When using the crawler made by webmagic to crawl the website data, we found that some pictures could not be crawled. After a comparison, it is found that all the pictures that cannot be crawled report the same error:
Encrypted HTTPS traffic flows through this CONNECT tunnel. HTTPS Decryption is enabled in Fiddler, s ...
Posted on Thu, 28 May 2020 08:25:15 -0700 by Tekime
Note the opening of port tcp/udp
Install dependent packages before installing coturn and janus
Certificate and turnserver user password need to be matched
Prepare the underlying environment, including server environment, address, certificate, firewall configuration, etc.</br>
Environment Preparation </ ...
Posted on Wed, 27 May 2020 19:53:39 -0700 by radhoo
Using HTTPS to visit our website can not only increase the security of our website, but also enhance the force of our website! I have some experience in building SSL service and CDN for the website, and I'd like to share with you here. I hope I can help you in this respect!!!
Step 1 purchase SSL certificate
Open alicloud > products and serv ...
Posted on Thu, 21 May 2020 09:30:30 -0700 by tofi84
Forget password, successful registration, etc. Send authentication code information or registration information to the user.
1. Verify that the mailbox has been registered;
Send verification code to mailbox;
3. Verify that the verification code is correct;
4. Reset the password;
I'm going ...
Posted on Wed, 20 May 2020 09:19:31 -0700 by nikes90
About let's encrypt and acme.sh
Let's Encrypt is a free, automated, and open Certificate Authority.
acme.sh implements acme protocol and can generate free certificate from let's encrypt
Installation, using acme.sh
curl https://get.acme.sh | sh
Generate ssl certificate
I use the webroot method. For ...
Posted on Mon, 04 May 2020 11:54:04 -0700 by carydean
Introduction to reptile
It's a friendly website for reptiles, but!
Now the login verification code is disgusting. You need to click the inverted text in the figure! This makes us a person who is not literate at all. So we use the method of replacing url parameter to login with a login verification code, which needs to be entered manua ...
Posted on Fri, 01 May 2020 09:36:52 -0700 by KyleVA
[root@centos6 httpd-2.4.29]#./configure --prefix=/app/httpd24 \
[root@centos6 httpd-2.4.29]#Make & ...
Posted on Wed, 29 Apr 2020 23:58:33 -0700 by oc1000
kubernetes cluster deployment
Three official deployment methods1.minikubeminikube is a tool that can run a single point of kubernetes quickly locally, only for testing K8S or daily developmentDeployment address: https://kubernetes.io/docs/setup/minkube/2.kubeadmKubeadm is also a tool that provides kubeadm init and kubeadm join for rapid deploy ...
Posted on Wed, 29 Apr 2020 08:35:02 -0700 by gauss
In actual production, we often need to do some monitoring scripts to monitor whether the website service or API service is available. The traditional method is to use the website monitoring platform (such as DNSPod monitoring, 360 website service monitoring, Alibaba cloud monitoring, etc.), whose principle is to set the service address to be mo ...
Posted on Tue, 21 Apr 2020 02:14:59 -0700 by l0ve2hat3
Last time I said it. Analysis of ActiveMQ authorized source code simpleAuthentication (1) Let's see how JAAS is doing this time. To use JAAS authentication first, JAAS authentication needs to be introduced into ActiveMQ.xml
Both users.properti ...
Posted on Sun, 19 Apr 2020 23:58:07 -0700 by Rongisnom