Friday, October 22, 2010

Actual FastCGI (Introduction)


Abstract:
When the site more popular, the number of straight-line rise in heart secretly delighted when, suddenly coming to a large number of call center responses Tel: 銆嶴ite connection closed on going,銆?by going out so long before the screen 銆?銆?has emerged Server Too Busy .. . 銆? . . . It appears necessary hardware upgrades, but coupled with more memory, more CPU, for a more expensive machine really solve the problem? Are there less expensive ways? This article describes how to install the FastCGI Apache server module, how to configure and use FastCGI web application, so your site program in the existing structure to full speed.
-------------------------------------------------- --------------------------

1. To overcome the bottleneck of CGI
Efficiency of 1.1 headache
1.2 The number of solution
1.3 a better way - FastCGI
2. Install FastCGI
2.1 FastCGI module installed on Apache server
2.1.1 standard installation (using APACI)
Mod_fastcgi 2.1.2 will be installed as a DSO
2.2 by adding the relevant settings using mod_fastcgi
Install FastCGI Development Kit 2.3
2.4 Test FastCGI
2.5 Install FCGI module for Perl
3. Write FastCGI applications
3.1 The procedural framework
3.2 header files into fcgi_stdio.h
3.3 FastCGI processing cycle
3.4 Lian Results libfcgi.a library
3.5 Notes on writing FastCGI programs
4. FastCGI how fast?
4.1 rating tools - ApacheBench
4.2 CGI vs. FastCGI
4.3 identify the Memory Leak
5. Reference
About this document ...






相关链接:



Hpqimzone Exe Not Responding Clean Up These



E-mail scrubbing brush



Accounting Is The Common Language Of The Financial Sector



China OLPC ALLIANCE brewing threat of Wintel alliance formed



Storage Dictionaries Education



MOD Converter



Study Notes of JSP TAGS



C + + / CLI object of speculation recorded The Object Layout



DAT to MP4



"Cottage" can be "regularized"?



Yuan Meng: Ubuntu 9.10 New Version Of The Debut



How do consumers willingly pays for



Audio Rippers And Converters Expert



MOD to MPG



"Unbeatable Team" Five Steps



Thursday, October 14, 2010

3G the first number up to the "special" user


Beijing TD test numbers do not release the number of more than 2000

Sources said the network made the first batch of TD-SCDMA 3G terminal and the number has been distributed to users. The next period of time, Beijing will be issued in batches TD-SCDMA mobile phone number. This is expected in Beijing, Qingdao, 5 to release 2 million numbers will be mainly concentrated in the competent ministries, operators and other user-friendly hands.

3G so we wistfully IC pictures

A well-informed sources, he has received from Beijing, Qingdao, two of the TD-SCDMA mobile phone call, the voice clear.

The news from China Netcom, Beijing plans to gradually release this month on the 10th TD-SCDMA mobile phone and number, issuing a total of about 1,000 numbers.

Sources said Beijing's TD-SCDMA test network of the main building along the Chang'an Avenue and North Fourth Ring Road, this is because the Ministry of Development and Reform Commission and other policy-making departments in the Chang'an Avenue, while Datang Mobile and other major R & D units in the North 4 Central, currently in Beijing to use TD-SCDMA mobile phones will be these people.

After news that Beijing will issue 3G numbers 5000, but analysts say this argument is based on 20,000 more numbers in the four cities, the calculation of equalization come. Beijing is not the main test TD-SCDMA, the network compared to the scale of construction in Qingdao, Baoding and Xiamen to be small, so no amount will not exceed 2,000.

Massive release mobile phone numbers on the TD-SCDMA in order to carry out the practical application of environmental testing, which requires a certain call volume users to test the stability of TD networks, voice transmission quality.

2G mobile phone access in accordance with the TD-SCDMA mobile phones to hear the user response, domestic 3G mobile phone voice clear, indicating that TD-SCDMA construction goes well, at least for now have to solve the problem with the 2G interworking. But after the news, TD-SCDMA still only calls within the network.

Alleged use of TD-SCDMA mobile phone users will require the number of daily calls and recorded. And this test will be a period of time, there may be more than 2 months, depends on the specific test progress of the case.

In addition to payment of TD numbers in Beijing than in Qingdao, Baoding and Xiamen will be no more large-scale release, which is after the development of 20,000 user-friendly program to use TD-SCDMA mobile phone part, China Netcom, China Telecom and China Mobile, respectively in the three areas had TD test network. It is reported that these three areas will begin to distribute telephone numbers in the middle of this month. Meanwhile, news that Shanghai will start issuing 3G on the 15th of this month numbers. China-made 3G mobile phone number will be used in paragraph 188.

This will be the last before the TD-SCDMA commercial test, the test results will determine the country's first 3G license issuance time. Minister of Information Industry Wang Xudong, and Reform Commission officials have committed to the 2008 Olympic Games will use 3G communications. Sources said the authorities had planned to debut in late 2006 issued 3G licenses, but because of TD-SCDMA test delay, 3G licenses may be postponed until middle of next year.

If the test smoothly, 3G license issuance is also expected to advance. However, analysts also pointed out, 3G license issuance time not only depends on the TD-SCDMA test results, but also the restructuring of telecommunications operators, and if so, 3G release time may be more delayed.






Recommended links:



Wizard Dial Up And Connection Tools



H.264 To AVI



Numbers will be allocated to the concept of the sword the veil of players



Shop Chat And Instant Messaging



Remodeling "value stream"



Jiang Qiping Family Laboratory of Beijing University speech sounded "New Life Movement" horn



Ie Out Of Memory At Error Errors Repairing



Red Hat, JBoss founder and Prospects may leave doubt



MTS TO MP4



Zhongguancun Hand New Countryside



REALDRAW help you reproduce wooden sound box (1)



FLV to IPOD



Pay up to see three major areas of someone's fastest



Tuesday, September 28, 2010

OutLook Express Made Easy


Step1: the first time, OUTLOOK EXPRESS

Outlook Express is characterized by all Chinese, easy to use, but also other e-mail client previously transferred the letter to address a number of e-mail software can not read the letters of the shortcomings of other similar software.

When you first start Outlook Express, the following dialog box:



Here would suggest that you add your existing e-mail account.



If you computer has saved e-mail or address book, then select the following two. In general, if you are a beginner, choose the first. Then the next step.



This page is called the start page, start page allows you to choose to perform the task. You can read and reply to e-mail and newsgroup messages, download new mail and newsgroup messages, find the address or read useful online tips. Start page will show the number of messages awaiting processing, or are preparing to send several messages. If you want to go directly to your inbox, please mention in the red circle marked in option, then every time you start Outlook Express will go directly to Inbox (below).



Step2: OUTLOOK EXPRESS Add-mail account of

OUT LOOKEXPRESS IE4.0 and above all support multiple account management. So if you have two or more mailboxes, you can in the toolbar's "account" on tap.



Select Add e-mail, the program will guide you to add the account.



Fill in the empty bar on your e-mail address (above).



The following figure, inserted to accept or send e-mail server address. For example, if your mail server address is: sina.com.cn its fill the following form.



The next graph, you can enter your account number and password. If you use OUTLOOK EXPRESS is uniquely their own, you can let the wizard to remember your password. Facilitate the receipt of the letter.



This will add a mail account management into OUTLOOK EXPRESS.



Step3: OUTLOOK EXPRESS chapter of the e-mail management

When you have connected a network, simply hit OUTLOOK EXPRESS, program will automatically e-mail received. You need not alone and to do other things, as long as there are new messages, the screen will display a message in the lower right column, double-click the icon, the screen will go to OUTLOOK EXPRESS Inbox window, you can find the new to the message.

OUTLOOK EXPRESS when you use one end of the time, you will find messages piling up in the inbox, there are important messages have spam, if you want to find the previous letter will be very troublesome, if able to classify the letter, then a lot easier. OUTLOOK EXPRESS will be able to solve all these problems for you. Steps are as follows:

1, we must first develop a finishing time for each letter of receipt of the letter are a good habit, different types of letters into the corresponding folder, over time, you will feel the OUTLOOK EXPRESS good habits to bring you the convenience of .

2, determine the order of the letters you want to select, press right into the next map menu, select your mail processing methods, such as mobile.



3, select the file you want to move into the folder, you can.



4, but I would like to add a folder, how do? Following figure, you want to create folders in the directory, right-click with the mouse. For example, to the "local folder" directory create a new folder, right click "Local Folders", then right, until the pop-up menu, click on "New Folder."



5, inserted in an empty column name the new folder. OK, ready. If the following two plans:






[Next]



Step4: E-mail Tips

Tips 1: how to access different e-mail code

When you receive an e-mail sent to friends elsewhere, but the papers are full of garbage, the do? Do not worry, if you are using the IE4.0 above OUTLOOK EXPRESS, and the whole installation, then it allows you to Ruyuan income. From the following steps:

1, right click the message in the inbox, then click the upper right corner of the "code" button, select the e-mail their encoding, in general, garbage is due to Hong Kong or Taiwan, sent a letter home written using traditional characters, WINDOWS system of the mainland can not see these codes. The following diagram:



2, if you open a message, then click on the "View" menu, select the code, the steps above step.





Step5: E-mail Tips

Tips 2: how to deal with spam, one of the

Going up to the net more naturally be a lot of people e-mail to send you a variety of situations. Some are ads, some with political overtones in some things, in a word is not what you want, they can be referred to as "spam" is annoying annoying. To deal with this type of spam, as you can in OUTLOOK EXPRESS "Shoudaobingchu." The steps are as follows:

1, first select spam.



2, click on "Tools" menu, select top "block sender" option.



3, can be determined.



Step6: E-mail Tips

Tips 2: how to deal with spam, the two

In addition, rejection can add the sender address.

1, the menu click on "Tools" bar, click "Mail Rules" in the "Block Sender."



2, where you can see that you stop the "spam" the sender.



3 Click the Add button after, it will pop up another window, fill in where the sender address rejected, can be determined.








Recommended links:



XviD to WMV



Easy Hobby



DV to AVI



The founding of SAILING



A large number of international giants fight back to the Chinese. CN domain names



Beijing, Nanjing Software Expo increasingly marginalized by the RECOVERY mode bar



mac edit 3



MOV to MP4



PRD employment "upward", "Labor Shortage" moved to the Mainland



Eight motivate the staff more DYNAMIC model [1]



Lists Newsgroup Clients



How to identify real and can automatically create index index



Homes to enjoy digital MEDICAL



Monday, September 13, 2010

Northern Rock's instant messaging



Digital workflow and easy as flying benchmarking system client, the Beijing Petroleum Machinery Factory (hereinafter referred to Northern Rock) has always been at the forefront of information technology. In re Northern Rock consultant DCMS occasion, and head of the Ministry of Information Industry have also been exchanges Shen. Journal of Engineering said that she had been the next step for the North Stone thought the direction of information development. With the development of enterprises, the process of information issues to consider more and more. Such as portals, instant messaging platforms, etc. are conducted through information technology issues. Northern Rock consultant for information planning, DCMS's consultants are given in the analysis of professional advice.

1, employees hope to timely exchange, but if only by telephone, the cost will increase.

2, if the use of public instant messaging platforms (such as QQ, MSN, Yahoo Messenger), need to open internet rights, undoubtedly increased business risk.

3, use of public instant messaging platform, employees chat with uncontrollable, may result in reduced efficiency.

In many enterprise instant messaging software for research, the Northern Rock chose ActiveMessenger (hereinafter referred to as "AM"). Not only because of its high cost, more attention is its good scalability.

ActiveMessenger stone on the line in the North, customers can make and easy to fly and Digital Workflow Integration to form real-time business processing reminders. In the DCMS support and guidance of consultants, customers using ActiveMessenger extensions, implemented in the form processing workflow reminders to inform all relevant personnel by ActiveMessenger.

Shen work that not only ActiveMessenger instant messaging is stable, convenient, value-added features, but also made more effective supervision and personnel work, improve efficiency, indeed serve multiple purposes.

Northern Rock applied AM Features

1, instant messaging

Personnel information online. Users can know the current status of co-workers. Such as whether the line is busy or to decide whether to follow it;

Send instant messages (with permission can mass or notice). Text message content can be in different fonts and colors to indicate to distinguish between the importance of;

Dialogue mode and message mode provides two methods of communication.

2, file transfer capabilities

Software offers a variety of ways to send the file;

Embedded through the Explorer "new-prone" function, directly;

By Explorer drag the file directly to annex box, to send;

Interface by sending the attachment button to increase the attachment, to send;

Word or excel in the system, there are "prone" button, you can directly send the completed document will be prepared;

100M level can send large files, send one or more files, or even entire folders.

3, message tracking

AM's message tracking feature, allowing users to clearly understand the message issued by the state. When the recipient has read the message, a message can be kept informed of the staff, thus ensuring the validity of the message.



4, message management features

The news server and client synchronization;

System to support any client machine, will own another machine to send off the message synchronize to this machine;

Messages can be important collections;

Can be dealt with in the future, pending transfer to the folder;

Message content can history inquiries, inquiries can quickly locate the records;

You can print messages;

Can record the contents of the meeting.



5, history document management

AM as an internal communications platform, usually in the AM system, the user will receive a lot of files. Historical Documents downloaded file will be stored in the path where the record, the user only to find this file, you can directly use or re-download the server can be user-friendly documents downloaded.

6, and EASYFLOW integration

Northern Rock after the use of AM, AM presented in the workflow approval received on the demand for prompt, timely manner to help employees deal with their daily work.缁?杩囧伐浣滄祦椤鹃棶鍙備笌鎸囧锛屽埄鐢ˋM鐨勬帴鍙o紝鎴愬姛闆嗘垚浜咥M涓嶦ASYFLOW涓や釜鍔熻兘绯荤粺銆?br />


銆??AM涓哄寳鐭虫墍甯︽潵鐨勬晥鐩?br />
銆??鏈夋晥瑙e喅鍖楃煶鍔炲叕涓嵆鏃舵矡閫氱殑闇?眰锛屾洿鏈夋晥杈炬垚涓氬姟鍗?浣滐紱

銆??涓嶄粎鎻愰珮浼佷笟鐨勬矡閫氭晥鐜囷紝鏇存彁楂樹簡浼佷笟鐨勪笟鍔″鐞嗚兘鍔涳紱

銆??澶уぇ闄嶄綆閫氫俊璐圭敤锛岀粰浼佷笟鑺傜渷澶х瑪寮?敮锛?br />
銆??涓嶰A銆丒RP绛夌郴缁熼泦鎴愶紝涓轰紒涓氭墦閫犲嚭鐪熸鐨勪竴浣撳寲绯荤粺锛?br />
銆??绯荤粺鍏锋湁鎺ュ彛锛屼究浜庢牴鎹敤鎴疯姹傝繘琛屾墿灞曪紱

銆??褰撲紒涓氳寖鍥存墿澶ф椂锛屽彲瀹炵幇澶氭湇鍔″櫒浜掕繛锛屾弧瓒冲悇鍦板钩鍙伴棿鐨勪氦娴侀渶姹傘?







相关链接:



Fortinet Forecast: Phantom Verge Of Threatening The Annual Peak



E-cology In The Micro-series 9 Pan



Articles about Themes And Wallpaper



Apache Maintenance



How to convert mp3 to mp4



ps3 format



Depth of detection, as shown with the CORE



CATIC Shenzhen: HR Reform activity trip



Open-source can not be Anti-monopoly



Avi Converter



Specialist FILE Compression



NPC High School: create a new "digital" high school



Click Wang Zhidong



Good E-MAIL Clients



Shop Reference Tools



Giants LEADING a secret



How To Convert Mp3 To Aac



Tuesday, August 3, 2010

Enhance the concept of active intrusion prevention IPS is not speculation


Intrusion Detection (IDS), has been put on the market for years, but more and more users find that it can not meet the new network environment for security needs.

IDS can detect passive attacks, and can not take the initiative to stop the threat to the vagaries of the network.

Therefore, it was urgent need to find a proactive intrusion prevention solutions, to ensure that the four enterprise network threat environment in normal operation.

Deep-level defense security needs

Currently, enterprises are facing increasingly complex security problems, security threats are growing rapidly, particularly the risk of blended threats, such as worms, DDoS attacks, spam mail, etc., greatly troubled the user to the enterprise's Wangluo cause serious damage.

So what options do business? Intrusion prevention system is the next generation of security systems business. It not only can be detected, can block the attack before they cause damage to the intrusion detection system to a new level. IPS and IDS obvious difference: intrusion prevention systems block the Code Red, Nimda and SQL Slammer, and the use of intrusion detection systems, users are required after each attack to spend millions of dollars for virus removal. Because of this, companies need the security strategy has not only limited to a single firewall and other protection products, but a deep-level protection strategy.

NAI launched includes host protection IPS technology strategy and network protection strategy for the two most, which is the McAfee Entercept host-based intrusion prevention solutions, technologies and rules of conduct signed by the integrated approach, providing an effective protection as Code Red, Nimda worm that attacks such as; McAfee IntruShield network intrusion prevention solutions, integrated feature library detection, abnormal behavior test, behavioral analysis, correlation, and denial of service techniques that can intelligently detect known attacks, the first place attacks and DDOS attacks, a deep level to effectively protect the enterprise network security.

IPS will replace IDS

Currently, IPS and IDS for the dispute, it was said, IPS, and no new technical breakthrough, but a conceptual speculation, Pubic do not think so. He believes that as technology development and continuous improvement, IPS will replace IDS, NAI IPS technology has been made in a number of international patents, IDS in the network is real-time detection of network attacks, while the IPS includes IDS technology In the IDS based on the increased detection of active response to block the defense function, once the attack is detected, you can take the initiative to cut the intrusion. Of course, true, IDS is already a mature product. Pubic think, IPS will take some time to replace IDS, IPS also requires the user to accept a change process, and now this change is also underway.

Currently, the face of mixed-type attacks, users need a proactive defense strategy, IPS is a large potential market for new business, therefore, NAI technically spent a great deal of input, hope to play a lead role. Now has more than 180 customers worldwide use of IPS products in China, after some users in the test trial of the IPS are also interested. Pubic believe, IPS will have a significant demand for this market, it is very useful to users. IDS products have been used for the user you want to migrate to IPS, you can purchase a license only on the user's input costs are also guaranteed.

It is reported that already has a financial company based on the original IDS, IPS purchased a few licenses to the successful deployment of intrusion protection system IPS.

In addition, IPS is a very technical product, the user's skill level requirements are high, and only on the IPS used properly, the effect will be significant, or just the opposite, but rather as IDS, so, user education and training essential. NAI will intensify efforts in this area, which is the current IPS technologies to promote the great challenges facing.

What is the real IPS

Currently there are many products on the market are dubbed "protection" of the word. But the real intrusion prevention solution should enable companies to analyze can not take measures to protect the system; the same time, it should prevent attacks result in the user's operating system, applications and data corruption. NAI believes that a good intrusion prevention solution should include the following features:

First, the real solution should provide real-time attack prevention and analysis. It should be before the start of any unauthorized activity to identify attacks, and prevent it from access to important server resources.

Second, intrusion detection is the most effective way is to adopt a mixed approach, that integrates specific attack signatures and behavioral rules of power. This hybrid method can provide the protection of known and unknown attacks, while at the same time keeping false positives to a minimum, so do not make any concessions on the loss.

In addition, a strong defense in depth security are based on the concept of protection can be deep. IntruShield's unique architecture integrates a number of patented technologies, including feature detection, anomaly detection and denial of service analysis to be able to multi-gigabit of network traffic and intelligent under the accurate detection and protection. This kind of creative control unprecedented ability of technology to protect those with the most stringent requirements of the network against known attacks to the first occurrence of unknown attacks and DoS attacks.

At the same time, enterprises have to choose whether to adopt the solution of advanced technology industry, is well-tested and used, and are subject to ongoing maintenance, it is very important.

Things correct safety and performance

IDS generally parallel in the network to bypass the network monitor in real-time detection of suspicious traffic, the performance is not significantly affected, but not IPS IDS, it is deployed mainly in the series in the network, all access to the internal network traffic to go through the IPS, if found aggression, to respond immediately to block attacks, so that will affect network performance, NAI also take into account this situation.

NAI's IPS performance is very good, IPS products in more than 20 integrated chip, 60G of cache, to ensure maximum network performance, and this is one of IPS's main selling points.

The so-called "true blue streak", despite the different opinions of the IPS's, but it is the concept of right, and it indeed has been in existence, many manufacturers are successively pushed IPS products, as long as the actual use indeed the role of the user's network security are effective, the user can try.






Recommended links:



Easy Cataloging



Convert .avi To .wmv



Only store is not enough



HP Quality Doors Lead Into The Victims Of Collective Action



CorelDRAW Based Cartoon Series (2)



Hot Shell Tools



U.S. scientists trained computer "understand" the human brain



139 port of offense And defense



Blackberry Video Format



Good E-Commerce



Internet Explorer programming brief (2)



ArcGIS standard coordinate conversion in The end how?



Vigilance "Li Cheng Ru-style" risk



One after another anti-piracy noise compensation 780 000 Shenzhen Haojia reconciliation



.VOB



Mkv



Wednesday, July 21, 2010

HP and Novell reach a new exclusive alliance agreement



Recently, HP and Novell alliance reached an exclusive agreement to HP identity management center customers to migrate to Novell identity and security management solutions. As part of the agreement, HP and Novell will jointly offer migration services, HP will resell Novell identity and security management solutions, and Novell will license the technology to HP identity management center.

Earlier this year, HP announced that the investment will focus on identity management products focus on existing customers rather than selling products to new customers. To ensure that customers continue to receive high-quality identity management solutions, existing HP customers can take advantage of the advantages of the scheme, to migrate to Novell's industry-leading solutions. For customers do not choose to migrate, HP will continue to support it.

Novell's identity and security management solutions to help enterprise customers reduce the risk of identity and data theft, streamlining IT management and enhance business strategies and enhance the response line regulation, legal compliance, and many other business challenges.

HP and Novell migration program will provide full customer support throughout the migration process, including:

* HP identity management centers to provide current license - in the first 12 months, Novell will start to migrate to their identity and security management products provide customers with a complete license.

* Migration services - by the HP Consulting and Integration team provides services to ensure a smooth migration process smooth, the impact on customers to minimize business disruption.

* Joint development of migration tools - HP and Novell will develop tools to help their respective services team automatically and easily from a central HP identity management solutions to the migration of Novell.







Recommended links:



Lohan AVI to FLV



Bluesea CD-R M3U Sound to Midi Convert



YOUTUBE to 3G2 Help



Catalogs Education



flv to AVI



What Is Mov



Overcome Stage Fright Interview The 10 Candidates Recruited Nirvana



Best Font Tools



Youtube Movie to 3G2 Mixer



Evaluate Office Suites And Tools



Swift MPEG To FLV MP4



what is Avchd



Flv to mp4 converter free download



Apple iPod 3G2 Myspace VIDEO Encode



Thursday, May 27, 2010

Youtube FLV to WMV Ultra

It's most popular and very easy to use YouTube tools. helps you Fast download, convert, play, manage your favorite YouTube videos. If you're a YouTube fan, you'll love YouTube tool! is the most powerful YouTube assistant on the planet. YouTube tool easily: 1. Fast downloads YouTube videos, 2. Supports unlimited simultaneous downloads (a real time saver!), 3. Automatically names the downloaded video the same as the YouTube title, 4. Converts YouTube videos to various video formats, including Video, DVD, VCD, AVI, MPG, MPEG, Divx, Xvid, WMV, RM, RMVB, MOV, MP4, 3GP, SWF, DAT, H264, VOB, Flash, PDA, M4V, 3G2, AMV, CDA, DV,QuickTime, ASX, TV, VHS, FLV, H264, BDMV, MAC, Apple TV, Zune, iPod, PDA, PSP, PS2, PS3, Xbox, Xbox 360, Mobile Phone, Cell Phone, Blackberry, Wii, Laptops, Printers, Palm OS, Pocket PC, PPC, Treo, Psion, EPOC, iphone.
Supports customize or create user's own profile for any new (portable) device. The video conversion supports preview. About Playing Features. Embedded YouTube Video (Offline) Player is available, it supports offline play YouTube video, .flv video and .swf video. Supports "Drag and Drop" video files direct to the main window. Easy to select the source files. Cool UI skin available. - is the most powerful YouTube assistant on the planet.