<rt id="bn8ez"></rt>
<label id="bn8ez"></label>

  • <span id="bn8ez"></span>

    <label id="bn8ez"><meter id="bn8ez"></meter></label>

    隨筆-124  評論-194  文章-0  trackbacks-0
      2012年9月27日
         摘要: 做為程序員,從感性角度講評一下7年里我使用過的9款機械鍵盤,確實更有特色,這種特殊的觸聽體驗非常美妙!  閱讀全文
    posted @ 2021-03-30 15:45 我愛佳娃 閱讀(398) | 評論 (0)編輯 收藏
    搬了個家,想通過A410點播imac上下載的電影,通過系統自帶共享samba怎么都不成功。

    想到是13年買的A410,應該升級一下,可官網都沒了,最后搜索到這個16年的最新固件:
    https://drivers.softpedia.com/get/DVD-BluRay-Media-Players/Cloud-Media/Cloud-Media-Popcorn-Hour-A-410-Media-Player-Firmware-050816061625POP425802.shtml
    通過USB順利更新了一把。

    再查看mac可以開nfs,方法如下:

    sudo vi /etc/exports
    加入:

    / -sec=sys

     

    /Users /Users/popeye /Users/popeye/movies -ro -mapall=popeye:staff -alldirs

    檢查配置:

    sudo nfsd checkexports


    重啟:

    sudo nfsd restart

    這里要注意movies目錄是我重新建立的755權限,不要用系統原來的目錄,不然總是訪問不了。

    再到A410里網絡瀏覽里就能找到了。





    posted @ 2020-01-19 21:43 我愛佳娃 閱讀(702) | 評論 (0)編輯 收藏
    http://mathias-kettner.de/checkmk_livestatus.html下載并解壓最新的包:
    check_mk-1.2.1i3.tar.gz

    再解壓其中的到livestatus目錄:
    livestatus.tar.gz

    進入:livestatus/src

    再:make clean livestatus.o

    會發現一堆錯誤,根據編譯NDO的選項:
    ndoutils-1.4b7/src:
    make clean ndomod-3x.o gcc -fno-common -g -O2 -DHAVE_CONFIG_H -D BUILD_NAGIOS_3X -o ndomod-3x.o ndomod.c io.o utils.o -bundle -flat_namespace -undefined suppress -lz

    在最后的編譯選項里添上:
    -flat_namespace -undefined suppress -lz

    就可以編譯出: livestatus.o



    --------------------------
    livecheck編不過,報找不到n_short:
    ip_icmp.h:92: error: expected specifier-qualifier-list before ‘n_short’

    vi ./check_icmp.c 
    把這個調整到INCLUDE序列的最后即可:
    #include "/usr/include/netinet/ip_icmp.h"
    posted @ 2012-12-21 07:00 我愛佳娃 閱讀(1556) | 評論 (0)編輯 收藏
         摘要:

    場景

    想要用到的場景:用戶訪問WEB服務,WEB訪問非WEB服務1,服務1又再訪問2、3,合并計算后,把數據返回給WEB及前端用戶。想讓訪問鏈上的所有服務都能得到認證和鑒權,認為本次請求確實是來自用戶的。所以想到用CAS,讓用戶在一點登錄,所有服務都到此處認證和鑒權。

      閱讀全文

    posted @ 2012-12-01 10:43 我愛佳娃 閱讀(9803) | 評論 (3)編輯 收藏

    Setting Up SSL on Tomcat in 5 minutes (https://localhost:8443)

    June 30, 2011 | By 

    This tutorial will walk you through how to configure SSL (https://localhost:8443 access) on Tomcat in 5 minutes.

    apache tomcat Setting Up SSL on Tomcat in 5 minutes (https://localhost:8443)

    For this tutorial you will need:

    • Java SDK (used version 6 for this tutorial)
    • Tomcat (used version 7 for this tutorial)

    The set up consists in 3 basic steps:

    1. Create a keystore file using Java
    2. Configure Tomcat to use the keystore
    3. Test it
    4. (Bonus ) Configure your app to work with SSL (access through https://localhost:8443/yourApp)

    1 – Creating a Keystore file using Java

    Fisrt, open the terminal on your computer and type:

    Windows:

    cd %JAVA_HOME%/bin 

    Linux or Mac OS:

    cd $JAVA_HOME/bin 

    The $JAVA_HOME on Mac is located on “/System/Library/Frameworks/JavaVM.framework/Versions/{your java version}/Home/

    You will change the current directory to the directory Java is installed on your computer. Inside the Java Home directory, cd to the bin folder. Inside the bin folder there is a file named keytool. This guy is responsible for generating the keystore file for us.

    Next, type on the terminal:

    keytool -genkey -alias tomcat -keyalg RSA 

    When you type the command above, it will ask you some questions. First, it will ask you to create a password (My password is “password“):

    loiane:bin loiane$ keytool -genkey -alias tomcat -keyalg RSA Enter keystore password:  password Re-enter new password: password What is your first and last name?   [Unknown]:  Loiane Groner What is the name of your organizational unit?   [Unknown]:  home What is the name of your organization?   [Unknown]:  home What is the name of your City or Locality?   [Unknown]:  Sao Paulo What is the name of your State or Province?   [Unknown]:  SP What is the two-letter country code for this unit?   [Unknown]:  BR Is CN=Loiane Groner, OU=home, O=home, L=Sao Paulo, ST=SP, C=BR correct?   [no]:  yes  Enter key password for 	(RETURN if same as keystore password):  password Re-enter new password: password 

    It will create a .keystore file on your user home directory. On Windows, it will be on: C:\Documents and Settings\[username]; on Mac it will be on /Users/[username] and on Linux will be on /home/[username].

    2 – Configuring Tomcat for using the keystore file – SSL config

    Open your Tomcat installation directory and open the conf folder. Inside this folder, you will find the server.xml file. Open it.

    Find the following declaration:

    <!-- <Connector port="8443" protocol="HTTP/1.1" SSLEnabled="true"     maxThreads="150" scheme="https" secure="true"     clientAuth="false" sslProtocol="TLS" /> --> 

    Uncomment it and modify it to look like the following:

    Connector SSLEnabled="true" acceptCount="100" clientAuth="false"     disableUploadTimeout="true" enableLookups="false" maxThreads="25"     port="8443" keystoreFile="/Users/loiane/.keystore" keystorePass="password"     protocol="org.apache.coyote.http11.Http11NioProtocol" scheme="https"     secure="true" sslProtocol="TLS" /> 

    Note we add the keystoreFilekeystorePass and changed the protocol declarations.

    3 – Let’s test it!

    Start tomcat service and try to access https://localhost:8443. You will see Tomcat’s local home page.

    Note if you try to access the default 8080 port it will be working too: http://localhost:8080

    4 – BONUS - Configuring your app to work with SSL (access through https://localhost:8443/yourApp)

    To force your web application to work with SSL, you simply need to add the following code to your web.xml file (before web-app tag ends):

    <security-constraint> 	<web-resource-collection> 		<web-resource-name>securedapp</web-resource-name> 		<url-pattern>/*</url-pattern> 	</web-resource-collection> 	<user-data-constraint> 		<transport-guarantee>CONFIDENTIAL</transport-guarantee> 	</user-data-constraint> </security-constraint> 

    The url pattern is set to /* so any page/resource from your application is secure (it can be only accessed with https). The transport-guarantee tag is set to CONFIDENTIAL to make sure your app will work on SSL.

    If you want to turn off the SSL, you don’t need to delete the code above from web.xml, simply changeCONFIDENTIAL to NONE.

    Referencehttp://tomcat.apache.org/tomcat-7.0-doc/ssl-howto.html (this tutorial is a little confusing, that is why I decided to write another one my own).

    Happy Coding!

    posted @ 2012-11-12 23:17 我愛佳娃 閱讀(3179) | 評論 (0)編輯 收藏
    EXTJS和D3都很強大,不解釋了,把D3繪的圖直接放到一個EXT的TAB里,直接上圖上代碼:


    代碼中的D3例子來自:
    https://github.com/mbostock/d3/wiki/Force-Layout
    可用于繪制拓撲結構圖.
    Ext.define('EB.view.content.SingleView', {
        extend : 'Ext.panel.Panel',
        alias : 'widget.singleview',

        layout : 'fit',

        title : 'single view',

        initComponent : function() {
            this.callParent(arguments);
        },

        onRender : function() {
            var me = this;

            me.doc = Ext.getDoc();
            me.callParent(arguments);

            me.drawMap();
        },

        drawMap : function() {
            var width = 960, height = 500

            var target = d3.select("#" + this.id+"-body");

            var svg = target.append("svg").attr("width", width).attr("height",
                    height);

            var force = d3.layout.force().gravity(.05).distance(100).charge(-100)
                    .size([width, height]);

                    // get from: https://github.com/mbostock/d3/wiki/Force-Layout
                    
    // example: force-directed images and labels
            d3.json("graph.json", function(json) {
                force.nodes(json.nodes).links(json.links).start();

                var link = svg.selectAll(".link").data(json.links).enter()
                        .append("line").attr("class", "link");

                var node = svg.selectAll(".node").data(json.nodes).enter()
                        .append("g").attr("class", "node").call(force.drag);

                node.append("image").attr("xlink:href",
                        "https://github.com/favicon.ico").attr("x", -8).attr("y",
                        -8).attr("width", 16).attr("height", 16);

                node.append("text").attr("dx", 12).attr("dy", ".35em").text(
                        function(d) {
                            return d.name
                        });

                force.on("tick", function() {
                            link.attr("x1", function(d) {
                                        return d.source.x;
                                    }).attr("y1", function(d) {
                                        return d.source.y;
                                    }).attr("x2", function(d) {
                                        return d.target.x;
                                    }).attr("y2", function(d) {
                                        return d.target.y;
                                    });

                            node.attr("transform", function(d) {
                                        return "translate(" + d.x + "," + d.y + ")";
                                    });
                        });
            });
        }

    });
    posted @ 2012-09-27 07:38 我愛佳娃 閱讀(4475) | 評論 (0)編輯 收藏
    主站蜘蛛池模板: 日韩一区二区a片免费观看| 成人无码精品1区2区3区免费看| 久久成人a毛片免费观看网站| 亚洲欧洲日产国码无码久久99 | 久久久久亚洲AV成人网人人网站 | 亚洲国产高清视频| 99久热只有精品视频免费看 | 亚州**色毛片免费观看| 国产偷国产偷亚洲高清日韩| 国产精品1024在线永久免费| 国产精品亚洲成在人线| 国产午夜精品久久久久免费视| 亚洲成人精品久久| 又粗又大又黑又长的免费视频| 日韩亚洲产在线观看| 国产一级做a爱免费视频| a毛片成人免费全部播放| 久久国产精品亚洲综合| 免费黄色福利视频| 亚洲6080yy久久无码产自国产| 亚洲麻豆精品国偷自产在线91| 日韩免费电影网站| 亚洲免费福利在线视频| 国产一级淫片a免费播放口之 | 久久精品国产96精品亚洲 | **毛片免费观看久久精品| 亚洲 日韩 色 图网站| 亚洲欧洲日产国码一级毛片| 国产精品免费看久久久| 自拍偷区亚洲国内自拍| 亚洲一区二区三区AV无码| 亚洲香蕉免费有线视频| 国产精品亚洲综合一区在线观看| 久久精品国产精品亚洲精品| 免费国产作爱视频网站| 一级午夜a毛片免费视频| 亚洲欧洲日产v特级毛片| 亚洲国产精品丝袜在线观看| 99热在线免费播放| 一级毛片大全免费播放| 亚洲国产中文在线视频|