<rt id="bn8ez"></rt>
<label id="bn8ez"></label>

  • <span id="bn8ez"></span>

    <label id="bn8ez"><meter id="bn8ez"></meter></label>

    隨筆-124  評論-194  文章-0  trackbacks-0
      2012年9月27日
         摘要: 做為程序員,從感性角度講評一下7年里我使用過的9款機械鍵盤,確實更有特色,這種特殊的觸聽體驗非常美妙!  閱讀全文
    posted @ 2021-03-30 15:45 我愛佳娃 閱讀(398) | 評論 (0)編輯 收藏
    搬了個家,想通過A410點播imac上下載的電影,通過系統自帶共享samba怎么都不成功。

    想到是13年買的A410,應該升級一下,可官網都沒了,最后搜索到這個16年的最新固件:
    https://drivers.softpedia.com/get/DVD-BluRay-Media-Players/Cloud-Media/Cloud-Media-Popcorn-Hour-A-410-Media-Player-Firmware-050816061625POP425802.shtml
    通過USB順利更新了一把。

    再查看mac可以開nfs,方法如下:

    sudo vi /etc/exports
    加入:

    / -sec=sys

     

    /Users /Users/popeye /Users/popeye/movies -ro -mapall=popeye:staff -alldirs

    檢查配置:

    sudo nfsd checkexports


    重啟:

    sudo nfsd restart

    這里要注意movies目錄是我重新建立的755權限,不要用系統原來的目錄,不然總是訪問不了。

    再到A410里網絡瀏覽里就能找到了。





    posted @ 2020-01-19 21:43 我愛佳娃 閱讀(702) | 評論 (0)編輯 收藏
    http://mathias-kettner.de/checkmk_livestatus.html下載并解壓最新的包:
    check_mk-1.2.1i3.tar.gz

    再解壓其中的到livestatus目錄:
    livestatus.tar.gz

    進入:livestatus/src

    再:make clean livestatus.o

    會發現一堆錯誤,根據編譯NDO的選項:
    ndoutils-1.4b7/src:
    make clean ndomod-3x.o gcc -fno-common -g -O2 -DHAVE_CONFIG_H -D BUILD_NAGIOS_3X -o ndomod-3x.o ndomod.c io.o utils.o -bundle -flat_namespace -undefined suppress -lz

    在最后的編譯選項里添上:
    -flat_namespace -undefined suppress -lz

    就可以編譯出: livestatus.o



    --------------------------
    livecheck編不過,報找不到n_short:
    ip_icmp.h:92: error: expected specifier-qualifier-list before ‘n_short’

    vi ./check_icmp.c 
    把這個調整到INCLUDE序列的最后即可:
    #include "/usr/include/netinet/ip_icmp.h"
    posted @ 2012-12-21 07:00 我愛佳娃 閱讀(1556) | 評論 (0)編輯 收藏
         摘要:

    場景

    想要用到的場景:用戶訪問WEB服務,WEB訪問非WEB服務1,服務1又再訪問2、3,合并計算后,把數據返回給WEB及前端用戶。想讓訪問鏈上的所有服務都能得到認證和鑒權,認為本次請求確實是來自用戶的。所以想到用CAS,讓用戶在一點登錄,所有服務都到此處認證和鑒權。

      閱讀全文

    posted @ 2012-12-01 10:43 我愛佳娃 閱讀(9803) | 評論 (3)編輯 收藏

    Setting Up SSL on Tomcat in 5 minutes (https://localhost:8443)

    June 30, 2011 | By 

    This tutorial will walk you through how to configure SSL (https://localhost:8443 access) on Tomcat in 5 minutes.

    apache tomcat Setting Up SSL on Tomcat in 5 minutes (https://localhost:8443)

    For this tutorial you will need:

    • Java SDK (used version 6 for this tutorial)
    • Tomcat (used version 7 for this tutorial)

    The set up consists in 3 basic steps:

    1. Create a keystore file using Java
    2. Configure Tomcat to use the keystore
    3. Test it
    4. (Bonus ) Configure your app to work with SSL (access through https://localhost:8443/yourApp)

    1 – Creating a Keystore file using Java

    Fisrt, open the terminal on your computer and type:

    Windows:

    cd %JAVA_HOME%/bin 

    Linux or Mac OS:

    cd $JAVA_HOME/bin 

    The $JAVA_HOME on Mac is located on “/System/Library/Frameworks/JavaVM.framework/Versions/{your java version}/Home/

    You will change the current directory to the directory Java is installed on your computer. Inside the Java Home directory, cd to the bin folder. Inside the bin folder there is a file named keytool. This guy is responsible for generating the keystore file for us.

    Next, type on the terminal:

    keytool -genkey -alias tomcat -keyalg RSA 

    When you type the command above, it will ask you some questions. First, it will ask you to create a password (My password is “password“):

    loiane:bin loiane$ keytool -genkey -alias tomcat -keyalg RSA Enter keystore password:  password Re-enter new password: password What is your first and last name?   [Unknown]:  Loiane Groner What is the name of your organizational unit?   [Unknown]:  home What is the name of your organization?   [Unknown]:  home What is the name of your City or Locality?   [Unknown]:  Sao Paulo What is the name of your State or Province?   [Unknown]:  SP What is the two-letter country code for this unit?   [Unknown]:  BR Is CN=Loiane Groner, OU=home, O=home, L=Sao Paulo, ST=SP, C=BR correct?   [no]:  yes  Enter key password for 	(RETURN if same as keystore password):  password Re-enter new password: password 

    It will create a .keystore file on your user home directory. On Windows, it will be on: C:\Documents and Settings\[username]; on Mac it will be on /Users/[username] and on Linux will be on /home/[username].

    2 – Configuring Tomcat for using the keystore file – SSL config

    Open your Tomcat installation directory and open the conf folder. Inside this folder, you will find the server.xml file. Open it.

    Find the following declaration:

    <!-- <Connector port="8443" protocol="HTTP/1.1" SSLEnabled="true"     maxThreads="150" scheme="https" secure="true"     clientAuth="false" sslProtocol="TLS" /> --> 

    Uncomment it and modify it to look like the following:

    Connector SSLEnabled="true" acceptCount="100" clientAuth="false"     disableUploadTimeout="true" enableLookups="false" maxThreads="25"     port="8443" keystoreFile="/Users/loiane/.keystore" keystorePass="password"     protocol="org.apache.coyote.http11.Http11NioProtocol" scheme="https"     secure="true" sslProtocol="TLS" /> 

    Note we add the keystoreFilekeystorePass and changed the protocol declarations.

    3 – Let’s test it!

    Start tomcat service and try to access https://localhost:8443. You will see Tomcat’s local home page.

    Note if you try to access the default 8080 port it will be working too: http://localhost:8080

    4 – BONUS - Configuring your app to work with SSL (access through https://localhost:8443/yourApp)

    To force your web application to work with SSL, you simply need to add the following code to your web.xml file (before web-app tag ends):

    <security-constraint> 	<web-resource-collection> 		<web-resource-name>securedapp</web-resource-name> 		<url-pattern>/*</url-pattern> 	</web-resource-collection> 	<user-data-constraint> 		<transport-guarantee>CONFIDENTIAL</transport-guarantee> 	</user-data-constraint> </security-constraint> 

    The url pattern is set to /* so any page/resource from your application is secure (it can be only accessed with https). The transport-guarantee tag is set to CONFIDENTIAL to make sure your app will work on SSL.

    If you want to turn off the SSL, you don’t need to delete the code above from web.xml, simply changeCONFIDENTIAL to NONE.

    Referencehttp://tomcat.apache.org/tomcat-7.0-doc/ssl-howto.html (this tutorial is a little confusing, that is why I decided to write another one my own).

    Happy Coding!

    posted @ 2012-11-12 23:17 我愛佳娃 閱讀(3179) | 評論 (0)編輯 收藏
    EXTJS和D3都很強大,不解釋了,把D3繪的圖直接放到一個EXT的TAB里,直接上圖上代碼:


    代碼中的D3例子來自:
    https://github.com/mbostock/d3/wiki/Force-Layout
    可用于繪制拓撲結構圖.
    Ext.define('EB.view.content.SingleView', {
        extend : 'Ext.panel.Panel',
        alias : 'widget.singleview',

        layout : 'fit',

        title : 'single view',

        initComponent : function() {
            this.callParent(arguments);
        },

        onRender : function() {
            var me = this;

            me.doc = Ext.getDoc();
            me.callParent(arguments);

            me.drawMap();
        },

        drawMap : function() {
            var width = 960, height = 500

            var target = d3.select("#" + this.id+"-body");

            var svg = target.append("svg").attr("width", width).attr("height",
                    height);

            var force = d3.layout.force().gravity(.05).distance(100).charge(-100)
                    .size([width, height]);

                    // get from: https://github.com/mbostock/d3/wiki/Force-Layout
                    
    // example: force-directed images and labels
            d3.json("graph.json", function(json) {
                force.nodes(json.nodes).links(json.links).start();

                var link = svg.selectAll(".link").data(json.links).enter()
                        .append("line").attr("class", "link");

                var node = svg.selectAll(".node").data(json.nodes).enter()
                        .append("g").attr("class", "node").call(force.drag);

                node.append("image").attr("xlink:href",
                        "https://github.com/favicon.ico").attr("x", -8).attr("y",
                        -8).attr("width", 16).attr("height", 16);

                node.append("text").attr("dx", 12).attr("dy", ".35em").text(
                        function(d) {
                            return d.name
                        });

                force.on("tick", function() {
                            link.attr("x1", function(d) {
                                        return d.source.x;
                                    }).attr("y1", function(d) {
                                        return d.source.y;
                                    }).attr("x2", function(d) {
                                        return d.target.x;
                                    }).attr("y2", function(d) {
                                        return d.target.y;
                                    });

                            node.attr("transform", function(d) {
                                        return "translate(" + d.x + "," + d.y + ")";
                                    });
                        });
            });
        }

    });
    posted @ 2012-09-27 07:38 我愛佳娃 閱讀(4475) | 評論 (0)編輯 收藏
    主站蜘蛛池模板: 亚洲av最新在线观看网址| 亚洲黄网在线观看| 狼色精品人妻在线视频免费| 91麻豆最新在线人成免费观看| 亚洲综合一区二区精品导航| 久久久久免费看成人影片| 久久国产精品亚洲一区二区| 久久精品无码精品免费专区| 亚洲邪恶天堂影院在线观看| 1a级毛片免费观看| 亚洲日韩乱码中文无码蜜桃臀| 在线精品一卡乱码免费| 欧洲 亚洲 国产图片综合| 全免费a级毛片免费**视频| 国产亚洲欧美在线观看| 亚洲精品无码永久在线观看 | 亚洲精品国产精品乱码不卡| 春意影院午夜爽爽爽免费| 亚洲五月综合缴情在线观看| 日本不卡免费新一区二区三区| 亚洲专区先锋影音| 成人毛片视频免费网站观看| 色综合久久精品亚洲国产| 亚洲av日韩av欧v在线天堂| 久久免费国产精品| 亚洲图片一区二区| 免费无码AV电影在线观看| 毛片亚洲AV无码精品国产午夜| 亚洲一区二区三区乱码A| 午夜视频在线免费观看| 亚洲色欲色欲www| 亚洲伊人成无码综合网| 99久久久国产精品免费牛牛四川 | 亚洲阿v天堂在线2017免费| 亚洲精品美女久久久久99| 韩国免费一级成人毛片| 美女露100%胸无遮挡免费观看| 亚洲国产另类久久久精品小说| 国产卡二卡三卡四卡免费网址| 美女视频黄.免费网址| 亚洲国产综合专区电影在线|