Can someone provide all necessary components to assemble a router?
Especially,what's the component to make it programable?
Seems google doesn't give such information .
Can someone provide all necessary components to assemble a router?
Especially,what's the component to make it programable?
Seems google doesn't give such information .
UPDATE
I'm not gonna use a computer as router,definitely perfer an embeded device,but what's the component list of the device?
I would like to install a quad core computer in my dorm at college and use my much slower laptop to be able to control the quad core just as if I had a quad core laptop (control as in i see the gui, not command line control)! Both are on the same college network, though Im also interested in what would be necessary if the computers were on different networks. What would be the best method fot this? Im looking for non-lag communication.
Guest os: xp
host: win 7
I suddenly cannot access one of my virtual machines in virtual box. And I don't remember having deleted one of the files necessary for it to run.
I have an API that used to run on Apache but now is served via lighttpd. I can easily switch the API URL in the app to the lighty port like api.net:81. I wonder if I should use mod_proxy instead to have cleaner urls. There is no redirect for legacy urls necessary. What would be the overhead for the Apache in between compared to the direct call?
Would mod_proxy and Apache steal the benefit of lightys lightweightness?
Instructions for using mod_auth_kerb to authenticate a Linux web server against a Windows domain say it doesn't work to link a machine account with the service name HTTP\[email protected].
Why is it necessary to have a dummy user account instead of a machine account?
Suppose I have two routers connected via a 1Gbit connection. A client behind router 1 streams to a client behind router 2 while other clients behind router 1 transmit data to other clients behind router 2.
Are there any best practice policing, scheduling or queue management algorithms available that help a beginner understand what is necessary to prevent QoS degration in simple cases as above as well as in real world environments?
Does anyone knows which are these systems that manages paid wifi networks and some hotels and airports?
Even better, would anyone know a open/free project that would do or could be adapted to that end?
The idea is simple, I want to let the network open at physical level so anyone can connect. After connected however, the clients would have access only to a specified page where they can logging in, and doing the necessary validations the router would allow these of those ports (or even everything) for his IP.
Hi,All
I want to download free Application from iTunes.
I have AppleId but when i trying to download the App,
it ask for Creditcard information.
Is it necessary to give CreditCard details for downloading free App also ?
Thanks in Advace...
I've already compiled and installed subversion,
now trying to add users to it.
And I find two articles on this, but they seem to be going in entire different direction.
The 1st is here, which looks very simple, and seems it's not necessary to create a user account(useradd ...)
the 2nd is here, which is a lot more complicated, and seems I need to create a user account for each svn user.
Which one should I follow?
There isn't much room on server chassis and I'm wondering where a label with the servers name should go? Is there any other information in addition to the name that should go on the label? Does it make sense to label each hard drive in a server or is that not necessary?
There certainly is overkill, when I worked at Big Blue labeling was a huge source of bureaucracy, even a projector needed to be labelled and have it's whereabouts routinely reported.
D:\svnroot>svn commit -m "Type your justification here" --username svnu --password test
svn: Authorization failed
I'm sure the username/password is correct(in conf/password),is it necessary to have exactly that user on the remote svn server?
When I make changes to files, I keep on finding myself "saving as" and adding the current date to the file. It slows me down, and it creates a bunch of files that clot my folder. I would prefer to be able to Right Click on a file from the File Explorer and select to save different versions of this file, so that each time I save it, it saves a copy somewhere, that I can access in the future if necessary.
Is there any application that achieves this?
I am looking for a smtp proxy to install on our gateway which should monitor outgoing smtp traffic to identify the source of recently occuring spam attacks from our network.
It would be enough if this could log all outgoing mails, no actual filtering must be done as I'm going to do this manually.
Also, is it possible to monitor smtps ports 465 and 587 or is it necessary to completely block these ports to stop spam?
I have Windows Server 2008, with IIS 7.5 and SQL Server 2008. I want to install DotNetNuke which is an ASP.NET application. What are the necessary precautions to not to get pwn3d.
If a directory "foo" is owned by user A and contains a directory "bar", which is owned by root, user A can simply remove it with rmdir, which is logical, because "foo" is writable by user A.
But if the directory "bar" contains another root-owned file, the directory can't be removed, because files in it must be removed first, so it becomes empty. But "bar" itself is not writable, so it's not possible to remove files in it.
Is there a way around it? Or, convince me otherwise why it's necessary.
Consider that there are two server load balancers working in the tcp proxy mode (e.g., for L7 load balancing). Is it possible to synchronize their states in real time so that they can be a backup for each other? in case that one is down, the other still has all necessary states to uninterruptedly support all existing TCP connections.
I understand that this is hard, but I am wondering whether any free/commercial LB already supports this feature.
Thank you!
Hello
Imagine you're using Photoshop, SQL Server, Visual Studio, Winrar, and any other installed software on Windows Vista.
What will happen to them if you upgrade you Windows Vista to Windows 7.
Are they still there? Or it's necessary to reinstall all softwares again?
I have a specific use case where I would really like to be able to change a user's password with a single command with no interactivity. This is being done in a safe fashion (over SSH, and on a system with only one user able to be logged in), so it's fine to expose the new password (and even the old one, if necessary) on the command line. FWIW, it's a Ubuntu system.
I just want to avoid having to add something Expect-like to this system for just this one task.
How do I back up my system to a mobile (external) hard disk, and then recover from it when necessary?
I'm using windows XP
Also, does most ghost software back up only C: or all disks?
I have a spreadsheet that is essentially going to be a form for our user to print out and hand to the necessary individuals. What the user needs to be able to do is select a customer number from a drop down, choose his number, have 2 other (so a total of 3) columns populate.
I need the rest of the worksheet to stay in place. I have tried just about everything. How can I solve this with the simplest solution possible?
Hi, somebody help me.....
It is sometimes necessary for me can send silent SMS to other subscriber, and for this purpose exist such program as Hushsms but It is intended for users Windows Mobile, and I prefer (and use) Nokia n97 with another operating system. Who knows the similar program for Symbian OS?(...or may be another way ?? decision of this problem)
It is very important for me.
Thankful in advance
Hello :)
Is it possible to use Microsoft's "Secure Connection Rules" to authenticate/encrypt connections while using VPN at the same time?
What are the configurations necessary?
It should look like this:
Client A <-- VPN --> VPN Gateway <-- LAN --> Client B
FTPd <------------- IPSec -------------> FTP
(I know there are other ways to secure FTP, it's just an example)
Thanks
I'm trying to clean up a log file for better readability - there's a load of un-necessary stuff there to my needs - i basically have to replace sshd[xxxx] where xxxx is an arbitrary number with, well, either a space or nothing. While i can replace a known string, i have no idea how to do a sed wildcard in this case- So- how do i do that?
The dynamic type in C# 4.0 is a welcome addition to the language. One thing Ive been doing a lot with it is to remove explicit Reflection code thats often necessary when you dynamically need to walk and object hierarchy. In the past Ive had a number of ReflectionUtils that used string based expressions to walk an object hierarchy. With the introduction of dynamic much of the ReflectionUtils code can be removed for cleaner code that runs considerably faster to boot. The old Way - Reflection Heres...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.