Home PC Games Linux Windows Database Network Programming Server Mobile  
           
 
Linux   Server
- Hackers is how the invasion and control of Things devices?
- Wi-Fi hackers use to attack your seven methods
- Online booking shocking information leakage risk, you dare book the tickets online?
- On the Web application attack techniques Common
- 5 tips to improve your Linux desktop security
- Linux Security and Optimization
- Bash code injection attacks through a special environment variable
- DDOS Attacks and Prevention
- After installation of Debian 6.0 do a few things first
- Log4cplus logging facility configuration, installation, testing
- Ubuntu 14.04 after the restart the default maximum screen brightness solutions
- Ubuntu install Oracle 10g process and problem solution
- Fedora10 use Git version Configuration Management
- You need to know 12 Git High Command
- Grep how to find files based on file contents in UNIX

  - Hadoop + Zookeeper NameNode achieve high availability
- Zabbix monitoring different versions of RAID installation and monitoring and MySQL master-slave monitor
- LVS + Keepalived the DR mode
- Nginx Keepalived Nginx monitoring scripts
- Nginx log cutting and MySQL script regular backup script
- Go powerful development server simple example
- Use web2py + uWSGI + Nginx Web server built on Linux
- SolrCloud-5.2.1 cluster deployment and testing
- Kafka cluster deployment
- Zookeeper cluster deployment
- Apache Kafka: the next generation of distributed messaging system
- Ubuntu 14.04 LTS installed Hadoop 1.2.1 (distributed cluster mode)
- CentOS6 installation configuration rsh
- Get basic information about Linux server script
- In-depth understanding of PHP ini configuration

Database   Programming
- MySQL tmpdir parameter modification
- MySQL performance view and configure finishing Daquan
- MySQL bulk insert data script
- MySQL master recovery from failure using binlog
- MariaDB database storage path modify configuration issues
- MySQL High Availability plan several options
- Oracle 12C RAC optimizer_adaptive_features cause of data into overtime
- Why HBase need to build SQL engine layer
- Introduction and MongoDB CRUD
- MongoDB relations, references, index query coverage
- 32-bit and 64-bit integer in PHP and MySQL range
- Copy Recovery using RMAN repository development environment
- Construction LVM-based raw device Oracle10g Database on Oracle Linux 5.11
- mysql_config_editor encryption and decryption of the new features of MySQL realization
- mysqldump issue a note

  - Based on a complete solution RMI service to transfer large files
- Java uses JDBC connect database
- Java generate two-dimensional code by Zxing
- EChart simple and practical control on chart
- Java by Spy Memcached to cache data
- PHP file upload methods exist in the database
- Swift notes - let you two hours to learn Swift
- JSON data normalization (normalize)
- Parse Server supports iOS and Android push messaging
- Python implementation Bursa transition model
- C ++: Postmodern systems programming language
- Glibc support encryption by modifying the DNS
- Defensive programming in PHP
- Django Web dynamic three linkage
- Python in os.path Magical

    - How to add and delete bookmarks in Ubuntu (Linux)

- Use Elasticsearch + Logstash + Kibana set up centralized log Practice Analysis Platform (Server)

- Ubuntu 14.04 after the restart the default maximum screen brightness solutions (Linux)

- CentOS 6.4 install and configure Squid Proxy Server (Linux)

- C # DateTime structure common method (Programming)

- OpenGL Superb Learning Notes - Fragment Shader (Programming)

- Linux centralized log server rsyslog (Server)

- The best known for archiving / compression tool under linux (Linux)

- To use Java arrays implement the order form (Programming)

- Linux daemon (Linux)

- Detailed software to run UnixBench (Linux)

- Try the command ip, ifconfig is obsolete under Linux (Linux)

- Install Java JDK 8 in CentOS 7 / 6.5 / 6.4 (Linux)

- AngularJS notes --- Scope and controller (Programming)

- MySQL Tutorial: Philosophical Reflections on the unauthenticated user (Database)

 
       
           
           
           
           
     
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.