The document discusses configuring and installing Squid and DNSPod. It provides instructions on installing Linux, downloading Squid, configuring Squid, editing configuration files, and modifying hosts files. The goal is to set up Squid caching and DNS services using DNSPod for domain name resolution.
CALM DURING THE STORM:Best Practices in Multicast SecurityJohnson Liu
Internet multicast introduces a range of new security threats to a network. These threats are not necessarily any more or less destructive than those found in unicast-only networks, but they represent a new class of vulnerability that may be unfamiliar to those with minimal multicast experience. Juniper Networks® Junos® operating system offers the most comprehensive set of features in the industry for securing a multicast infrastructure. This expertise comes from lessons learned after more than a decade of deployment experience in the world’s largest Internet backbones. The following is a detailed set of recommended best practices for securing a multicast infrastructure of Juniper Networks routers.
CONTENT
INTRODUCTION 7
ASCII “.VN” COUNTRY CODE TOP LEVEL DOMAIN 9
1. “.VN” IN THE WORLD 10
2. “.VN” GROWTH OVER THE YEARS 11
2.1 “.vn” cumulative number and growth rate 11
2.2 “.vn” new registrations and growth rate 12
2.3 New registrations by registrar 14
2.4 New registration breakdown 15
2.4.1 New registrations by geographical area 15
2.4.2 New registrations by registrant 15
2.4.3 New registrations by extension 16
3.“.VN” DOMAIN NAME BREAKDOWN BY CATEGORY 16
3.1 Domain breakdown by extension 17
3.2 Domain breakdown by geographical area 17
3.3 Domain breakdown by registrant 19
3.4 Domain breakdown by business sector 20
3.4.1 “.vn” registration in educational sector 20
3.4.2 “.vn” registration government authority sector 21
3.5 Length of domain name 22
4.“.VN” DOMAIN NAME USAGE 23
4.1. Web Hosting 23
4.2 DNS Hosting 25
5. TOP 50 “.VN” DOMAIN NAMES MOST
QUERIED IN 2015 26
6.“.VN” ACCREDITED REGISTRAR SYSTEM 27
Market share of registrars
12.1 Market share of registrars 27
6.2. Market share of registrars in the northern region 28
1. VIETNAMESE DOMAIN NAME (IDN “.VN”) GROWTh 32
2. IDN “.VN” BREAKDOWN 33
2.1 IDN “.vn” breakdown by registrant 33
2.2 IDN “.vn” breakdown by geographical area 33
3. IDN “.VN” SERVICE USAGE 33
3.1 Service breakdown 33
3.2 Service usage breakdown by geographical area 34
4. TOP 50 IDN “.VN” MOST QUERIED IN 2015 34
INTERNATIONAL DOMAIN NAMES USED IN VIET NAM 37
1. INTERNATIONAL DOMAIN NAME USAGE IN VIET NAM
\ 38
1.1 International domain name breakdown 38
1.1.1 gTLDs vs ccTLDs (not “.vn”) 38
1.1.2 gTLD queries breakdown by extension 38
1.1.3 Top 20 ccTLDs most queried in Viet Nam 39
1.2 Average length of gTLDs queried in Viet Nam 39
XAdES Specification based on the Apache XMLSec Project Krassen Deltchev
This B.Sc. project thesis is presented to the
Department of Electrical Engineering and Information Sciences
of the Ruhr-University of Bochum
Chair of Network and Data Security
of the Ruhr-University of Bochum,
Horst-Görtz Institute,
Prof. Jörg Schwenk
Abstract:
XML Advanced Electronic Signature (XAdES) provides basic authentication and integrity protection, and
satisfies the legal requirements for advanced electronic signatures.There are several implementations of
XAdES, but most of them are not OpenSource, or are partialy proprietary software. Great project concerned
with Digital Electronic Signatures is the OpenSource Apache XML Security Project. For the developer and
common user there is an implementation for the XMLDSIG specification, but still no one for XAdES.
The free source code implemetations of XAdES threat this project as a separate one and there is no interface,
which can explicit assemble them into the Apache XML Sec. That’s why, the scope of our project is to create
a library, that implements XAdES into the OpenSource Apache XML Security- to extend its functionality
and level of security, so using the Apache XML Sec, gives the opportunity to handle Advanced Electronic
Signatures, which is a standard of security nowadays.
The library is developed in Java, because shouldn’t be any kind of OS platform - dependencies, using it as a
plug-in to the Security Project of Apache.
More detailed, to validate the signing and verifying of signatures, and also test our code, we use the text-
based test suite of JUnit.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
6. 2
P4 2G
DVD R+ CD-R 6
DVD CD RW
CentOS ISO
http://ftp.ncnu.edu.tw/Linux/CentOS/5.0/isos/i386/
http://ftp.cse.yzu.edu.tw/pub/CentOS/5.0/isos/i386/
http://ftp.cs.pu.edu.tw/Linux/CentOS/5.0/isos/i386/
http://ftp.tcc.edu.tw/Linux/CentOS/5.0/isos/i386/
http://mirror.mirr4u.com/centos/5.0/isos/i386/
http://mirror.tini4u.net/centos/5.0/isos/i386/
http://mirror.averse.net/centos/5.0/isos/i386/
CentOS-5.0-i386-bin-1of6.iso
…
CentOS-5.0-i386-bin-6of6.iso
CD 6 DVD
CentOS-5.0-i386-bin-DVD.iso
naizhao.com
A B
A B CDN B A
A IP 1.1.1.1 B IP 2.2.2.2
OK ISO
DNS
Page 6 of 34
9. 2. DNS DNSPod
DNS NS DNS TTL
172800 48 TTL
NS 48 48
DNS A
DNS 47
A * *DNS
B DNS B * *DNS
* *DNS * *
DNS 48
DNS 2-3
DNS
DNS TTL 3600
36000 10 10 DNS DNS
ADSL MODEM DNS
10 DNS
DNS
1. DNS
2. DNS DNSPod 6 DNS
4 2
diy.hichina.com 6
DNSPod 6 DNS .net .com
ns1.dnspod.net
ns2.dnspod.net
ns3.dnspod.net
ns4.dnspod.net
ns5.dnspod.net
ns6.dnspod.net
ISO
Linux
Page 9 of 34
21. C.
6.
VIM
CentOS yum /etc/yum.repos.d/CentOS-Base.repo
vi
vi /etc/yum.repos.d/CentOS-Base.repo
vi
yum mirrorlist=
# #mirrorlist=
vi :%s/a/b/g a b g
:%s/mirrorlist=/#mirrorlist=/g
url #baseurl= #
:%s/#baseurl=/baseurl=/g
OK
centos be10.com http://mirror.be10.com/
centos url
http://mirror.be10.com/centos/
http://mirror.centos.org/centos/
url be10.com centos.org
centos.org be10.com
:%s/centos.org/be10.com/g
yum update
y
y
Page 21 of 34
22. 5
Linux
Squid
1.Linux
A.
Windows
Linux Windows Linux
zip rar
rpm redhat suse deb debian ubuntu
yum rpm apt deb
tar.gz tar.bz2
yum install php (yum)
apt-get install php5(apt)
yum search php(yum)
apt-cache search php(apt)
B.
1.
configure 2. make 3. make install
a.
configure
Makefile Linux
configure
b.
configure Makefile
c.
make install
C.
/usr/local php /usr/local/bin/php
php.ini /usr/local/lib/php.ini configure
--prefix prefix ./configure --
Page 22 of 34
23. prefix=/usr/local/php
/usr/local/php/bin/php /usr/local/php/lib/php.ini
D. configure
configure --prefix ./configure --help --
enable- --with- --disable- --without-
E.
Linux Windows Windows Linux
yum remove php(yum)
apt-get remove php5(apt)
make uninstall
make uninstall
php mysql mysql
php mysql php mysql
mysql php mysql
F. make clean
make clean
make install make clean
2.
Windows CPU
Windows
CPU Linux
CPU
CPU
CPU
export CFLAGS CXXFLAGS configure
make
Pentium 4 CPU Intel(R) Pentium(R) 4 CPU XXXXMHz cpu
family: 15 model: 0/1/2
export CHOST="i686-pc-linux-gnu"
export CFLAGS="-march=pentium4 -O2 -pipe -fomit-frame-pointer"
export CXXFLAGS="${CFLAGS}"
Page 23 of 34
24. CPU
cat /proc/cpuinfo
processor :0
vendor_id : AuthenticAMD
cpu family : 15
model : 47
model name : AMD Athlon(tm) 64 Processor 3200+
stepping :2
cpu MHz : 2000.336
cache size : 512 KB
fdiv_bug : no
hlt_bug : no
f00f_bug : no
coma_bug : no
fpu : yes
fpu_exception : yes
cpuid level : 1
wp : yes
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush
mmx fxsr sse sse2 syscall nx mmxext fxsr_opt lm 3dnowext 3dnow up pni lahf_lm ts fid vid ttp tm
stc
bogomips : 4002.57
AMD Athlon 64 3200+ CPU
CPU cpu family model
http://gentoo-wiki.com/Safe_Cflags
3. Squid
1024
1024 1024 Squid Squid
a. squid squid
b.squid squid squid
/usr/include/bits/typesizes.h
/usr/include/linux/posix_types.h
vi
#define __FD_SETSIZE 1024
1024 65536
65536 Linux
Page 24 of 34
25. C/C++ squid
ssh
(.profile .bash_rc)
pietty
export
ulimit ulimit
ulimit -Hs 65536
ulimit -n 65536
H s n
wget squid
wget http://www.squid-cache.org/Versions/v2/2.6/squid-2.6.STABLE13.tar.gz
wget unix
Page 25 of 34
26. 6
tar
tar zxvf squid-2.6.STABLE13.tar.gz
squid-2.6.STABLE13
cd squid-2.6.STABLE13
configure cflags CPU intel core duo cpu
family 6,model 14 http://gentoo-wiki.com/Safe_Cflags#Intel_Core_Solo.2FDuo
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=prescott -O2 -pipe -fomit-frame-pointer"
CXXFLAGS="${CFLAGS}"
export
export CHOST="i686-pc-linux-gnu"
export CFLAGS="-march=prescott -O2 -pipe -fomit-frame-pointer"
export CXXFLAGS="${CFLAGS}"
env
configure squid /usr/local/squid
./configure --prefix=/usr/local/squid --enable-follow-x-forwarded-for --enable-storeio=aufs,ufs
--with-maxfd=65536 --with-pthreads --enable-dlmalloc --enable-poll --enable-stacktraces --enable-
removal-policies=heap,lru --enable-delay-pools
./configure --help
configure ./
configure linux ./
bin/run ./bin/run
checking for …
configure
config.status: creating tools/Makefile
config.status: creating include/autoconf.h
config.status: executing depfiles commands
[root@cnc squid-2.6.STABLE13]#
make
make[2]: Leaving directory `/root/squid-2.6.STABLE13/tools'
make[1]: Leaving directory `/root/squid-2.6.STABLE13/tools'
make[1]: Entering directory `/root/squid-2.6.STABLE13'
Page 26 of 34
27. make[1]: Nothing to be done for `all-am'.
make[1]: Leaving directory `/root/squid-2.6.STABLE13'
[root@cnc squid-2.6.STABLE13]#
make install
make[2]: Leaving directory `/root/squid-2.6.STABLE13'
make[1]: Leaving directory `/root/squid-2.6.STABLE13'
[root@cnc squid-2.6.STABLE13]#
error
cflags
make clean make configure
squid /usr/local/squid
[root@cnc squid-2.6.STABLE13]# cd /usr/local/squid
[root@cnc squid]# ls -lh
total 72K
drwxr-xr-x 2 root root 4.0K Jul 7 02:27 bin
drwxr-xr-x 2 root root 4.0K Jul 7 02:27 etc
drwxr-xr-x 2 root root 4.0K Jul 7 02:27 libexec
drwx------ 2 root root 16K Jun 15 08:09 lost+found
drwxr-xr-x 3 root root 4.0K Jul 7 02:27 man
drwxr-xr-x 2 root root 4.0K Jul 7 02:25 sbin
drwxr-xr-x 4 root root 4.0K Jul 7 02:25 share
drwxr-xr-x 3 root root 4.0K Jul 7 02:25 var
[root@cnc squid]#
squid
Page 27 of 34
28. 7
1. hosts
squid CDN squid CDN
squid
squid apache web
web
squid naizhao.com
DNS squid dns naizhao.com
2.2.2.2 IP IP
1.1.1.1 naizhao.com IP
1.1.1.1
IP hosts dns
Windows hosts linux
vim dns hosts
hosts
linux hosts /etc/hosts Windows
1.1.1.1 naizhao.com www.naizhao.com cnc.naizhao.com
1.1.1.1
2. squid
squid /usr/local/squid/etc/squid.conf
squid
rm squid.conf
squid.conf.default linux apache .default
squid.conf vi squid.conf
http_port 80 vhost vport=80
acl apache rep_header Server ^Apache
broken_vary_encoding allow apache
cache_mem 1024 MB
maximum_object_size 4096 KB
minimum_object_size 0 KB
maximum_object_size_in_memory 256 KB
cache_dir ufs /var/spool/squid 20480 16 256
cache_swap_low 80
cache_swap_high 97
strip_query_terms off
request_body_max_size 5 MB
memory_pools on
memory_pools_limit 50 MB
access_log none
cache_log /var/log/squid/cache.log
Page 28 of 34
31. squid nobody:nobody
chown nobody:nobody /var/spool/squid
ls -lh
ls -lh /var/spool/
……
drwxr-xr-x 3 nobody nobody 4.0K Jun 15 08:19 squid
squid 16 256
squid
squid /usr/local/squid/sbin squid
./squid -h
Usage: squid [-hvzCDFNRYX] [-d level] [-s | -l facility] [-f config-file] [-u port] [-k signal]
-d level Write debugging to stderr also.
-f file Use given config-file instead of
/usr/local/squid/etc/squid.conf
-h Print help message.
-k reconfigure|rotate|shutdown|interrupt|kill|debug|check|parse
Parse configuration file, then send signal to
running copy (except -k parse) and exit.
-s | -l facility
Enable logging to syslog.
-u port Specify ICP port number (default: 3130), disable with 0.
-v Print version.
-z Create swap directories
-C Do not catch fatal signals.
-D Disable initial DNS tests.
-F Don't serve any requests until store is rebuilt.
-N No daemon mode.
-R Do not set REUSEADDR on port.
-S Double-check swap during rebuild.
-X Force full debugging.
-Y Only return UDP_HIT or UDP_MISS_NOFETCH during fast reload.
-z
./squid -z
2007/07/07 07:52:03| Creating Swap Directories
ls /var/spool/squid
squid
Page 31 of 34
32. ./squid -Nd 10
2007/07/07 07:53:50| Starting Squid Cache version 2.6.STABLE13 for i686-pc-linux-gnu...
2007/07/07 07:53:50| Process ID 3135
2007/07/07 07:53:50| With 1024 file descriptors available
2007/07/07 07:53:50| Using poll for the IO loop
2007/07/07 07:53:50| Performing DNS Tests...
2007/07/07 07:53:50| Successful DNS name lookup tests...
2007/07/07 07:53:50| DNS Socket created at 0.0.0.0, port 1026, FD 4
2007/07/07 07:53:50| Adding nameserver 211.147.6.3 from /etc/resolv.conf
2007/07/07 07:53:50| Adding nameserver 61.233.9.9 from /etc/resolv.conf
2007/07/07 07:53:50| Unlinkd pipe opened on FD 8
2007/07/07 07:53:50| Swap maxSize 20971520 KB, estimated 1613193 objects
2007/07/07 07:53:50| Target number of buckets: 80659
2007/07/07 07:53:50| Using 131072 Store buckets
2007/07/07 07:53:50| Max Mem size: 1048576 KB
2007/07/07 07:53:50| Max Swap size: 20971520 KB
2007/07/07 07:53:50| Store logging disabled
2007/07/07 07:53:50| Rebuilding storage in /var/spool/squid (DIRTY)
2007/07/07 07:53:50| Using Least Load store dir selection
2007/07/07 07:53:50| Set Current Directory to /var/spool/squid
2007/07/07 07:53:50| Loaded Icons.
2007/07/07 07:53:52| Accepting accelerated HTTP connections at 0.0.0.0, port 80, FD 7.
2007/07/07 07:53:52| Accepting ICP messages at 0.0.0.0, port 3130, FD 9.
2007/07/07 07:53:52| WCCP Disabled.
2007/07/07 07:53:52| Ready to serve requests.
2007/07/07 07:53:52| Done scanning /var/spool/squid (0 entries)
2007/07/07 07:53:52| Finished rebuilding storage from disk.
2007/07/07 07:53:52| 0 Entries scanned
2007/07/07 07:53:52| 0 Invalid entries.
2007/07/07 07:53:52| 0 With invalid flags.
2007/07/07 07:53:52| 0 Objects loaded.
2007/07/07 07:53:52| 0 Objects expired.
2007/07/07 07:53:52| 0 Objects cancelled.
2007/07/07 07:53:52| 0 Duplicate URLs purged.
2007/07/07 07:53:52| 0 Swapfile clashes avoided.
2007/07/07 07:53:52| Took 2.0 seconds ( 0.0 objects/sec).
2007/07/07 07:53:52| Beginning Validation Procedure
2007/07/07 07:53:52| Completed Validation Procedure
2007/07/07 07:53:52| Validated 0 Entries
2007/07/07 07:53:52| store_swap_size = 0k
2007/07/07 07:53:53| storeLateRelease: released 0 objects
http://2.2.2.2 Access Denied squid
-d squid
ctrl+c killall squid squid squid
Page 32 of 34
33. 8
1.
Squid www.naizhao.com 2.2.2.2 IP
DNSPod 2.2.2.2
IP IP 2.2.2.2 hosts
Squid hosts
Squid hosts
hosts curl Linux/Unix
Windows D:
http://curl.haxx.se/latest.cgi?curl=win32-nossl 32
http://curl.haxx.se/latest.cgi?curl=win64-nossl 64
curl.exe
2. Squid
squid
cd /usr/local/squid/sbin
./squid -Nd 1
http://www.naizhao.com
squid
squid
3. Squid
curl Windows curl
curl -I http://www.naizhao.com/
HTTP/1.0 200 OK
Date: Sun, 08 Jul 2007 12:16:27 GMT
Server: NaiZhao Web Server/1.0.0
Last-Modified: Wed, 13 Dec 2006 06:11:14 GMT
ETag: "7665b-1983-4417e480"
Accept-Ranges: bytes
Content-Length: 6531
Vary: Accept-Encoding
Content-Type: text/css
Age: 29155
X-Cache: MISS from cnc.naizhao.com
Via: 1.0 cnc.naizhao.com:80 (squid/2.6.STABLE13)
Connection: close
MISS
X-Cache: MISS from cnc.naizhao.com
curl -I http://www.naizhao.com/
Page 33 of 34
34. HTTP/1.0 200 OK
Date: Sun, 08 Jul 2007 12:16:27 GMT
Server: NaiZhao Web Server/1.0.0
Last-Modified: Wed, 13 Dec 2006 06:11:14 GMT
ETag: "7665b-1983-4417e480"
Accept-Ranges: bytes
Content-Length: 6531
Vary: Accept-Encoding
Content-Type: text/css
Age: 29155
X-Cache: HIT from cnc.naizhao.com
Via: 1.0 cnc.naizhao.com:80 (squid/2.6.STABLE13)
Connection: close
HIT
MISS
Last-Modified: Wed, 13 Dec 2006 06:11:14 GMT
squid squid
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
no-store no-cache must-revalidate squid
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
Squid
4. Squid
ulimit -Hs 65536
ulimit -n 65536
./squid
squid
http://www.naizhao.com
5. Squid
CentOS Squid /etc/rc.local
ulimit -Hs 65536
ulimit -n 65536
/usr/local/squid/sbin/squid
Page 34 of 34