The server
-
Apache's Pseudo static Rule. htaccess Implementation of 301 Jump Method First, let's look at the pseudo static rules of the following. htaccess file, which is used to automatically jump to the www domain name when accessing the domain name without www< IfModule mod_rewrite.c>RewriteEngine OnRewriteBase /Order Deny,AllowDeny from 47.114... two thousand and twenty five thousand and ninety-two -
JD Cloud Engine builds a free zblogPHP tutorial The way to build zblogPHP on JD Cloud Engine is to first go to the zblog community to download the zblogPHP package, decompress it, enter the directory where index.php is located, select all files in the directory, and recompress them into zip files two thousand and fourteen sixteen thousand seven hundred and thirty -
After forgetting the password of LAN transmission tool "Flying Pigeon" Flying pigeon messenger software is believed to be familiar to all. It is a very excellent LAN file transmission tool. It is based on TCP/IP and supports information exchange on multiple platforms (Windows/Mac/Unix/Java). Some people call it the free QQ of the LAN, which can communicate with Feiqiu and Lazy Q, and it also opens source code. The pigeon messenger has the lock transmission function. When setting the password for the first time, the old password is not editable. Just fill in the password and verify the password. The encryption method of IpMsg is irreversible, so forgetting the password requires two thousand and thirteen twelve thousand nine hundred and sixteen -
Teach you how to turn an idle USB stick into a router Do you have some USB flash drives with small capacity? They are too small for use. It seems that it is a pity to lose them. But now, after a small transformation, we can get a powerful router with our computer, which not only saves money on buying routes, but also can hardly buy this router in the market! Introduction to DD-WRT: Every router device we usually use has its own operating system OS, which is used to set and manage various functions of routing devices. In fact, what we usually say about upgrading router firmware is upgrading and refreshing the route two thousand and twelve thirteen thousand four hundred and sixty-one -
Solution to slow sharing speed of Win7 accessing LAN As we all know, when transferring files on the network, large files take more time and longer than small files. Therefore, when the user is performing remote "copy" or "delete", Microsoft Windows Vista and Windows 7 systems will first compress the object file, and then self decompress after the operation is completed two thousand and twelve thirty-two thousand nine hundred and sixty-one -
Zblog background failed to log in, database connection error Today, when configuring the local zblog, I found that I could not log in to the background all the time. Considering that it was a program problem, I backed up the database and theme, deleted and reinstalled the zblog. It was useless. Since the program is reinstalled, does the problem lie in access permissions? Right click the folder of the parent directory where the program is located -- Properties -- Security, set the guest user IUSER to all permissions, and gladly open the browser to access, but the problem remains; I have encountered many similar problems before, which can be solved by using this method. Today, there is something wrong with my character two thousand and twelve eleven thousand and forty -
The difference between cookies and sessions Sessions are saved on the server side and cookies are saved on the client side. Definition of the two: When you are browsing the website, the WEB server will first send a small amount of information to your computer, and cookies will help you record the text or some choices you have typed on the website. When you visit the same website next time, the WEB server will first check whether there is any cookie data left by it last time. If there is, it will judge the user according to the content in the cookie and send it to the specific network two thousand and eleven eight thousand eight hundred and eighty-eight -
How to set up the server Windows 2000 contains many security features and options. If you configure them properly, Windows 2000 will be a very secure operating system. 1.1. The physical security server should be placed in an isolated room with a monitor installed, and the monitor should keep video records for more than 15 days. In addition, the chassis, keyboard and computer desk drawer should be locked to ensure that no one can use the computer even when entering the room, and the key should be placed in another safe place two thousand and eleven sixteen thousand and nineteen