Pocketed replaced rss address,Please resubscribe friends!

In order to better manage statistics and blog subscriptions,Off the grid to replace the rss subscription address

due toFlying HandsThis oneDomestic pitIt is people helpless,So back to the route or replace native Feed。

Other,Still full subscription。

Subscription address is

www.logcg.com/feed

And used as a plug-in to subscribe to blog statistics,This plug-in is calledMy Feed StatsTap to view the article description。

The following is a brief introduction to this widget

This Wordpress plugin statistics[……]

Click link to continue reading...

Linux Redhat Xen Virtualization study notes

This is before the time of learning 5.8xen virtualizationThe study notes

Although always feltxenBut fast become a zombieVirtualizationThis aspect is undeniable his powerful

especiallyredhat6CancelledxenxenGiving a feeling to be eliminated but canceled support for xen in my opinion it would be unwise

Or talkxenThe other pull much hurt the body

First, create a file,I was hard enough because I of course you can also use lvm directly under the root directory created

[crayon-69032c8182[……]

Click link to continue reading...

Wordpress theme how to adjust the default font size

2013November 4 New ......

Find style.css file,Edit this paragraph wherein the bottom

among themtitle aHere's edgeheightHome blog can adjust the height of the name,SuchThe name will not get together and dividing linesLa!

...... Updated,The following is the original -

The blog theme is being used off the grid I think we are not familiar hehe

Quite good looking

but,The default font is really little people catch chicken -word[……]

Click link to continue reading...

The method of manually generating yum repository Redhat6

In Redhat6 future systems will exist yum repositoryYum database manually generatedThis issue

And several previous versions of the database are automatically generated

May be mirrored with redhat6 about it .xml files and package files are not in a place that no detailed research to explore next time

First determine yum of these packages have been fitted

There areyum yum-updatesd yum-security yum-metadata-parser yum-rhh-plu[……]

Click link to continue reading...

superrecovery cracked version - from the network,Only for backup,Please support genuine!

This may be the only one superrecovery cracked version ......
Younger sister U disk data recovery can not be restored with easyrecovry,Although it is strange,At least she tried to get,So also be a backup ...... ah,that's it……………………
This software download fromHereof
I do a backup,I can also be downloaded from here or fromHuawei network diskDownload。

Download now original package virus,In any case I can not break this strange ......

So attach a usable er emergency use it ............。

Easy[……]

Click link to continue reading...

Prohibit running cmd on computer solutions

I wrote this beforeFrom the "crack field pole electronic classroom" experience in mindandHow easy it is to mention the right to limit the authority of the computer? These two articles,Inside it is mentioned for the cmd disable computer problems。

So I try to do with a bat batch mode command,But sometimes just in a hurry to run some command cmd,So for a limited computer cmd really annoying,then,I found a way,With bat batch to simulate a cmd window execute the command。:)

It is used inside a batch of common commands,You can copy the commands one by one[……]

Click link to continue reading...

[Turn] on OS X forgot password four kinds of solutions

  1. Use Apple ID to reset user account password
  2. Use OS X CD-ROM disk to reset a user U or account password
  3. Create a new administrator account to change the existing user account password
  4. Recovery mode terminal change the user account password

All contents of this article fromHere,Reprinted done only for backup purposes。

Use Apple ID to reset user account password

As red box,This must be checked,Or you can not use Apple ID password reset。(If you have not checked not remember,Then at least you have to remember the first[……]

Click link to continue reading...

Ubuntu10.06 install ati graphics driver simple tutorial

A few days ago I download bt5r3,wroteInstall back|track 5 R3 and configuration interface simple tutorialSentence,bt5r3 is based on the ubuntu10.06,This version of ubuntu just not convenient to drive manager,so,If you want to be mounted directly on to the laptop bt5r3,Graphics drivers have become a problem。

I was solved:

First of allKnow your graphics version,I want to install thisbt5r3The laptop is5xxx series graphics show you single,So go to the ati official website to download la[……]

Click link to continue reading...

How easy it is to mention the right to limit the authority of the computer?

Previous article discussed,On the use in some schoolsVarious student classroom management software crack As well as inside the classroom for the very domain of electronic break,Inside the guide describes some of the methods。

But inside a little:

I said:"The change of name Registry Editor,Then you can double-click to open "This is one of the cases,There is also a group policy is to limit what out of,So even if you change your name,Copy it to no avail,Open the policy or say whatDisabled by administrator

A few days ago suddenly to the interest,In class when a simple experiment a bit,In fact,still is[……]

Click link to continue reading...

From the "crack field pole electronic classroom" experience in mind

Our classrooms are the control and management of polar domain of electronic classrooms,Sometimes really very depressed people。

On a lesson,Because I'm learning progress slightly faster,And Network Academy upgrade,So I do alone open question,In order to take a number and quickly receive the discount CCNA。School teacher in lecture,I need to open the hospital network with your computer (Suman we understand) then log in to the teacher to help open question,The key is this teacher may like to use the screen to broadcast lectures,This broadcast is what I naturally do not do the。Then asked the teacher to cancel broadcasting on my computer,The results of teacher training and preparation I am very chic sentence:Do it yourself[……]

Click link to continue reading...

No pause break key on the Mac book pro keyboard solutions

Latest update:Method Two Method Threeallunavailable!!!! The only way out of a tested so that ~

—————————(=。= It is not a test of a little late ah ......)

 

In a recent study CCNA routing Well,To practice what deployment routes,The first problem encountered is actually get rid of the password on the route ......

This simple,Minutes to get points,But the middle of the process caused by thinking routing:Because the practice is used in computer room,Get well,But the route they used a Mac,Ma[……]

Click link to continue reading...

About WIN8 can not install an unsigned driver "third-party INF does not contain digital signature information" solution

Lenovo's mobile phone today to help students Brush,Experience the following problems:

Third-party INF does not contain digital signature information

Because the phone requires the use of windows Brush Well,And I only win8 virtual machine,Just install the driver win7 drivers,Installation of giving rise to a problem。

Via the network verification,Solution is as follows:

 

  1. Recall win8 right sidebar,Then select Change PC settings
  2. conventional
  3. Advanced - immediately restart
  4. Troubleshooting - Advanced
  5. Choose startup settings
  6. 7- select Disable Force Digital Signature Information[……]

    Click link to continue reading...

Install back|track 5 R3 and configuration interface simple tutorial

RecentbtMore interested in,See many of my friends say,bt have an early 10 11 I said I do not know how。

Downloads – BackTrack Linux

Open a look at the official website,Sure enough, orBT5,But already the r3。

I heard that now has very good support BT5,Therefore, I downloaded a,But never before has been heard hands,this time,Could not resist。Because I'm usingMac OS X,Therefore, the use of virtual machineParallels DesktopNot much to say,but,only[……]

Click link to continue reading...

Talking about social engineering and hacking

Social engineering is what exactly? On Baidu Wikipedia is this explanation:Social engineering is adopted on the establishment of the theory of natural、And means of social and institutional reality in accordance with particular emphasis on two-way planning and design experience to solve various social problems step by step。

But if you look carefully,This definition is specious,Social engineeringWhat,how did it get here,What use,Exactly how to use,In the country which are not yet clear。Social engineering is not to teach you how to lie,Not against the law to teach you,Which itself is only a means and methods of social。

Skilled use of social engineering[……]

Click link to continue reading...

Windows automatically maintained kill 8!

Windows 8 will automatically set the so-called maintenance time and free time,This allows even installed in a virtual machine using Windows 8, I can not stand。

Always quick fan blew up,This is sometimes used battery run books for me as people really bear in mind one。

In fact, I think,This is the background quietly perform maintenance or housekeeping so-called medical system 360,By the way do not tell you finished Bale scores。

so,I decided to get rid of decisive Hell。

A total of two methods,One is to get rid directory,Such was scheduled task[……]

Click link to continue reading...

About Cisco router% Pool globalnet in use, can not destroy solutions

In the study CCNA related courses NAT Network Address Translation content,When the practice often requires no out a dynamic NAT or PAT address pool

Cisco IOS NAT table as long as the provision of translation entries have included the address of the address pool,You will be able to modify or delete the address pool。

at this time,You enter

(config)# no ip nat pool pool_name

It will give the corresponding tips:

%Pool pool_name in use, cannot destroy

[……]

Click link to continue reading...

Delete in OS x. pkg package software:pkg_uninstaller!

existPrevious articlein,We now discuss the method can find deleted .pkg packages,Obviously the pros and cons,Then I introduced a software for everyone,pkg_uninstaller,This is what I found on the github,Its website here:https://github.com/mpapis/pkg_uninstaller

then,For us it is to install and use,of course,I regret that it does not have graphics port,Hehe。

First of all,Let's install it:

Open a terminal,Then enter:[……]

Click link to continue reading...

In OS X Perfect uninstaller .pkg installation package that discussion

All to known,In OS X,There are two kinds of software installation package,One is all the common.app;another,It is to install more trouble.pkg.

As long as the majority of the former, then dragged "application"The can be used normally,Belongs to us often say "green software”,While the latter,You'll need to double-click,start upinstallerInstall,But also you need to enter a password to give permission,Of course,There are many such applications,You also need to restart the computer before you can。

pkg install package

pkg format software is actually installedThe extract from the compressed file and pkg in[……]

Click link to continue reading...