Packet Tracer is an auxiliary company published by Ciscolearning tools,Learning courses for beginners to Cisco network design、Configuration、excludeNetwork failureProviding network simulation environment。Users cansoftwareofGraphical User InterfaceUse drag method to establish directNetwork topology,And provide detailed process data packets traveling in the network,Real-time observation of network operation。You can learn IOS configuration、Exercise troubleshooting capability。softwareAlso comes with more than four semesters have established a good demo environment、Challenging task,The latest version is Packet T[……]
Today came across configurationDHCP relayThe problem,Suddenly I found that I had actually not noticed,Even sometimes do not know how to engage,And later I had to Google it very awkward ......,Now recorded as follows:
I was not on the map topology,Simple words to describe:
R1(f0/1)————-(f0/1)R2(f0/0)——S1——PC0
192.168.1.0/24 172.16.0.0/16
For convenience,I'll do[……]
In order to better manage statistics and blog subscriptions,Off the grid to replace the rss subscription address
due toFlying HandsThis oneDomestic pitIt is people helpless,So back to the route or replace native Feed。
Other,Still full subscription。
Subscription address is
www.logcg.com/feed
And used as a plug-in to subscribe to blog statistics,This plug-in is calledMy Feed StatsTap to view the article description。
The following is a brief introduction to this widget
This Wordpress plugin statistics[……]
This is before the time of learning 5.8xen virtualizationThe study notes
Although always feltxenBut fast become a zombieVirtualizationThis aspect is undeniable his powerful
especiallyredhat6Cancelledxen,xenGiving a feeling to be eliminated but canceled support for xen in my opinion it would be unwise
Or talkxenThe other pull much hurt the body
First, create a file,I was hard enough because I of course you can also use lvm directly under the root directory created
[crayon-69480a21e5[……]
2013November 4 New ......
Find style.css file,Edit this paragraph wherein the bottom
|
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 |
/* header START */ #header { background:url(img/header.jpg) 0 0 no-repeat; height:90px; border-bottom:1px solid #A6A6A6; overflow:hidden; } #caption { padding:25px 30px 0; } #title a { text-decoration:none; color:#FFF; height:40px; display:block; font-family:"Trajan Pro"; letter-spacing:0; } |
among themtitle aHere's edgeheightHome blog can adjust the height of the name,SuchThe name will not get together and dividing linesLa!
...... Updated,The following is the original -
The blog theme is being used off the grid I think we are not familiar hehe
Quite good looking
but,The default font is really little people catch chicken -word[……]
In Redhat6 future systems will exist yum repositoryYum database manually generatedThis issue
And several previous versions of the database are automatically generated
May be mirrored with redhat6 about it .xml files and package files are not in a place that no detailed research to explore next time
First determine yum of these packages have been fitted
There areyum yum-updatesd yum-security yum-metadata-parser yum-rhh-plu[……]
This may be the only one superrecovery cracked version ......
Younger sister U disk data recovery can not be restored with easyrecovry,Although it is strange,At least she tried to get,So also be a backup ...... ah,that's it……………………
This software download fromHereof
I do a backup,I can also be downloaded from here or fromHuawei network diskDownload。
Download now original package virus,In any case I can not break this strange ......
So attach a usable er emergency use it ............。
I wrote this beforeFrom the "crack field pole electronic classroom" experience in mindandHow easy it is to mention the right to limit the authority of the computer? These two articles,Inside it is mentioned for the cmd disable computer problems。
So I try to do with a bat batch mode command,But sometimes just in a hurry to run some command cmd,So for a limited computer cmd really annoying,then,I found a way,With bat batch to simulate a cmd window execute the command。:)
It is used inside a batch of common commands,You can copy the commands one by one[……]
- Use Apple ID to reset user account password
- Use OS X CD-ROM disk to reset a user U or account password
- Create a new administrator account to change the existing user account password
- Recovery mode terminal change the user account password
All contents of this article fromHere,Reprinted done only for backup purposes。
Use Apple ID to reset user account password
As red box,This must be checked,Or you can not use Apple ID password reset。(If you have not checked not remember,Then at least you have to remember the first[……]
I was solved:
Previous article discussed,On the use in some schoolsVarious student classroom management software crack As well as inside the classroom for the very domain of electronic break,Inside the guide describes some of the methods。
But inside a little:
I said:"The change of name Registry Editor,Then you can double-click to open "This is one of the cases,There is also a group policy is to limit what out of,So even if you change your name,Copy it to no avail,Open the policy or say whatDisabled by administrator。
A few days ago suddenly to the interest,In class when a simple experiment a bit,In fact,still is[……]
Our classrooms are the control and management of polar domain of electronic classrooms,Sometimes really very depressed people。
On a lesson,Because I'm learning progress slightly faster,And Network Academy upgrade,So I do alone open question,In order to take a number and quickly receive the discount CCNA。School teacher in lecture,I need to open the hospital network with your computer (Suman we understand) then log in to the teacher to help open question,The key is this teacher may like to use the screen to broadcast lectures,This broadcast is what I naturally do not do the。Then asked the teacher to cancel broadcasting on my computer,The results of teacher training and preparation I am very chic sentence:Do it yourself[……]
Latest update:Method Two Method Threeallunavailable!!!! The only way out of a tested so that ~
—————————(=。= It is not a test of a little late ah ......)
In a recent study CCNA routing Well,To practice what deployment routes,The first problem encountered is actually get rid of the password on the route ......
This simple,Minutes to get points,But the middle of the process caused by thinking routing:Because the practice is used in computer room,Get well,But the route they used a Mac,Ma[……]
Lenovo's mobile phone today to help students Brush,Experience the following problems:
Third-party INF does not contain digital signature information
Because the phone requires the use of windows Brush Well,And I only win8 virtual machine,Just install the driver win7 drivers,Installation of giving rise to a problem。
Via the network verification,Solution is as follows:
- Recall win8 right sidebar,Then select Change PC settings
- conventional
- Advanced - immediately restart
- Troubleshooting - Advanced
- Choose startup settings
- 7- select Disable Force Digital Signature Information[……]
RecentbtMore interested in,See many of my friends say,bt have an early 10 11 I said I do not know how。
Open a look at the official website,Sure enough, orBT5,But already the r3。
I heard that now has very good support BT5,Therefore, I downloaded a,But never before has been heard hands,this time,Could not resist。Because I'm usingMac OS X,Therefore, the use of virtual machineParallels DesktopNot much to say,but,only[……]
Social engineering is what exactly? On Baidu Wikipedia is this explanation:Social engineering is adopted on the establishment of the theory of natural、And means of social and institutional reality in accordance with particular emphasis on two-way planning and design experience to solve various social problems step by step。
But if you look carefully,This definition is specious,Social engineeringWhat,how did it get here,What use,Exactly how to use,In the country which are not yet clear。Social engineering is not to teach you how to lie,Not against the law to teach you,Which itself is only a means and methods of social。
Skilled use of social engineering[……]
Windows 8 will automatically set the so-called maintenance time and free time,This allows even installed in a virtual machine using Windows 8, I can not stand。
Always quick fan blew up,This is sometimes used battery run books for me as people really bear in mind one。
In fact, I think,This is the background quietly perform maintenance or housekeeping so-called medical system 360,By the way do not tell you finished Bale scores。
so,I decided to get rid of decisive Hell。
A total of two methods,One is to get rid directory,Such was scheduled task[……]
In the study CCNA related courses NAT Network Address Translation content,When the practice often requires no out a dynamic NAT or PAT address pool
Cisco IOS NAT table as long as the provision of translation entries have included the address of the address pool,You will be able to modify or delete the address pool。
at this time,You enter
(config)# no ip nat pool pool_name
It will give the corresponding tips:
%Pool pool_name in use, cannot destroy
[……]