Archive for the ‘Internet skills’ Category

Modify the MaxFieldLength and MaxRequestBytes to Completely Solve the Error “Request Too Long”

Modify the MaxFieldLength and MaxRequestBytes to Completely Solve the Error "Request Too Long"

When The iis 6 or iis 7 or iis 7.5 received  the request header more than 16k of  the length(default), it will lead to the error of "Bad Request - Request Too Long. The HTTP Error 400. The size of  The Request headers is Too Long."

According to  the IIS official BBS posts (HTTP 400 Error. The size of The request headers is too long),The lenth of 16 k request header was  limited by  the two parameters MaxFieldLength (request) and MaxRequestBytes (request head and body) in the registry (HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\\HTTP Parameters).So,we must do something on the  two parameters . Read more

Solution of Uncaught TypeError: Object #has no method in WordPress

Recently on the local computer to test wordpress ,jquery reported Uncaught TypeError: Object # has no method.The reason maybe jquery library conflict, but think of this theme is being used in the current site (website is no problem), in addition to load the jQuery library and some jQuery code, no additional jQuery code. So it should not be a problem here.

Then i think maybe the wordpress plugin caused the problem.After checking contrast, found that localthe the WP-PostViews plug even automatically load jquery library. Read more

How to Fix Can Not Find the Openssl Library Files to Compile PHP in 64 Bit Operating System

Recently when i compiled the php 5.4.5 in my 64 bit operating system,it appeared the following errors:

1.checking for DSA_get_default_method in -lssl... yes  
2.checking for X509_free in -lcrypto... yes  
3.checking for pkg-config... /usr/bin/pkg-config  
4.configure: error: Cannot find OpenSSL's libraries 

There are my specified parameters of the compiler:

1./configure \
2.--prefix=/usr/local/services/php-5.4.5 \ Read more

How to Enable Zend Optimizer With Godaddy Host ?

Does Godaddy support Zend Optimizer ? The answer is yes.Both Web hosting and Virtual Dedicated Server support Zend Optimizer .You just need make a set.There are several situations:

1.Php 5.2 or earlier.

To enable Zend Optimizer on your hosting account, you must disable APC(Alternative PHP Cache ).You must either modify or create a php5.ini file in your root directory like this: Read more

Bind the IP and MAC Addresses in Windows and Linux

To do arp binding Gateway in Windows.

1.Find the gateway address of local network segment, such as

Cocuments and Settings>arp -a
Interface: --- 0x2
Internet Address Physical Address Type 00-01-02-03-04-05 dynamic

The gateway arp address is dynamic.

2.Write a batch file arpbinding.bat, which reads as follows.

@ echo off
arp-s 00-11-22-33-44-55
Read more

Solution to Fix DNS Server Error

DNS is the Domain Name System. Every website address connects to a domain name; for example, and are both domain names. IP addresses are actually what we are connecting to on the Internet. DNS was produced in order to make webpages easier to access, for each one server IP address assigned a domain name. A DNS server error happens when one can't access the IP address that corresponds with the domain name.

DNS server errors may be caused by the DNS server being switched off or having undergone a harmful error of some kind. Links Read more

Six Ways to Solve WordPress Lost Password

Six ways to solve WordPress lost password

Sometimes,because this or that reasons,you could lost the WordPress password.If it happened,what can we do to  find the WordPress lost password? There are six methods to get the WordPress lost password.

1.Reinstall WordPress. We do not recommend this method, reinstall the WordPress you would download the WordPress code again and it is too much trouble. It is the worst method.

2.Use the WordPress forgot password feature. WordPress supports mail password recovery feature.If the administrator's e-mail account is valid, in the login interface, click the "forgot your password? " link, after you enter the correct email address, you can receive a password reset message.Then you can reset your WordPress lost password.

3.Delete the WP-config.php file under the WP directory, and then you visit the Web site, which will let you repeat the last installation step, so that you can set a new password of your WordPress.

4.Login phpMyAdmin, find the wp_users table of the WordPress database, here you can see the default user admin,password is encrypted. Now, we can modify this data, find the user_pass field, delete its long data, write down your new password, for example, 123456.Then, you will see a drop down box function, select MD5. This is to encrypt your password with MD5 algorithm, then save. In this way, you can login your WordPress by this password.

5.Use SQL statements to modify the WordPress lost password. Login phpMyAdmin into the WordPress database and execute the following SQL statement:
UPDATE wp_users SET user_pass = MD5('PASSWORD') WHERE wp_users.user_login ='admin' LIMIT 1;

6.Use PHP codes to retrieve the WordPress lost password. PHP method is also using the SQL query statement,but provides a user interface. Copy the following code and save it as password-Reset.php file, upload to your WordPress root directory, and then run this file, enter the password to reset you lost WordPress password.

//password reset
if (empty($_POST['emergency_pass'])) {
<form method="post">
set admin password: <input name="emergency_pass" type="password" />
<input type="submit" />
} else {
$sql = "UPDATE ".$wpdb->users." SET user_pass = '".md5($_POST['emergency_pass'])."' WHERE User_login = 'admin'";
$link = $wpdb->query($sql);

How to View the Private Twitter Tweets Profiles

How to View the Private Twitter Tweets Profiles
Twitter can a place for exchanging quick thoughts with the world, but some users prefer to your Twitter profiles updates private, so consider these protected tweets only those people, where they permission to follow them granted be. If a single user his tweets profiles is protected, you can not see the Tweets on the person, the Twitter account or other backdoor method. However, can a user protected tweets by you through the account of a successor.
To Twitter in your Web browser, and the name of the user of who its protected Twitter profiles updates you want to, follow. Click a pendant that can't find a private Twitter account on each icon of the user's follower list, until you. Record the name of the trailer. Read more

How to Set the Server with Windows 2000 as a Ntp Server

NTP (Network Time Protocol) is used to synchronize your system's time with an online server.
NTP can also be used to serve time for a network.

All Microsoft Windows versions since Windows 2000 include the Windows Time Service, which has the ability to sync the computer clock to an NTP server. However, the version in Windows 2000 only implements Simple NTP, and violates several aspects of the NTP version 3 standard.

First we study how to set the Windows 2000 time service as a NTP time-server. It shows how to modify registry entries to set the Microsoft Windows Time Service. The Windows Time service allows the network to provide synchronisation of all machines within one domain.

Configure Windows 2000 Time Service

Windows 2000 has an integrated time synchronisation service, installed by default, which can synchronise to a NTP Server. So, by manipulating registry settings, the service can do as both an SNTP client and SNTP server to synchronise other network clients.

Before modifying registry entries it is good to backup the registry settings. The registry can then be restored in the event of problems being encountered. Read more

How to Make Your Wireless Network More Secure

There is no such thing as a 100% secure network. But, the more you secure your network - the more time hackers will have to spend in order to gain access. In other words - potential intruders will NOT find it worth while trying to gain access.

In this article we will concentrate on basic security precautions concerning wireless access points (WAP), e.g. wireless routers.
Following the advice below will give you adequate WAP security.

Password Read more

How to Use the ARP Command to Bind the IP and MAC Address?

ISA Server does not provide control functions for the MAC address, Why? This is because the MAC address can only be used in the local network, when data packets across the router, the host in the packet source MAC address of the router the MAC address of the outbound interface instead, this time, use the MAC address The control does not apply. So long as the enterprise-level hardware or software firewall, have basically no control functions of the MAC address.

But Microsoft has also long been take into account this point, in Windows, if you install the TCP/IP network protocol component, then you can execute commands ARP. The ARP command is to look at the machine's ARP cache, static binding of IP address and MAC address and delete the static binding entry. In fact, the intention to bind the IP address and MAC address in order to reduce the ARP broadcast traffic, and only can use this function to control the use of IP addresses. Read more

Several Ways to Generate a Random Password Using PHP

Several Ways to Generate a Random Password Using PHP 

Using PHP to develop applications, especially web application is often necessary to generate a random password to generate a random password, such as user registration, user reset the password to generate a random password. Random password is a string of fixed-length string, I collected several methods to generate a random string for your reference.

Way 1:

1. In 33 - 126 to generate a random integer, such as 35.

2. 35 will be converted into the corresponding ASCII characters, such as 35 corresponding to #. Read more

The Complete Error Codes in ADSL Connection Service Part 2

The complete error codes in ADSL connection service part 2

ADSL Error Code - Description

700 The expanded command in the device .INF file is too long.
701 The device moved to a BPS rate not supported by the COM driver.
702 Device response received when none expected.
707 X.25 diagnostic indication.
708 The account has expired.
709 Error changing password on domain.
710 Serial overrun errors were detected while communicating with your modem.
711 RasMan initialization failure. Check the event log.
712 Biplex port is initializing. Wait a few seconds and redial.
713 No active ISDN lines are available.
714 Not enough ISDN channels are available to make the call.
715 Too many errors occurred because of poor phone line quality.
716 The Remote Access IP configuration is unusable. Read more

The Complete Error Codes in ADSL Connection Service Part 1

The complete error codes in ADSL connection service part 1

ADSL Error Code    -     Description

600 An operation is pending.
601 The port handle is invalid.
602 The port is already open.
603 Caller‘s buffer is too small.
604 Wrong information specified.
605 Cannot set port information.
606 The port is not connected.
607 The event is invalid.
608 The device does not exist.
609 The device type does not exist.
610 The buffer is invalid.
611 The route is not available.
612 The route is not allocated.
613 Invalid compression specified.
614 Out of buffers.
615 The port was not found.
616 An asynchronous request is pending.
617 The port or device is already disconnecting.
618 The port is not open.
619 The port is disconnected.
620 There are no endpoints. Read more

Wireless Encryption WEP, WPA, WPA2 Which Anti-Rub Network Better and More Secure?

Wireless encryption WEP, WPA, WPA2 which anti-rub network better and more secure?
Two common encryption WEP, WPA

Currently, the wireless network already exists in several encryption technology, the most commonly used is WEP and WPA encryption. The first wireless LAN security protocol -802.11 Wired Equivalent Privacy (WEP), has been doubtful of most people. While WEP can prevent snoopers into the wireless network, but there was reason to doubt its safety, because WEP is very easy to crack, like a plastic lock on the door.

WEP security encryption. WEP feature uses the algorithm rc4 prng developed by rsa data Read more

Six Skills of Browsing Webs safely

Six Skills of Browsing Webs safely
I believe the Internet security affects every Internet user, how can we ensure our own security from external attack, and then, here are eight skills to share for everyone, I hope you can add and discuss.

1.Ensure the Internet environment is safe

Access Internet in our own homes. Because we can not confirm the other computer is safe,but we can ensure our family's computer security. Read more

Why the IE browser can not open the website at the beginning with “https”?

Why the IE browser can not open the website at the beginning with "https"?
Recently here is some problems with IE browser, any URL at the beginning of "https" can not be opened! Even Gmail is impossible, what the protocol is damaged ? Read more

Five Little Internet Skills

When we browse the  web sites first time ,we have no experience at internet skills,there are five little internet skills for the novice.

The first one: sometimes when browsing the web, one site has not be read, but we want to open a new link, you can right click and select "Open link in a new window", or hold down [Shift] and click the mouse left-click, that you can open the page in a new window.
The second one: most web pages are "www.***.com" form, when you open a web page so you can type "***" in the address bar , then click [Ctrl] + [Enter] this can  launch this site fast.
The third one: some sites every time we have to browse on the internet, first enter the site, then click the menu [Tools] → [Internet Options] choose to use the current page, and then confirm, so whenever you open IE, the page you selected  will automatically open. Read more

What is DDOS attack? Is there any way defense?


DDOS is an acronym of Distributed Denial of Service . And what is the denial of service ? Can be understood, all can lead to legitimate users don't access the normal behavior of network services are considered denial of service attacks. The purpose of denial of service attack is very clear, that is normal to prevent legitimate users access to network resources, so as to achieve the attacker's ulterior motives.

 It is also a denial of service attack, DDOS and DOS is different, DDOS attack strategies focused on by many zombie hosts (the host the attacker hacked or indirect use of )sends to the victim host a large number of seemingly legitimate network packets, resulting in network congestion or server resource exhaustion denial of service, distributed denial of service attack, once implemented, will attack like a flood of network packets flock to the victim host, thus bring the legitimate users of network packet flooding, leading to legal user can not access the network resources on severs. Therefore, denial of service attack has been called the "flood attacks," there is a Read more