Linux

UB、RH、LD、FB……

Brush OpenWRT router installation shadowsocks to use transparent proxy + DNS poisoning

Previous articleRouting introducedHow to open a double-wan bandwidth superimposed on OpenWRT,This is also the students brushOpenWRTThe most common requirement,Then,Is there any way to increase the way itTransparent Proxyfunctions?

Now that the router has to brush up on the third-party firmware OpenWRT,That certainly is a possible wireless。

Agent types

Today in our common species among agents,Most calendar[……]

Click link to continue reading...

rg100a use OpenWRT open multi-line multi-dial plus Mac address cloning

Some time ago a friend had pocketed someOpenWRTA series of tutorials,Told some OP advanced usage,Of course,In this regard, I would lose a slightly raised。but,Recent quarters because of poor network quality(Mainly no QoS annoying)So I dug out my box eating ash under therg100a-aa,What poor fellow had not the memory that,I was just poor 30M。

But not closed[……]

Click link to continue reading...

Long time no update Kali? GPG error KEYEXPIRED 1425567400

A long time did not update kali,Today, taking advantage of the updated virtual machine,We want to open the system with a new look,The results did not expect to encounter the problem of FIG.。

First, use the GUI to update occurred 404,Then use apt-get the error key expires。

Ok,At all events,This is not a conflict deb,Nor is the source could not be parsed,You need to do is update the key。

Use the following commands to a new[……]

Click link to continue reading...

Experience the official version of Deepin 2014.2

Last article we talked about fragmentedThe official version of Deepin 2014.2 virtual machine installation experience,Then there is the experience of reporting time,Because just installed,Talk about a feeling of it to get started,Then feel after long-term use of the route to see the situation reported good。

On the back said we just adjust the resolution,Then the system will pop-up update,Point to open a look,I found this

I opened the QQ try next,[……]

Click link to continue reading...

2014.2Deepin version of Virtual Machine Installation (is the depth of Linux)

I vaguely remember seven years ago began to chase the open source,At that time there Everest,There are red flags,There Kylin。Chinese felt the future is excellent Linux distribution,Myself have removed from the Linux-ren,Baidu Post Bar, Baidu know, and so a series of related Linux Forum,Fun virtually all mass market niche Linux distributions,Engage in a dual system,Multi-system all kinds of tricks ...... Unfortunately, ah Unfortunately,,In fact, no one[……]

Click link to continue reading...

networkmanager can not manage the network and prompt "unmanaged network devices."

Using the Linux desktop system time,Many of my friends will encounter network manager prompts "Device unmanaged" situation。

 

In this case, the network can access the Internet,But the network manager - general nature is hard to force the Network Manager,But life and death does not display state。

In fact,at this time,The system uses another set of network management scheme,And this program[……]

Click link to continue reading...

Iptabls details

Currently on the market more common 3、4Layer firewalls,Called the network layer firewalls,There Layer 7 firewall,In fact, the gateway proxy layer

forTCP/IPofSeven-layer modelSpeaking,The third layer is the network layer,Three-layer firewall in this layer of the source and destination addresses for testing。But for the seven firewalls,Whether you source port or destination port,What is the source or destination address,We will have to check all your stuff。[……]

Click link to continue reading...

unix / linux programming study notes- Open file descriptors and function

To talk about unix / linux for file operations in these functions,These functions for linux basically meet our requirements in any document,
First talk about the open function
In linux you want to operate on the file must first open the file and then the corresponding processing,Why should we do it? That is because the process and not directly manipulate files between,To process the document operation[……]

Click link to continue reading...