Second generation CDN architecture and ordinary CDN architecture
Recently, there is no thing to write, introduce a thing of our company a few births, may be a new thing for many people. . […]
Read moreRecently, there is no thing to write, introduce a thing of our company a few births, may be a new thing for many people. . […]
Read moreBase64-coded HTTP Basic Authentication is no longer widely used due to security issues. In the cloud storage, the security of the data has been widely […]
Read moreSyn Flood introduction Summary The website was attacked many times, the most violent TCP flood attack, namely SYN FLOOD. Syn Flood is one of the […]
Read moreFor HTTP protocols, we have several different ways of processing, so we have several different processing methods, so there are different processing for the client […]
Read more1, cname (canonicalname) record, (aliasfromondomainnametoanother) is usually called alias pointing You can transfer the registered different domains to a primary domain! Unlike a record, the […]
Read moreI. Introduction Said TCP sliding window protocol, I believe everyone is very familiar, but said that the WINDOW Scaling parameter may know and have been […]
Read more1. 11 network connection status on Linux servers: Photo: TCP state machine Normally: a normal TCP connection will have three phases: 1, TCP three handshake; […]
Read moreWhen we do TCP servers, we usually cause damage to both security attacks or to avoid extreme requests from safety, and prevent extreme requests for […]
Read moreI have encountered a problem recently. I bought a server in Ali Cloud and used it to build a “service service for Internet information”. My […]
Read moreIn IPv6, Router Advertisement (referred to as RA) is a critical ICMP package, and Stateless AutoConf is relying on RA configuration IP address, the host […]
Read moreWhy use the Height and Width properties to specify the image size Have you seen the content when the document is loaded, it will display […]
Read more