Explain the usage of OSPF overhead value in detail
Modification of OSPF overhead value, protocol priority and timer
1: Principle overview:
Because a variety of dynamic routing protocols may run on the router at the same time, there is a problem of routing information sharing and selection among various routing protocols. The system sets different default priori ...
Posted by hobojjr on Thu, 11 Nov 2021 05:54:00 +0100
How to Quickly Deploy Ceph Distributed High Availability Cluster in 2021-11-10
Basic concepts
Currently Ceph officially provides three ways to deploy Ceph clusters, ceph-deploy, cephadm, and manual installation
ceph-deploy
A cluster automation deployment tool, long-lasting, mature and stable, integrated by many automation tools for production deployment
cephadm
from Octopus Be ...
Posted by Jackount on Tue, 09 Nov 2021 18:34:45 +0100
Private Cloud Environments Installed in Notebooks: Network Storage (in)
This is the fourth in a series, so let's continue to talk about how to deploy a simplified private cloud environment in your notebook to meet low-cost, low-power, low-latency experimental environments.
In the first three articles, we talked about basic virtualization-related Pre-preparation And prepared to avoid blind touch during construction ...
Posted by Ted Striker on Tue, 09 Nov 2021 17:41:00 +0100
NIO three components
1. Channel
1.1 what is Channel
Channel is similar to Stream. It is a two-way channel for reading and writing data.You can read data from the channel into the buffer or write data from the buffer into the channel. (channel only deals with buffer)The previous stream is either input or output, and channel is lower than stream.
1.2 common channel ...
Posted by jabbaonthedais on Tue, 09 Nov 2021 04:58:10 +0100
Arrange several useful intranet penetration tools (plus tutorials)
0x00 Preface
From the perspective of penetration, this paper summarizes several commonly used personal intranet penetration and Intranet proxy tools, and introduces their simple principles and use methods.
0x01 nps-npc
1.1 Introduction
nps is a lightweight, high performance and powerful intranet penetration proxy server. At present, it s ...
Posted by JehovahsWord on Wed, 03 Nov 2021 17:20:46 +0100
On the principle of openstack network (openstack can't access the Internet?)
On Openstack network
This version is Stein version and adopts OVS network Test environment: 1 control node, 2 computing nodes
1, Network structure diagram
Borrow 2 online pictures Figure 1 👇: Figure 2 👇:
2, OVS analysis
As shown in Figure 2 vm1 represents an instance QBR XXX stands for Linux virtual bridge You can view it through ...
Posted by germanjulian on Wed, 03 Nov 2021 09:34:37 +0100
[Web security] php://filter Shallow bottom layer analysis
Create a new PHP file: a.php
<?php
$a = "a.txt";
include("php://filter/resource=" . $a);
Create a new file in the same directory: a.txt (the content is <? PHP phpinfo();? > base64 encoding)
PD9waHAgcGhwaW5mbygpOz8+
Next breakpoint in the related function of the corresponding file:
[data]
Post key codes:
php_stream * php_strea ...
Posted by homer.favenir on Tue, 02 Nov 2021 06:58:08 +0100
c/c + + tcp protocol communication based on liunx platform sends small demo by data segment
Introduction *: tcp is a protocol of network communication. For programmers, the protocol is to write a program according to the agreed protocol. For specific coding, compared with the previous demo of socket communication, socket communication will not use a new API, but add corresponding information to the header of the sent message according ...
Posted by willc on Mon, 01 Nov 2021 15:02:31 +0100
Firewall of security technology
1, Security technology and firewall
1.1 safety technology
Intrusion detection systems: it is characterized by not blocking any network access, quantifying and locating from internal and external networks The threat situation is mainly to provide alarm and post supervision, and provide targeted guidance measures and safety decision-making ...
Posted by DMeerholz on Mon, 01 Nov 2021 14:28:27 +0100
How to implement asynchronous connect
Students who have written network programs should all know the connect function. Before the socket starts reading and writing operations, it is necessary to connect, that is, the TCP three-time handshake. This process is completed in the connect function. The connect function itself is blocked. The asynchronous connect function can be realize ...
Posted by Skawn on Thu, 28 Oct 2021 04:38:04 +0200