• Microservice architecture | 3.1 Netflix Eureka registry


    catalogue preface 1. Eureka Basics 1.1 server and client in Eureka model 1.2 Eureka’s 30s start-up mechanism 1.3 why does Eureka register the IP of the service instead of the host name 1.4 high availability of Eureka server (cluster) 2. Build Eureka server 2.1 introduction of POM XML dependency 2.2 modify application Yaml profile 2.3 […]

  • How to simply unlock the computer registry?


    With the increasing prevalence of Internet viruses, netizens will be attacked by malicious websites if they are careless. They usually modify our browser and then disable the registry, so as to visit these websites as soon as they open the web page; In another case, the computer administrator sets the registry to disable in order […]

  • Win10 remote desktop has an authentication error and the required function is not supported. This may be due to the credssp encryption Oracle correction solution


    After installing the update of win10 recently, this problem occurs when mstsc connects to the remote desktop. According to the prompt link, you can see Microsoft’s answer. It may be that the update is installed on your computer, which improves the security level of the policy, but the remote end is not updated, so the […]

  • Solve the problem of docker x509 secure registry


    After installing docker, we encountered x509 problem when trying to pull docker from harbor, a private server built by the company. The reason for this problem is that docker will verify the certificate of the website, and the private server does not have the corresponding certificate, so docker refused to visit, but we can also […]

  • Android mobile sandbox


    1. What is a sandbox? English name of sand tablesandbox, also known assandbox, as the name suggests, it can be regarded as a kind ofcontainer, everything done in it can be done over and over again. In military, sandbox is often used to simulate the terrain of some war areas. Have you seen this? No, […]

  • Docker introduction series 5: 15 docker commands


    In this article, we will learn 15 dockers cli commands. If you don’t know docker yet, please check out other parts of this series to learn,Docker concept,ecosystem,Dockerfile,Docker image。 There are about one billion docker commands (one billion given or accepted). Docker has a wide range of documents, but when you first get started, the documents […]

  • PC client penetration checklist


    This article is only for learning records. If there is infringement, please contact to delete it! preface: As a vegetable dog, I suddenly received two PC client penetration tasks, but I will not, ah, a group of panic. There’s no way. It seems that you can’t do without learning. Learning is to be lazy seriously […]

  • Construction of mongodb Windows Environment


    Install mongodb Download:https://www.mongodb.com/download-center#enterprise install Create folder: enter the installation pathC:\Program Files\MongoDB\Server\3.4\bin, createdataFolder, enterdataFolders, creatingdbFolders andlogFolder, inlogCreate under folderMongoDB.logfile Start mongodb as windows service: start as Administratorcmd, CD toBin directory cd C:\Program Files\MongoDB\Server\3.4\bin, execute the commandmongod –dbpath “C:\Program Files\MongoDB\Server\3.4\bin\data\db” –logpath “C:\Program Files\MongoDB\Server\3.4\bin\data\log\MongoDB.log” –install –serviceName “MongoDB”. this command creates a file namedMongoDBWindows system services start-upMongoDBServices:net start mongodb […]

  • VBScript finds hidden services by comparing the registry


    design sketch: Code (checksvr. VBS):   Copy codeThe code is as follows: ‘On Error Resume Next   Const HKEY_LOCAL_MACHINE = &H80000002 Set oReg=GetObject(“winmgmts:{impersonationLevel=impersonate}!\\.\root\default:StdRegProv”) strKeyPath = “SYSTEM\CurrentControlSet\Services” oReg.EnumKey HKEY_LOCAL_MACHINE, strKeyPath, arrSubKeys Wscript.Echo “Checking, please wait …” Wscript.Echo “” For Each subkey In arrSubKeys  oReg.GetStringValue HKEY_LOCAL_MACHINE, strKeyPath & “\\” & subkey, “ObjectName”, strValue  If Not (strValue = […]

  • Some APIs commonly used in window


    SHLWAPI Wrapper Functions From the name of shlwapi, this should be the shell API function of windows. This header file basically contains some functions to handle string, path and registry operations

  • Two methods of VBS reading registry


    The first is through the regread of the WSH shell object   Copy codeThe code is as follows: RegValue = CreateObject(“Wscript.Shell”).RegRead(“\XXXX_XXXXXXXX_XXX\XXX\XXXX”) Msgbox(RegValue)   For more operations, please refer to this articlehttp://www.zzvips.com/article/88974.html The second method: through WMI   Copy codeThe code is as follows: Const HKLM = &H80000002 strPath = “SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace” Set oReg = GetObject(“Winmgmts:\root\default:StdRegProv”)     […]

  • How to clean the registry? One click optimization to clean up the registry


    If the system garbage is not cleaned regularly, both computers and mobile phones will slow down and occupy system space. The long-term operation of the computer, often installing and deleting software will cause registration redundancy, thus affecting the running speed of the computer. How to clean up the system garbage and garbage registry simply and […]