yes, today the purpose of this article is to take you to s

IIS6 set up a Web site often encounter problems please see

A lot of friends in the use of IIS6 site encountered a lot of problems, and some of these problems in the past in the IIS5 of the encounter, and some are new, did a lot of experiments, combined with the previous debugging experience, made this summar

IIS verbose error codes and explanations

When a user attempts to access content on a server that is running Internet information Services (IIS) through HTTP or File Transfer Protocol (FTP), IIS returns a numeric code that represents the state of the request. The status code is recorded in t

Securing IIS servers on the external network

Securing IIS servers on the external network About IIS server security consists of six main steps: 1, use the Security Configuration Wizard (Configuration Wizard) to determine the minimum functionality required by the Web server, and then disable ot

Cloud host environment set up a course to build the Universal mainframe

Many owners in the purchase of virtual host, will look at the virtual host some of the parameters, the most important is the support of the program language. Now many IDC businesses are claiming the almighty host. The most funny thing is that I just

How to prevent and solve the problem of the website is Hung horse

Tip: I am here to discuss the blog has recently been an example of ARP attack, annoying to death. The manifestation of the site by the IFRAME Hanging horse, pop-up a large number of pornographic sites, the problem appeared 11 hours, these 11 hours in

CuteEditor5.0 installation and its ajax.net with no refresh operation database!

ajax| Data | database | refresh | No refresh Cuteeditor really is a good web online editor, but the 5.0 installation and the previous version is a little different, 5.0 of the cracked version of the download address is: Http://www.seaskyer.net, Downl

XMLHTTP and anti-theft chain

xml| anti-theft Chain We can use XMLHTTP to read the file information, and then transfer to the client, so that we can hide the real address of the file. Thus playing a little bit to prevent the hotlinking function. In this file, we can use many meth

Scripting errors in asp.net Ajax: sys undefined workaround

Ajax|asp.net| Error | script | solve Wish you all a good year ahead! The last time we worked day and night, I finally launched a new version of the project as planned. Finally, I have time to write something today. Some time ago company colleagues in

Using XML Templates (MSSQL manual)

sql|xml| templates The following is a generic form of a template that shows how to specify SQL queries and XPath queries: <root xmlns:sql= "Urn:schemas-microsoft-com:xml-sql"Sql:xsl= ' xsl FileName ' ><sql:header><sql:param> </sq

WML development Tutorial--wap Web server Configuration

Server | tutorials   Setting up Apache WEB SERVER Whether it's NT or UNIX or Linux, the Conf/mime.types files are modified under the Apache installation directory Add the following content to the file: TEXT/VND.WAP.WML. WML Image/vnd.wap.wbmp. wbmp A

Protect the XML configuration file without direct access to

xml| Access Some programs, the configuration file is written in the XML file, this has some benefits, but for sensitive configuration, such as access to passwords, etc., or do not do in the XML configuration good. If you have already used an XML con

Total Pages: 56 1 2 3 4 5 .... 56 Go to: Go
Tags Index:

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.