Git super concise manual

Git super concise manual, is a complete cover from the GIT server to use the complete reference manual. A book in hand, GIT worry free! ...
Read(164) comments(0)

The simplest way to achieve cross domain -- using nginx reverse proxy

Cross domain, refers to the browser can not perform other web site scripting. It is caused by the browser's homologous strategy, is the browser to JavaScript application security restrictions. Now with the popularity of RESTFUL, a lot of applications to provide API interface http/https, through the xml/json format to provide services to achieve an open architecture. Web applications are also in the direction of the development of a single page. More and more web applications are now the architecture: Static single web page Ajax call RESTFUL services We can take advantage of the various sites provided by the API, to make a lot of wonderful Web applications. However, cross domain restrictions for browsers to execute javascript,...
Read(1009) comments(2)

Two design techniques of relational database table structure

When designing a relational database table, you need to add a ID field (a self increasing field, or a UUID field) and a version field (numeric type). The ID field as a physical primary key, used to ensure that the records can not be repeated and used as a foreign key. The version field is used to achieve optimistic locks, providing better performance than pessimistic locks. Especially for UI display and may appear concurrent updates of data, but also need to use optimistic lock to improve database access performance. For tasks that are automatically updated in the background, you can use optimistic locks to achieve. But the automatic concession in conflict. You can also use pessimistic locks on the database to line up the transaction to resolve the update conflict. For not close...
Read(746) comments(0)

Programming capability hierarchy model

Programmer's programming skills with the accumulation of experience, will gradually increase. I think the programming ability can be divided into several levels. The discussion of the following two dimensions to expand the programming capability hierarchy model. One dimension is the level of programming skills, and the other is the level of domain knowledge. ...... Some programmers may have the energy spent on improving programming skills, knowledge of the field is very little, this is actually very harmful in the daily work. Some needs may already have ready, open source free solutions, or just a combination of several existing software can quickly get, and they have to spend a lot of time to develop their own. In addition, the lack of domain knowledge, in the process of unexpected situation occurs, it is difficult to quickly locate the root causes of the problem, it is difficult to solve the problem bug. ...
Read(4992) comments(5)

Recent advances in physics and Astronomy

Sci-fi blockbuster "star crossed" is aggressively. As a often see the youth of popular science books, here report to you look nearly a few years the latest advances in physics and astronomy. Because I am white of physics and astronomy, this paper will have a lot of mistakes, please forgive me. This paper mainly introduces the latest discovery of the cosmic age, the cosmic radius, the multiple universe, the ultimate fate of the universe. ...
Read(2449) comments(0)

Modify, re generate and install the SRPM source package

RHEL/CentOS/Fedora/Suse and other Linux distributions are using RPM package as a package format. In addition there is a relevant format SRPM package (suffix is.Src.rpm), which contains the source code, you can use it to re generate the rpm package. If the RPM package has a problem, we can go to the http://ftp.redhat.com/redhat/linux/enterprise/6Server/en/os/SRPMS/ download the corresponding src.rpm package, and then unlock it to modify the source code, re compile and generate RPM package, for distribution and installation. This article explains how to modify, re generate and install the SRPM source package. ...
Read(4042) comments(0)

Communication between QEMU virtual machine and external network

First, the basic concept in order to make the virtual machine can communicate with the outside world, Qemu needs to provide network equipment for the virtual machine. Qemu support of the commonly used network cards, including rtl8139, NE2000, pcnet32, etc.. The command line uses NIC -net to create a virtual machine network card for the virtual machine. For example, QEMU command line options -net NIC, model=pcnet said add a pcnet - Ethernet cards for the virtual machine. If the model parameter is omitted, the QEMU will be silent...
Read(2144) comments(0)

Git commonly used commands memo

From http://robbinfan.com/blog/34/git-common-commandGit git config --global user.name configuration robbin" Config --global user.email fankai@gmail.com "git" Config --global color.ui true Git Config --glo git...
Read(2138) comments(0)

Method for porting QT4 project to QT5 project

QT4 project in the QT5 open, often report some inexplicable wonderful error. QLabel, QApplication, QPushButton and other commonly used header files are reported to find. See the installation directory to QT, there is. This is how to return a responsibility? Originally, QT5 in many common QT header files have been moved to the core GUI widgets module to. In QT5, the.Pro file need to add an extra line: QT = core GUI widge...
Read(6278) comments(7)

Implementation of local string processing functions for processing spaces

Implementation of local string processing functions for processing spaces...
Read(2144) comments(0)

A simple method to convert a physical machine to a virtual machine

A simple method to convert physical machines into virtual machines...
Read(8107) comments(0)

Build your own Debian software package warehouse

The Debian package format by http://prog3.com/sbdm/blog/shendl DEB, the file extension for a. DEB, like the naming of Debian, Deb is due to DebraMurdock (Debian IanMurdock, founder of the ex-wife and named. Debian package is a standard Unixar file, the package file information and the contents of the package, after gzip and tar packaged together. Package to deal with these classic history...
Read(3143) comments(0)

Python how to get the absolute path of the resource file

There are two kinds of paths, relative paths and absolute paths. For Unix-Like system, the path is the absolute path to the beginning of the /. Relative path is not in / at the beginning. Is actually only a path in the operating system, that is the absolute path. Relative path, we modify the program just to help their absolute paths. The program is running operating system using environment variables, as we put the relative path into the absolute path. Getcwd () function to get the current working path of the current process. That is relative...
Read(7749) comments(1)

On the Linux with the DD command to achieve ghost function

Ghost and G4L installed operating system, the speed is too slow, the whole process is too tedious. Installation process, the need to answer several questions, the system needs to install numerous software, created and written numerous documents. Because it involves a large number of file location and read and write, speed must be fast. Windows we often use ghost to backup and burn operating system. Ghost can clone the entire system image, and then the new computer on the recovery, quite simple. With ghost...
Read(31539) comments(17)

Linux application firewall Zhuji

The iptables command line, known as Linux, is used as the Netfilter's built-in host firewall, which can use the iptables command to process the IPv4 protocol, and can also use the ip6tables command to process the IPv6 protocol. Before iptables, Linux 2.2 uses ipchains to configure the firewall, Linux 2 is used in ipfwadm, which is based on the ipfw BSD commands to achieve. The following command is executed on the 6.x RHEL, but is also applicable to other Linux distributions...
Read(1860) comments(0)
235 data a total of 16 pagesOne Two Three Four Five ... The Library Shadowe
    personal data
    • Visit1286405 times
    • Integral:Fourteen thousand six hundred and forty-five
    • Grade
    • Rank:376th name
    • Original183
    • Reproduced:47
    • Translation:4
    • Comments:1772 article
    Reference resources
    Latest comments