Packet Tracer 5.0 6.0 mutiuser multiplayer Internet Guide

Packet Tracer is an auxiliary company published by Ciscolearning tools,Learning courses for beginners to Cisco network design、Configuration、excludeNetwork failureProviding network simulation environment。Users cansoftwaretargetGraphical User InterfaceUse drag method to establish directNetwork topology,And provide detailed process data packets traveling in the network,Real-time observation of network operation。You can learn IOS configuration、Exercise troubleshooting capability。softwareAlso comes with more than four semesters have established a good demo environment、Challenging task,The latest version is Packet T[……]

Click link to continue reading...

A simple example Cisco routers DHCP and DHCP relay configuration

Today came across configurationDHCP relayThe problem,Suddenly I found that I had actually not noticed,Even sometimes do not know how to engage,And later I had to Google it very awkward ......,Now recorded as follows:

I was not on the map topology,Simple words to describe:

R1(f0/1)————-(f0/1)R2(f0/0)——S1——PC0

192.168.1.0/24 172.16.0.0/16

For convenience,I'll do[……]

Click link to continue reading...

Pocketed replaced rss address,Please resubscribe friends!

In order to better manage statistics and blog subscriptions,Off the grid to replace the rss subscription address

due toFlying HandsThis oneDomestic pitIt is people helpless,So back to the route or replace native Feed。

Other,Still full subscription。

Subscription address is

www.logcg.com/feed

And used as a plug-in to subscribe to blog statistics,This plug-in is calledMy Feed StatsTap to view the article description。

The following is a brief introduction to this widget

This Wordpress plugin statistics[……]

Click link to continue reading...

Linux Redhat Xen Virtualization study notes

This is before the time of learning 5.8xen virtualizationThe study notes

Although always feltxenBut fast become a zombieVirtualizationThis aspect is undeniable his powerful

especiallyredhat6CancelledxenxenGiving a feeling to be eliminated but canceled support for xen in my opinion it would be unwise

Or talkxenThe other pull much hurt the body

First, create a file,I was hard enough because I of course you can also use lvm directly under the root directory created

[crayon-6745b6298b[……]

Click link to continue reading...

Wordpress theme how to adjust the default font size

2013November 4 New ......

Find style.css file,Edit this paragraph wherein the bottom

among themtitle aHere's edgeheightHome blog can adjust the height of the name,SuchThe name will not get together and dividing linesLa!

...... Updated,The following is the original -

The blog theme is being used off the grid I think we are not familiar hehe

Quite good looking

but,The default font is really little people catch chicken -word[……]

Click link to continue reading...

The method of manually generating yum repository Redhat6

In Redhat6 future systems will exist yum repositoryYum database manually generatedThis issue

And several previous versions of the database are automatically generated

May be mirrored with redhat6 about it .xml files and package files are not in a place that no detailed research to explore next time

First determine yum of these packages have been fitted

There areyum yum-updatesd yum-security yum-metadata-parser yum-rhh-plu[……]

Click link to continue reading...

superrecovery cracked version - from the network,Only for backup,Please support genuine!

This may be the only one superrecovery cracked version ......
Younger sister U disk data recovery can not be restored with easyrecovry,Although it is strange,At least she tried to get,So also be a backup ...... ah,that's it……………………
This software download fromHeretarget
I do a backup,I can also be downloaded from here or fromHuawei network diskDownload。

Download now original package virus,In any case I can not break this strange ......

So attach a usable er emergency use it ............。

Easy[……]

Click link to continue reading...

Prohibit running cmd on computer solutions

I wrote this beforeFrom the "crack field pole electronic classroom" experience in mindandHow easy it is to mention the right to limit the authority of the computer? These two articles,Inside it is mentioned for the cmd disable computer problems。

So I try to do with a bat batch mode command,But sometimes just in a hurry to run some command cmd,So for a limited computer cmd really annoying,then,I found a way,With bat batch to simulate a cmd window execute the command。:)

It is used inside a batch of common commands,You can copy the commands one by one[……]

Click link to continue reading...