Use Nodejs to build a simple HTTP server – intranet penetration public network remote access

Article directory foreword 1. Install the Node.js environment 2. Create a node.js service 3. Access node.js service 4. Intranet penetration 4.1 Install and configure cpolar intranet penetration 4.2 Create a tunnel to map a local port 5. Fixed public network address Reprinted from the article of cpolar Intranet Penetration: Using Nodejs to build HTTP services […]

Linux installs MongoDB database and accesses it remotely through intranet penetration

A few days ago, I found a giant artificial intelligence learning website. It is easy to understand and humorous. I can’t help but share it with you. Click to jump to the website: https://www.captainai.net/dongkelun Article directory foreword 1. Configure Mongodb source 2. Install the MongoDB database 3. LAN connection test 4. Install cpolar intranet penetration […]

Alipay SDK interface debugging – cpolar intranet penetration tool realizes public network address debugging

Article directory 1. Test environment 2. Local configuration 3. Intranet penetration 3.1 Download and install cpolar intranet penetration 3.2 Create a tunnel 4. Test public network access 5. Configure a fixed second-level subdomain name 5.1 Reserve a second-level subdomain 5.2 Configure the second-level subdomain name 6. Use a fixed second-level subdomain name for access Reposted […]

[Remote access] Linux builds an SVN server, and achieves remote access to the public network through intranet penetration

Article directory foreword 1. Install SVN service on Ubuntu 2. Modify the configuration file 2.1 Modify the svnserve.conf file 2.2 Modify the passwd file 2.3 Modify the authz file 3. Start the svn service 4. Intranet penetration 4.1 Install cpolar intranet penetration 4.2 Create a tunnel to map a local port 5. Test public network […]

Linux service uses the Pagoda panel to build a website and publish public network access – intranet penetration

Article directory foreword 1. Environment installation 2. Install cpolar intranet penetration 3. Intranet penetration 4. Fixed http address 5. Configure the second-level subdomain 6. Create a test page Reprinted from the article of remote intranet penetration: Linux uses the pagoda panel to build a website, and intranet penetration to achieve public network access Foreword As […]

Use waste, use your old computer to build a server! Nginx configuration and Feige intranet penetration use

Original address: https://mp.weixin.qq.com/s/2fz4AjbVQwmt7ydRVpZ_0w Use waste, use your old computer to build a server! Recently, I always want to build my own website, but my wallet is empty, and I can’t afford to rent a server, let alone a domain name. So I wondered if I could build a server by myself without paying? Really good! […]

Private GitLab warehouse – build GitLab private code warehouse locally and remotely access “intranet penetration” at any time

Article directory foreword 1. Download Gitlab 2. Install GitLab 3. Start Gitlab 4. Install cpolar intranet penetration 5. Create a tunnel configuration access address 6. Fixed GitLab access address 6.1 Reserved second-level subdomains 6.2 Configure the second-level subdomain name 7. Test access to the second-level subdomain Reproduced from the remote control source article: Linux builds […]

UDP hole punching, intranet penetration (with JAVA code)

Directory 1. Introduction to Intranet Penetration 1.1 The relationship between public network IP ports, NAT forwarding, and private network IP ports 1.2 Principles of NAT forwarding and UDP hole punching 1.3 Core code 1. Introduction to Intranet Penetration I don’t like to talk about some academic terms in a long way, and I am confused […]

[Python] Quickly and easily build an HTTP server and access “cpolar intranet penetration” from the public network

Article directory 1 Introduction 2. Build a local http server 2.1.Python installation and setup 2.2.Python server setup and testing 3. Installation and registration of cpolar 3.1 Cpolar cloud settings 3.2 Cpolar Local Settings 4. Public network access test 5 Conclusion Reprinted from the article of remote intranet penetration: [Python] Quickly and easily build an HTTP […]