【Re:CREATORS】完结撒花?

画面好美,双屏的可以用来做壁纸了。

4vfdG.png

阅读详细 »

[转]【开源】WeiUZ CloudFlare Partners PHP版本

WeiUZ CloudFlare Partners PHP版本

请先在cloudflare.class.php里设置你的Partners KEY

演示地址:https://cloudflare.weiuz.com/

4vms1.png

阅读详细 »

今天B站的骑士魔法出现播放事故

调好闹钟起床来看番,结果这什么鬼,字幕居然是上一集的。

4vQfo.png
4vNr6.png

锅全丢给了后期君,估计B站是没有对要播放的片子审核的?这次弄错的是字幕文件,要是弄错的是视频文件,弄了个鬼父上去也等开播了大家来反馈他们才知道吗?

两个实用的远程管理工具RDCMan,Transmission Remote GUI

RDCMan全称Remote Desktop Connection Manager(多远程桌面管理)是微软一款免费的远程桌面管理软件,但非系统自带需独立安装,之所以以第一个推荐它,是因为其相比下面的软件功能简单、易用、小巧,无其他多余需求仅对windows主机进行远程管理的情况下RDCMan首选推荐

下载地址:
Remote Desktop Connection Manager 2.7
官方链接为:
Remote Desktop Connection Manager 2.7


Transmission Remote GUI 是一款图形化的Transmission管理工具,直接连接远程的Transmission进行管理,刷PT,BT都很方便。

4uaxX.png

下载地址:
Transmission Remote GUI-5.0.1

搬瓦工(Bandwagon Host)推出了CN2套餐

搬瓦工现在也出了CN2的KVM套餐了,似乎据说还准备出香港机房?不知道价格会如何呢。

Hello,

Bandwagon Host CN2 test links:


  • USA West coast (California – Los Angeles DC8 CN2, KVM plans)


http://23.252.99.102/100mb.bin
http://23.252.99.102/500mb.bin
http://23.252.99.102/1000mb.bin

Test IP: 23.252.99.102


SPECIAL 10G KVM PROMO V3 – LOS ANGELES – CN2
SSD: 10 GB RAID-10
RAM: 512 MB
CPU: 1x Intel Xeon
Transfer: 500 GB/mo
Link speed: 1 Gigabit

Location: Los Angeles (no other locations available on this plan)
Direct route via CN2 – China Unicom will be added soon

VPS technology: KVM/KiwiVM
OS: 32 or 64 bit Centos, Debian, Ubuntu
Instant OS reload
IPv4: 1 dedicated address
IPv6 support: No
Full root access
Instant RDNS update from control panel
No contract, anytime cancellation
Strictly self-managed, no support
99.5% uptime guarantee


无AFF:https://bwh1.net/cart.php?&pid=56
AFF:https://bwh1.net/aff.php?aff=18047&pid=56

一个JAVA写的图床程序:lolibox

lolibox,一个JAVA图床,以前曾装过这个图床来玩,前段时间看有人问起这个图床的安装问题。趁着有空又装了一遍,顺便记录下安装步骤。转载本文请保留出处。

4L6vB.png

使用的环境:系统是阿里云新加坡的Ubuntu 16.04.2 LTS (GNU/Linux 4.4.0-47-generic x86_64)

  • 1.安装JAVA

去官网下载jdk-8u131-linux-x64.tar.gz上传服务器。

mkdir -p /usr/lib/jvm/
tar zxvf jdk-8u131-linux-x64.tar.gz  -C /usr/lib/jvm/
nano /etc/profile
最后加入:
export JAVA_HOME=/usr/lib/jvm/jdk1.8.0_131
export JRE_HOME=${JAVA_HOME}/jre
export CLASSPATH=.:${JAVA_HOME}/lib:${JRE_HOME}/lib
export PATH={JAVA_HOME}/bin:$PATH

update-alternatives --install /usr/bin/java java /usr/lib/jvm/jdk1.8.0_131/bin/java 300
update-alternatives --install /usr/bin/javac javac /usr/lib/jvm/jdk1.8.0_131/bin/javac 300
update-alternatives --config java
java  -version
显示:
java version "1.8.0_131"
Java(TM) SE Runtime Environment (build 1.8.0_131-b11)
Java HotSpot(TM) 64-Bit Server VM (build 25.131-b11, mixed mode)
  • 2.安装MAVEN

apt-get install Maven
mvn -version
显示:
Apache Maven 3.0.5
Maven home: /usr/share/maven
Java version: 1.8.0_101, vendor: Oracle Corporation
Java home: /usr/lib/jvm/jdk1.8.0_101/jre
Default locale: en_US, platform encoding: UTF-8
OS name: "linux", version: "3.13.0-36-generic", arch: "amd64", family: "unix"

APT安装不了的话就下载安装:

cd tmp
wget http://mirrors.tuna.tsinghua.edu.cn/apache/maven/maven-3/3.5.0/binaries/apache-maven-3.5.0-bin.tar.gz
tar zxvf apache-maven-3.5.0-bin.tar.gz
cd /opt
mv /tmp/apache-maven-3.5.0 .
cd /bin
ln -s /opt/apache-maven-3.5.0/bin/mvn mvn

mvn -v
Apache Maven 3.5.0 (ff8f5e7444045639af65f6095c62210b5713f426; 2017-04-04T03:39:06+08:00)
Maven home: /opt/apache-maven-3.5.0
Java version: 1.8.0_131, vendor: Oracle Corporation
Java home: /usr/lib/jvm/jdk1.8.0_131/jre
Default locale: en_US, platform encoding: UTF-8
OS name: "linux", version: "4.4.0-47-generic", arch: "amd64", family: "unix"
  • 3.然后就是按着步骤打包了

git clone https://github.com/chocotan/lolibox.git
cd lolibox
mvn clean package
./lolibox-server/target/lolibox-server-x.y.z-SNAPSHOT.jar

PS1:使用mvn clean package -Dmaven.test.skip的话可以跳过测试,不然可能卡在TEST那
PS2: X.Y.Z是版本号,要替换的,前面打包完会生成一个类似lolibox-server-0.2.3-SNAPSHOT.jar这样的JAR包。

项目地址:lolibox

服务器再次被人误删。我也很绝望。。

服务器再次被机房误删。。。博客,图床,网盘全挂。。

目前在查找最接近的备份进行恢复中。。。也在研究靠谱点的同步备份方式。。

这些事情实在令人心力憔悴。

我要取消圣何塞的机器保留LA的,结果圣何塞的还好好的,LA的给我删了。

SMB漏洞ms17-010补丁及勒索比特币病毒(WanaCrypt0r 2.0)的预防方法

之前一段时间就已经爆出了这个漏洞,似乎大家都没怎么重视,这次比特币勒索病毒大爆发了,大家估计都要紧张起来了,这里给出补丁直连地址和一些预防方法

一、windows系统windowsupdate预防

Win10 1703 (15063):默认处于不会感染的系统

Win10 1607 (14393)和windows server 2016:安装KB4013429

Win 10 1511 (10586):安装KB4013198

Win 10 1507 (10240):KB4012606

Win 8.1:KB4012213、KB4012216

Windows server 2012、windows server 2012 R2:KB4012213、KB4012214、KB4012216、KB4012217

Win 7 SP1和windows server 2008 R2:KB4012212、KB4012215

其他系统请到微软KB4012598中选择必要更新:http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598或下文直接下载补丁

1、确保135,137,139,445端口已通过路由器、端口策略,防火墙封闭的,或者其他安全工具(比如360NSA武器库免疫工具:http://dl.360safe.com/nsa/nsatool.exe)补丁过的,可以不打微软补丁,但若不清楚或者不确定的,请务必打上微软的补丁

2、2008和2003、XP必打,现在均有漏洞批量利用工具
2012和2016好一些没有大面积被黑,但是都建议打上对应补丁,因为没有批量利用工具做出来,不代表这个漏洞是无法利用的,有可能只是工具还没开发出来而已,打上更安全

除了以上必须更新以外,建议一并安装所有windowsupdate补丁。

注:CMD或win + R:输入「winver」查询系统版本号

二、关闭WanaCrypt0r 2.0入侵端口
2.1
需要使用到系统的防火墙,需要的同学请自行度娘或放狗搜索:「关闭445、135、137、139端口」。

2.2
关闭「SMB 1.0/CIFS 文件共享支持」

「控制面板」 – 「启用或关闭windows功能」 – 去掉「SMB 1.0/CIFS 文件共享支持」对勾,确认,重启。


注册表:
管理员权限:CMD:「reg add “HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesLanmanServerParameters” /v “SMB1” /t REG_DWORD /d 0 /f」

关闭SMB的危害:「如何启用和禁用 SMBv1、 SMBv2 和 SMBv3 窗口和 Windows 服务器中:https://support.microsoft.com/zh-cn/help/2696547/how-to-enable-and-disable-smbv1,-smbv2,-and-smbv3-in-windows-vista,-windows-server-2008,-windows-7,-windows-server-2008-r2,-windows-8,-and-windows-server-2012

以下为20170513微软最新发布的XP和2003特别版补丁

首发Hostloc.com,Captain整理,转载请务必保留此行
http://www.hostloc.com/thread-365738-1-1.html

20170513微软发布了Windows XP和Windows 2003的ms17-010特别版补丁,详情请看以下链接

https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/

winxp特别补丁 – KB4012598

winxp sp3 32位 Security Update for Windows XP SP3 (KB4012598)
http://download.windowsupdate.com/d/csa/csa/secu/2017/02/windowsxp-kb4012598-x86-custom-chs_dca9b5adddad778cfd4b7349ff54b51677f36775.exe

winxp sp2 64位 Security Update for Windows XP SP2 for x64-based Systems (KB4012598)
http://download.windowsupdate.com/d/csa/csa/secu/2017/02/windowsserver2003-kb4012598-x64-custom-enu_f24d8723f246145524b9030e4752c96430981211.exe


win2003特别补丁 – KB4012598

win2003 32位 Security Update for Windows Server 2003 (KB4012598)
http://download.windowsupdate.com/c/csa/csa/secu/2017/02/windowsserver2003-kb4012598-x86-custom-chs_b45d2d8c83583053d37b20edf5f041ecede54b80.exe

win2003 64位 Security Update for Windows Server 2003 for x64-based Systems (KB4012598)
http://download.windowsupdate.com/c/csa/csa/secu/2017/02/windowsserver2003-kb4012598-x64-custom-chs_68a2895db36e911af59c2ee133baee8de11316b9.exe

以下为2008R2 SP1、2012R2、2016补丁


2008R2 SP1补丁 KB4012212、KB4012215

March, 2017 Security Only Quality Update for Windows Server 2008 R2 for x64-based Systems (KB4012212)
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/02/windows6.1-kb4012212-x64_2decefaa02e2058dcd965702509a992d8c4e92b3.msu

March, 2017 Security Monthly Quality Rollup for Windows Server 2008 R2 for x64-based Systems (KB4012215)
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/03/windows6.1-kb4012215-x64_a777b8c251dcd8378ecdafa81aefbe7f9009c72b.msu


2012R2补丁 KB4012213、KB4012216

March, 2017 Security Only Quality Update for Windows Server 2012 R2 (KB4012213)
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/02/windows8.1-kb4012213-x64_5b24b9ca5a123a844ed793e0f2be974148520349.msu
March, 2017 Security Monthly Quality Rollup for Windows Server 2012 R2 (KB4012216)
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/03/windows8.1-kb4012216-x64_cd5e0a62e602176f0078778548796e2d47cfa15b.msu


2016补丁 KB4013429

Cumulative Update for Windows Server 2016 for x64-based Systems (KB4013429)
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/03/windows10.0-kb4013429-x64_ddc8596f88577ab739cade1d365956a74598e710.msu

以下为win7 SP1和win10 1607补丁


win7 SP1补丁 KB4012212、KB4012215

win7 SP1 32位
March, 2017 Security Only Quality Update for Windows 7 (KB4012212)
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/02/windows6.1-kb4012212-x86_6bb04d3971bb58ae4bac44219e7169812914df3f.msu

March, 2017 Security Monthly Quality Rollup for Windows 7 (KB4012215)
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/03/windows6.1-kb4012215-x86_e5918381cef63f171a74418f12143dabe5561a66.msu

win7 SP1 64位
March, 2017 Security Only Quality Update for Windows 7 for x64-based Systems (KB4012212)
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/02/windows6.1-kb4012212-x64_2decefaa02e2058dcd965702509a992d8c4e92b3.msu

March, 2017 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4012215)
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/03/windows6.1-kb4012215-x64_a777b8c251dcd8378ecdafa81aefbe7f9009c72b.msu


win10 1607补丁 KB4013429

win10 1607 32位
Cumulative Update for Windows 10 Version 1607 (KB4013429)
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/03/windows10.0-kb4013429-x86_8b376e3d0bff862d803404902c4191587afbf065.msu

win10 1607 64位
Cumulative Update for Windows 10 Version 1607 for x64-based Systems (KB4013429)
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/03/windows10.0-kb4013429-x64_ddc8596f88577ab739cade1d365956a74598e710.msu

参考资料:

  1. 勒索比特币病毒(WanaCrypt0r 2.0)的预防方法

  2. Win2003到2016各版服务器操作系统SMB漏洞ms17-010补丁地址

LNMP非正常关闭导致的NGINX出错

之前折腾机子,导致机子崩溃了,LNMP非正常关闭,开机后NGINX无法启动。

显示如下:

Stoping LNMP…
Stoping nginx… nginx: [alert] kill(6036, 15) failed (3: No such process)

  1. Use force-quit
    Shutting down MySQL. SUCCESS!

Gracefully shutting down php-fpm . done
Gracefully shutting down php-fpm . done
Starting LNMP…
Starting nginx… nginx (pid ) already running.
Starting MySQL.. SUCCESS!
Starting php-fpm done
Starting php-fpm done

查找资料后找到个军哥给的回复:

nginx非正常关闭后pid文件没被删除,可以 rm -f /usr/local/nginx/logs/nginx.pid
后再看一下

lnmp restart启动nginx失败

[锐速] [serverSpeeder] [lotServer]

以前装锐速一直都是手动安装,现在Vicer大佬写了个全自动安装脚本,可以自动检测网卡匹配内核等十分方便,推荐大家使用。

Shell script for Linux written by Vicer.
—–
*.完整破解验证机制,解决断流现象.
*.完善锐速启动脚本,修正Debian/Ubuntu不能正常自启动.


—–
1.支持自动检测公网网卡,采用官方检测网卡的方式.
2.支持自动匹配内核(可强制安装指定内核版本的锐速,此项专为CentOS设置,仅需查看锐速支持状况).
3.添加询问是否开启accppp功能.
(实测并开启后没有效果,开启前请确认安装了相关软件,否则会出现报错.)
4.默认设置为G口宽带.(听说设置大点可以提高速度)
5.支持一键完全卸载(此脚本安装的无残留).
6.完美支持官方renewLic命令.
7.所需文件均来自GitHub,完全公开.
8.不支持自动更换内核,请自行更换.(网上教程非常多)
9.不支持OpenVZ,不需要尝试,会告诉你找不到网卡.
吐槽:CentOS居然连which都要自己安装,内核那么多!
心好累.脚本将就着看吧.


除此脚本外,所有内容均来自互联网.本人不负任何法律责任,仅供学习使用.
1.使用前请日常update.
2.如果您是最小化安装系统,请确认您的系统能够执行ifconfig等命令.
3.关于配置,请查看文章最后手册调教手册,调教后效果更好.
4.如遇许可证错误,请用/appex/bin/serverSpeeder.sh renewLic命令更新许可证.
5.如需加速更大带宽,请点此自定义许可证,并手动替换.(默认带宽:1G.)


serverSpeeder Install:

wget --no-check-certificate -qO /tmp/appex.sh "https://raw.githubusercontent.com/0oVicero0/serverSpeeder_Install/master/appex.sh" && bash /tmp/appex.sh 'install'

serverSpeeder Uninstall:

wget --no-check-certificate -qO /tmp/appex.sh "https://raw.githubusercontent.com/0oVicero0/serverSpeeder_Install/master/appex.sh" && bash /tmp/appex.sh 'uninstall'

serverSpeeder Advance Install:

wget --no-check-certificate -qO /tmp/appex.sh "https://raw.githubusercontent.com/0oVicero0/serverSpeeder_Install/master/appex.sh" && bash /tmp/appex.sh '${Kernel Version}'

使用方法:
启动命令 /appex/bin/serverSpeeder.sh start
停止加速 /appex/bin/serverSpeeder.sh stop
状态查询 /appex/bin/serverSpeeder.sh status
更新许可 /appex/bin/serverSpeeder.sh renewLic
重新启动 /appex/bin/serverSpeeder.sh restart
调教手册: https://github.com/0oVicero0/serverSpeeder_Install/blob/master/lotServer.pdf

  1. GitHub项目地址

  2. serverSpeeder support

  3. [锐速] [serverSpeeder] [lotServer] by Vicer