0%

Sunset

Enterprise network management switches can use commands to physically isolate ports in the same VLAN. The home network management switch can only use one of the port mode and VLAN mode. Google did a bit and successfully used VLAN to realize the function of isolation from ports under VLAN.

Read more »

Friend ship

IPv4 addresses have dried up in 2019, so network operators have begun to promote IPv6 and use NAT technology on a large scale to recover public network IPv4 addresses. Without the public network IPv4 address, we cannot use many applications (such as a self-built web server). The solution is to use NAT traversal.

Read more »

Snow
I have been using the R7800 for two years, most of the time it belongs to the neglected existence. Occasionally I will be unconscious and suddenly press the reset button to restore the factory settings. As a result, the router’s management page cannot be opened after the router restarts.

Read more »

Hands, Can do everything

In the recent period, the academic record of bear children has dropped due to their indulgence in television , so there is a need to restrict television without affecting the elderly at home. After thinking about it, I plan to use the crawler technology automatically login the network management switch to limit the speed of the set-top box when the child is after school . when the children is at school release speed of set-top box.
Read more »

Journey
When converting OTF / TTF fonts to WOFF online, many websites limit the size of uploaded fonts (< 10MB), while the size of Chinese fonts is inherently large, so when using online font format conversion, it is often not possible to convert. Then I thought about converting the fonts locally.

Read more »

Eagle looks to the sky by @peteevans, UK
One day i want to upgrade multiple websites in my home to HTTPS, and make a certificate for each domain name? That later maintenance was absolutely troublesome. Fortunately, there is google, and I found that multiple domain names can also be handled with one certificate.

Read more »

Youth

One day in 2019, a friend asked me “Can you restore the WeChat chat history whicht was deleted by my operation”. I said it was simple. So I picked up my friend’s phone. When I started, I realized how big my cowhide is!

Read more »

Fall

When HTTPS is enabled on the entire site, we usually redirect HTTP to HTTPS to force users to use the HTTPS protocol. However, the first time user uses the HTTP protocol to visits the website, there is a risk of being hijacked by a middleman. HSTS can currently be used to avoid such risks.

Read more »

瀑 布

之前一直在使用 ssh 来做文件存储与分享,因为 SSH 的特殊性,使用非常不便。便想建一个轻便的私人网盘。
经过对开源私有云(ownCloud/nextCloud/kodExplorer/…)的查找、安装、卸载流程,最终留下了德国人 larsjung 开发的 h5ai

Read more »