Article directory 1 Introduction 2. Related introduction 2.1 Brief description 2.2 Principle 2.3 Advantages 2.4 Application 3. WIZnet Ethernet chip 4. Host computer search and configuration test 4.1 Program flow chart 4.2 Test preparation 4.3 Connection method 4.4 Related code 4.5 Test phenomena 5. Precautions 6. Related links 1. Preface In the field of automation […]
Tag: host
linux soft AP–hostapd+dhcpd
linux soft AP-hostapd + dhcpd May 08, 2018 ? Comprehensive ? 4908 words in total ? Font size Small Medium Large ? Comments are closed With the increase in wireless devices such as mobile phones and laptops, the company’s three home wireless routers have been overwhelmed, and some people always say they can’t connect. Who […]
HTTP and HTTPS website Linux environment host configuration examples
Table of Contents Foreword: 1. Based on the domain name www.openlab.com, you can access the website and the content is welcome to openlab! ! ! analyze: Related configuration: 2. Create three website directories for the company to display student information, teaching materials and payment websites respectively. Based on www.openlab.com/student website to access student information, www.openlab.com/data […]
Install redis-cluster three hosts and six instances
1. Prepare the environment: three clean virtual machines and turn off the firewall and selinux 192.168.46.129 redis-1 7001 7002 192.168.46.132 redis-2 7003 7004 192.168.46.135 redis-3 7005 7006 2. Install redis Use the script installation given above or other installation methods. Please change the script installation to the available yum source. 3. Configure different nodes and […]
[Nmap] Nmap detects the open status of the target host port
Nmap detects the target host port open status nmap 192.168.73.139 (host port scan) nmap -p 80 192.168.73.139 (host port 80 scan) nmap -p 80,443 192.168.73.139 (scanning ports 80 and 443) nmap -p 80-443 192.168.73.139 (scan port 80-443) nmap -p 1-65535 192.168.73.139 (full port scan) nmap -sU -p U:445 192.168.73.139 (scan the Udp protocol of 445) […]
Android 13 GTS GtsPermissionControllerHostTestCases Test Failed
Android13 tablet project test GtsPermissionControllerHostTestCases Failed, the failure log is as follows: java.lang.AssertionError: on-device tests failed: com.android.gts.permissioncontroller.PermissionControllerTest29#testGranted: java.lang.NullPointerException: Attempt to invoke virtual method ‘boolean androidx.test.uiautomator.UiObject2.isChecked()’ on a null object reference at com.android.gts.permissioncontroller.BasePermissionsTest.setPermissionGrantState(BasePermissionsTest.java:527) at com.android.gts.permissioncontroller.BasePermissionsTest.setPermissionGrantState(BasePermissionsTest.java:502) at com.android.gts.permissioncontroller.BasePermissionsTest.grantPermissions(BasePermissionsTest.java:393) at com.android.gts.permissioncontroller.BasePermissionsTest.grantPermission(BasePermissionsTest.java:389) at com.android.gts.permissioncontroller.PermissionControllerTest29.testGranted(PermissionControllerTest29.java:103) at android.permissioncontroller.gts.Utils.runDeviceTests(Utils.java:130) at android.permissioncontroller.gts.Utils.runDeviceTests(Utils.java:80) at android.permissioncontroller.gts.Utils.runDeviceTestsAsCurrentUser(Utils.java:44) at android.permissioncontroller.gts.PermissionControllerHostTest.testGrantAppPermissionFragment(PermissionControllerHostTest.java:229) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) […]
Prometheus+Node_exporter+Grafana implements monitoring host
Prometheus + Node_exporter + Grafana implement monitoring host If there is no installation-related configuration, you must first install and configure it. The environment is based on Linux. The relevant environment configuration of the virtual machine is given at the end of the article. Now we will explain the installation and use of Prometheus + Node_exporter […]
DLL hijacking & CS online host
DLL hijacking What is a DLL file Baidu Encyclopedia: The full name of DLL is Dynamic Link Library, which is called “dynamic link file” in Chinese. In the Windows operating system, DLL is very important for program execution, because when the program is executed, it must be linked to the DLL file in order to […]
Dual network port host installs openwrt through docker to implement routing
Since I have been using docker for a long time to install some services, and pve, which is a virtualization solution with qemu as the bottom layer, I felt that I couldn’t bear it, so I spent 2 days and fiddled with a lot of things, and finally got it done. Share it to prevent […]
The Linux host realizes password-free login between two hosts based on the ssh protocol.
Table of Contents 1. ssh protocol 1.SSH protocol 2. Working process of SSH protocol (1) The first stage: TCP three-way handshake version negotiation stage: (2) The second stage: Negotiation algorithm and determination of symmetric secret key stage (3) The third stage: certification stage: (4) The fourth stage: session request stage: (5) The fifth stage: interactive […]