Windward leaves

Windward leaves
If the heart is clear, it will not be welcome.

Latest release

Case sharing

Remember QQ mail phishing mail incident

Windward leaves Reading (2140) Commentary (15)

I believe many people have encountered fishing and mail. Nowadays, fishing can be said to be very widespread. The so-called phishing mail is the attacker forged a seemingly normal mail. The mail contains links to phishing sites, which allows the victim to believe that this is a trusted website (such as company OA, QQ space, micro-blog, even Alipay, bank, etc.), so that the victim can take the initiative in the network station.

Technical course

WordPress add mouse click effects

Windward leaves Reading (12214) Commentary (8)

As a matter of fact, this kind of tutorials is searching for a lot of books on the Internet. But since you have added this to your blog, you can also make a few copies. In the first two days, the photo album was turned over to a picture, and suddenly we thought of the Vision Forum (looking for something in the past few days).

Technical course

Chinese switch configuration port mirroring

Windward leaves Reading (1720) Commentary (5)

Background: a unit is equipped with an intranet access device to configure the port mirroring on core exchange, and monitor the incoming and outgoing traffic of the intranet to the monitoring port of the access device. When the traffic flows from the untrusted terminal, the reset message is blocked to block the HTTP message, and the untrusted terminal end of the request is redirected to the access device.

Technical course

Remote network wake-up PC setup tutorial across public network

Windward leaves Reading (9489) Commentary (18)

Because of the need of work, sometimes we need to remotely drag files to the company's computers, so we map the company's remote desktop to the public network. So the company's computer seems to be my long-term boot server, basically no shutdown. But one night, boss said that people had to turn off the computer, and later encountered the need to tele file.

Case sharing

K2P simple evaluation of firmware

Windward leaves Reading (11983) Commentary (15)

Previously suffering from the original Tengda router is too old, and the surrounding 2.4G WIFI environment is really bad. 50M's broadband and WIFI simply run dissatisfied, basically can only reach the speed of about 20M, sometimes even below 10M. This online experience is really painful. Notebook can use network cable. What about mobile phone? So I was prepared to start...

Technical course

Use of Cron plan tasks

Windward leaves Reading (2417) Commentary (3)

Cron is a timing execution tool under Linux. It can run jobs without manual intervention. It is the built-in service of Linux, so we will use it in many cases. First of all, of course, how to enable / disable the service / / start service sudo service cron start / stop service.

Case sharing

Share a very embarrassing case at work.

Windward leaves Reading (2470) Commentary (8)

It's embarrassing to share an embarrassing case. This is a real case, because the reasons for it are adapted. The first two weeks to a hospital to install two test equipment: a firewall, an Internet behavior management. The customer's network is the 10M line, and the firewall is deployed at the exit and gateway. Low join behavior management, bridge mode transparent part...

Technical course

Achieving the coexistence of Office 2016 and Visio 2016

Windward leaves Reading (4845) Commentary (1)

A few days ago, due to the need of work, I needed to draw a topology diagram of the weak intelligent system, so I was going to install a Visio. Then my obsessive-compulsive disorder was attacked. I went to MSDN I tell you to download the latest Visio 201664 bit version. After downloading, it is natural to mount the ISO image to install, but...

Technical course

WordPress gets the right visitor IP after using CDN.

Windward leaves Reading (2104) Commentary (6)

There will always be one reason or another that leads webmasters to use CDN. For example, the host bandwidth is small, or the performance is insufficient, DDoS, CC attack and so on. But Wordpress will have a problem after using CDN: you see visitors in the background, IP is CDN's IP. In addition to the inability to judge the address of tourists, this innocuous problem...

Technical course

Office 2016 install only the components you need.

Windward leaves Reading (5458) Commentary (4)

Before you start the tutorial, let's start with the reasons for this tutorial. I used to belong to the kind of WPS that was enough for people, and the WPS professional version was completely free of advertising, and the author was saved in 03 format, so basically did not encounter other incompatible problems. But since the WPS link in the Excel of a technical document of the manufacturer, pen...