锘??xml version="1.0" encoding="utf-8" standalone="yes"?> sudo vi /etc/exports / -sec=sys /Users /Users/popeye /Users/popeye/movies -ro -mapall=popeye:staff -alldirs sudo nfsd checkexports sudo nfsd restart 鎯寵鐢ㄥ埌鐨勫満鏅細鐢ㄦ埛璁塊棶WEB鏈嶅姟錛學EB璁塊棶闈濿EB鏈嶅姟1錛屾湇鍔?鍙堝啀璁塊棶2銆?錛屽悎騫惰綆楀悗錛屾妸鏁版嵁榪斿洖緇橶EB鍙婂墠绔敤鎴楓傛兂璁╄闂摼涓婄殑鎵鏈夋湇鍔¢兘鑳藉緱鍒拌璇佸拰閴存潈錛岃涓烘湰嬈¤姹傜‘瀹炴槸鏉ヨ嚜鐢ㄦ埛鐨勩傛墍浠ユ兂鍒扮敤CAS錛岃鐢ㄦ埛鍦ㄤ竴鐐圭櫥褰曪紝鎵鏈夋湇鍔¢兘鍒版澶勮璇佸拰閴存潈銆? This tutorial will walk you through how to configure SSL (https://localhost:8443 access) on Tomcat in 5 minutes. For this tutorial you will need: The set up consists in 3 basic steps: Fisrt, open the terminal on your computer and type: Windows: Linux or Mac OS: The $JAVA_HOME on Mac is located on “/System/Library/Frameworks/JavaVM.framework/Versions/{your java version}/Home/” You will change the current directory to the directory Java is installed on your computer. Inside the Java Home directory, cd to the bin folder. Inside the bin folder there is a file named keytool. This guy is responsible for generating the keystore file for us. Next, type on the terminal: When you type the command above, it will ask you some questions. First, it will ask you to create a password (My password is “password“): It will create a .keystore file on your user home directory. On Windows, it will be on: C:\Documents and Settings\[username]; on Mac it will be on /Users/[username] and on Linux will be on /home/[username]. Open your Tomcat installation directory and open the conf folder. Inside this folder, you will find the server.xml file. Open it. Find the following declaration: Uncomment it and modify it to look like the following: Note we add the keystoreFile, keystorePass and changed the protocol declarations. Start tomcat service and try to access https://localhost:8443. You will see Tomcat’s local home page. Note if you try to access the default 8080 port it will be working too: http://localhost:8080 To force your web application to work with SSL, you simply need to add the following code to your web.xml file (before web-app tag ends): The url pattern is set to /* so any page/resource from your application is secure (it can be only accessed with https). The transport-guarantee tag is set to CONFIDENTIAL to make sure your app will work on SSL. If you want to turn off the SSL, you don’t need to delete the code above from web.xml, simply changeCONFIDENTIAL to NONE. Reference: http://tomcat.apache.org/tomcat-7.0-doc/ssl-howto.html (this tutorial is a little confusing, that is why I decided to write another one my own). Happy Coding!
]]>
鎯沖埌鏄?3騫翠拱鐨凙410錛屽簲璇ュ崌綰т竴涓嬶紝鍙畼緗戦兘娌′簡錛屾渶鍚庢悳绱㈠埌榪欎釜16騫寸殑鏈鏂板浐浠訛細
https://drivers.softpedia.com/get/DVD-BluRay-Media-Players/Cloud-Media/Cloud-Media-Popcorn-Hour-A-410-Media-Player-Firmware-050816061625POP425802.shtml
閫氳繃USB欏哄埄鏇存柊浜嗕竴鎶娿?br />
鍐嶆煡鐪媘ac鍙互寮nfs錛屾柟娉曞涓嬶細
鍔犲叆錛?br />
媯鏌ラ厤緗細
閲嶅惎錛?/p>
榪欓噷瑕佹敞鎰弇ovies鐩綍鏄垜閲嶆柊寤虹珛鐨?55鏉冮檺錛屼笉瑕佺敤緋葷粺鍘熸潵鐨勭洰褰曪紝涓嶇劧鎬繪槸璁塊棶涓嶄簡銆?br />
鍐嶅埌A410閲岀綉緇滄祻瑙堥噷灝辮兘鎵懼埌浜嗐?/span>
]]>
鍐嶈В鍘嬪叾涓殑鍒發ivestatus鐩綍:
livestatus.tar.gz
榪涘叆:livestatus/src
鍐?make clean livestatus.o
浼氬彂鐜頒竴鍫嗛敊璇?鏍規嵁緙栬瘧NDO鐨勯夐」:
ndoutils-1.4b7/src:
make clean ndomod-3x.o
gcc -fno-common -g -O2 -DHAVE_CONFIG_H -D BUILD_NAGIOS_3X -o ndomod-3x.o ndomod.c io.o utils.o -bundle -flat_namespace -undefined suppress -lz
鍦ㄦ渶鍚庣殑緙栬瘧閫夐」閲屾坊涓?
-flat_namespace -undefined suppress -lz
灝卞彲浠ョ紪璇戝嚭:
livestatus.o
--------------------------
livecheck緙栦笉榪?鎶ユ壘涓嶅埌n_short:
vi ./check_icmp.c
鎶婅繖涓皟鏁村埌INCLUDE搴忓垪鐨勬渶鍚庡嵆鍙?
]]>1 – Creating a Keystore file using Java
cd %JAVA_HOME%/bin
cd $JAVA_HOME/bin
keytool -genkey -alias tomcat -keyalg RSA
loiane:bin loiane$ keytool -genkey -alias tomcat -keyalg RSA Enter keystore password: password Re-enter new password: password What is your first and last name? [Unknown]: Loiane Groner What is the name of your organizational unit? [Unknown]: home What is the name of your organization? [Unknown]: home What is the name of your City or Locality? [Unknown]: Sao Paulo What is the name of your State or Province? [Unknown]: SP What is the two-letter country code for this unit? [Unknown]: BR Is CN=Loiane Groner, OU=home, O=home, L=Sao Paulo, ST=SP, C=BR correct? [no]: yes Enter key password for (RETURN if same as keystore password): password Re-enter new password: password
2 – Configuring Tomcat for using the keystore file – SSL config
<!-- <Connector port="8443" protocol="HTTP/1.1" SSLEnabled="true" maxThreads="150" scheme="https" secure="true" clientAuth="false" sslProtocol="TLS" /> -->
Connector SSLEnabled="true" acceptCount="100" clientAuth="false" disableUploadTimeout="true" enableLookups="false" maxThreads="25" port="8443" keystoreFile="/Users/loiane/.keystore" keystorePass="password" protocol="org.apache.coyote.http11.Http11NioProtocol" scheme="https" secure="true" sslProtocol="TLS" />
3 – Let’s test it!
4 – BONUS - Configuring your app to work with SSL (access through https://localhost:8443/yourApp)
<security-constraint> <web-resource-collection> <web-resource-name>securedapp</web-resource-name> <url-pattern>/*</url-pattern> </web-resource-collection> <user-data-constraint> <transport-guarantee>CONFIDENTIAL</transport-guarantee> </user-data-constraint> </security-constraint>
]]>
浠g爜涓殑D3渚嬪瓙鏉ヨ嚜:
鍙敤浜庣粯鍒舵嫇鎵戠粨鏋勫浘.
extend : 'Ext.panel.Panel',
alias : 'widget.singleview',
layout : 'fit',
title : 'single view',
initComponent : function() {
this.callParent(arguments);
},
onRender : function() {
var me = this;
me.doc = Ext.getDoc();
me.callParent(arguments);
me.drawMap();
},
drawMap : function() {
var width = 960, height = 500
var target = d3.select("#" + this.id+"-body");
var svg = target.append("svg").attr("width", width).attr("height",
height);
var force = d3.layout.force().gravity(.05).distance(100).charge(-100)
.size([width, height]);
// get from: https://github.com/mbostock/d3/wiki/Force-Layout
// example: force-directed images and labels
d3.json("graph.json", function(json) {
force.nodes(json.nodes).links(json.links).start();
var link = svg.selectAll(".link").data(json.links).enter()
.append("line").attr("class", "link");
var node = svg.selectAll(".node").data(json.nodes).enter()
.append("g").attr("class", "node").call(force.drag);
node.append("image").attr("xlink:href",
"https://github.com/favicon.ico").attr("x", -8).attr("y",
-8).attr("width", 16).attr("height", 16);
node.append("text").attr("dx", 12).attr("dy", ".35em").text(
function(d) {
return d.name
});
force.on("tick", function() {
link.attr("x1", function(d) {
return d.source.x;
}).attr("y1", function(d) {
return d.source.y;
}).attr("x2", function(d) {
return d.target.x;
}).attr("y2", function(d) {
return d.target.y;
});
node.attr("transform", function(d) {
return "translate(" + d.x + "," + d.y + ")";
});
});
});
}
});
]]>
涓嬫潵鍚庡厛瑁?mysql-5.5.27-osx10.6-x86_64.pkg
瀹冩槸瑁呭埌/usr/local/mysql,鍒版鐩綍榪愯涓?
閫氳繃榪欎釜鍚姩:
./bin/mysqld_safe
鎺掗敊:
鐪嬩笅涓婇潰鐨凩OG鎻愮ず.
Can't find file: './mysql/host.frm' :涓鑸槸娌℃潈闄?鎶奃ATA鐩綍鍒犻櫎,鍐嶇敤涓婇潰鍛戒護寤轟竴嬈?/span>
unknow option:鎶?etc/my.cnf鍒犻櫎鎺?閲岄潰鏈夋柊鐗堟湰涓嶈璇嗙殑涓婁竴鐗堟湰閬楃暀閰嶇疆
璇磎ysql.sock鎵句笉鍒?榪欎釜鐗堟湰鏄湪/tmp/鐩綍涓嬪摝!
鍐嶆妸鍓╀笅涓や釜鍖呰浜?灝卞彲浠ラ氳繃閰嶇疆闈㈡澘鍚姩浜?
涓嬫鍗囩駭鍙兘瑕佺粰涓?usr/local/mysql/data鐩綍鐨勬潈闄?/span>
]]>
]]>
鎶婁笅闈唬鐮佸姞鍒頒唬鐮佸紑澶?瀹冨氨鍙互鑷惎鍔ㄤ簡,涓嶉渶瑕佸啀EXPORT鎴栬?I
BEGIN {
#闇瑕佸姞鍒癓OADPATH鐨勮礬寰?/font>
my $need = '/usr/local/nagios/pkg/ebase/';
push @INC, $need;
if ( $^O !~ /MSWin32/ ) {
my $ld = $ENV{DYLD_LIBRARY_PATH};
if ( !$ld ) {
$ENV{DYLD_LIBRARY_PATH} = $need;
}
elsif ( $ld !~ m#(^|:)\Q$need\E(:|$)# ) {
$ENV{DYLD_LIBRARY_PATH} .= ':' . $need;
}
else {
$need = "";
}
if ($need) {
exec 'env', $^X, $0, @ARGV;
}
}
}
@import url(http://www.tkk7.com/CuteSoft_Client/CuteEditor/Load.ashx?type=style&file=SyntaxHighlighter.css);@import url(/css/cuteeditor.css);寤虹珛nagiosdnld
鎸囧悜杞摼鎺?/usr/local/nagios/dnld -> /Users/nagiosdnld/dnld
緙栬緫/etc/sshd_config
Match User nagiosdnld
X11Forwarding no
AllowTcpForwarding no
ForceCommand internal-sftp
ChrootDirectory /Users/nagiosdnld
閲?span style="font: 12.0px 'Heiti SC Light'">鍚?/span>涓嬫湇鍔?/span>:
launchctl stop org.openbsd.ssh-agent
launchctl start org.openbsd.ssh-agent