Home PC Games Linux Windows Database Network Programming Server Mobile  
           
 
Linux   Server
- Hackers is how the invasion and control of Things devices?
- Wi-Fi hackers use to attack your seven methods
- Online booking shocking information leakage risk, you dare book the tickets online?
- On the Web application attack techniques Common
- 5 tips to improve your Linux desktop security
- Linux Security and Optimization
- Bash code injection attacks through a special environment variable
- DDOS Attacks and Prevention
- After installation of Debian 6.0 do a few things first
- Log4cplus logging facility configuration, installation, testing
- Ubuntu 14.04 after the restart the default maximum screen brightness solutions
- Ubuntu install Oracle 10g process and problem solution
- Fedora10 use Git version Configuration Management
- You need to know 12 Git High Command
- Grep how to find files based on file contents in UNIX

  - Hadoop + Zookeeper NameNode achieve high availability
- Zabbix monitoring different versions of RAID installation and monitoring and MySQL master-slave monitor
- LVS + Keepalived the DR mode
- Nginx Keepalived Nginx monitoring scripts
- Nginx log cutting and MySQL script regular backup script
- Go powerful development server simple example
- Use web2py + uWSGI + Nginx Web server built on Linux
- SolrCloud-5.2.1 cluster deployment and testing
- Kafka cluster deployment
- Zookeeper cluster deployment
- Apache Kafka: the next generation of distributed messaging system
- Ubuntu 14.04 LTS installed Hadoop 1.2.1 (distributed cluster mode)
- CentOS6 installation configuration rsh
- Get basic information about Linux server script
- In-depth understanding of PHP ini configuration

Database   Programming
- MySQL tmpdir parameter modification
- MySQL performance view and configure finishing Daquan
- MySQL bulk insert data script
- MySQL master recovery from failure using binlog
- MariaDB database storage path modify configuration issues
- MySQL High Availability plan several options
- Oracle 12C RAC optimizer_adaptive_features cause of data into overtime
- Why HBase need to build SQL engine layer
- Introduction and MongoDB CRUD
- MongoDB relations, references, index query coverage
- 32-bit and 64-bit integer in PHP and MySQL range
- Copy Recovery using RMAN repository development environment
- Construction LVM-based raw device Oracle10g Database on Oracle Linux 5.11
- mysql_config_editor encryption and decryption of the new features of MySQL realization
- mysqldump issue a note

  - Based on a complete solution RMI service to transfer large files
- Java uses JDBC connect database
- Java generate two-dimensional code by Zxing
- EChart simple and practical control on chart
- Java by Spy Memcached to cache data
- PHP file upload methods exist in the database
- Swift notes - let you two hours to learn Swift
- JSON data normalization (normalize)
- Parse Server supports iOS and Android push messaging
- Python implementation Bursa transition model
- C ++: Postmodern systems programming language
- Glibc support encryption by modifying the DNS
- Defensive programming in PHP
- Django Web dynamic three linkage
- Python in os.path Magical

    - Process safety monitoring and protection under the Linux operating system (Linux)

- Five kinds of IO Model under Linux (Programming)

- Installation and configuration under Linux SVN server - Backup - Recovery - Scheduled Tasks (Server)

- Let CentOS perform PPPoE dial-up, ADSL can be used in a network environment! (Linux)

- Use chattr and lsattr command to manage linux files and directory attributes (Linux)

- Linux Network Analysis Tcpdump Command Guide (Linux)

- Compile Android libwebcore.so error occurs when solving (Programming)

- Linux system security reinforcement system by masquerading method (Linux)

- Linux system started to learn: Teaches you install Fedora 22 on VirtualBox (Linux)

- Python class of operator overloading (Programming)

- Share useful bash aliases and functions (Linux)

- Python kills corresponding process according to pid (Programming)

- CentOS / Linux SELinux Close (Linux)

- Chrome plug-in management, online-offline installation, part of the plug presentations (Linux)

- Sleuth Kit: used to analyze a disk image and restore files open source forensics tools (Linux)

 
       
           
           
           
           
     
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.