Position: Home page » Ethereum » Ethereum CA

Ethereum CA

Publish: 2021-03-23 12:14:49
1. At the top of Ethereum is DAPP. It exchanges with the smart contract layer through Web3. JS. All smart contracts run on EVM (Ethereum virtual machine) and use RPC calls. Below EVM and RPC are the four core contents of Ethereum, including: blockchain, consensus algorithm, mining and network layer. Except DAPP, all other parts are in the Ethereum client. The most popular Ethereum client is geth (go Ethereum)
2. Do you want to learn blockchain development technology or just want to know what blockchain is? If it is the former, you can look at the code of other blockchain projects and learn about it first. If it is the latter, we can pay attention to some good blockchain we media. Blockchain is an emerging instry. There is no ready-made training course. It depends on self exploration and understanding.
3. The word composed of the letter caeth is: teach
teach [Ti & # 720; tʃ], Vt. teaching; Professor; Teaching; Vi. professors; Teaching; He taught me how to swim
she teaches in a state university.
4.

Symbiotic currency is a new currency in the chain area. Now it is hot. It can be said that it is a currency rising together with bitcoin

livetoken is a decentralized cryptocurrency developed by the symbiotic economy foundation on the symbiotic economy platform based on advanced blockchain technology in order to advocate and promote the development and growth of the future economic form - "symbiotic economy"

symbiotic coin (LVT) is a digital token issued by symbiotic chain, which is the medium to realize user value. Symbiotic coins are distributed through Internet applications, and users' behaviors and time in the process of using the Internet proce quantitative value. Symbiotic coin is based on blockchain technology, and all data point transactions will be recorded by blockchain to realize the fairness, openness and transparency of economic ecology. In the past few years, the development of digital currency represented by bitcoin, that is, with the past facts, has confirmed the value of blockchain technology and encrypted digital currency, enabling the realization of symbiotic economy with symbiotic currency as the medium

extended materials:

the concept of bitcoin was first proposed by Nakamoto in 2009. According to Nakamoto's ideas, the open source software was designed and released, and the P2P network on it was constructed. Bitcoin is a kind of P2P digital currency. Point to point transmission means a decentralized payment system

unlike most currencies, bitcoin does not rely on specific currency institutions. It is generated by a large number of calculations based on specific algorithms. Bitcoin economy uses the distributed database composed of many nodes in the whole P2P network to confirm and record all transactions, and uses the design of cryptography to ensure the security of all aspects of currency circulation. The decentralized nature and algorithm of P2P can ensure that it is impossible to artificially manipulate the value of bitcoin through mass proction. The design based on cryptography can make bitcoin only be transferred or paid by the real owner

This also ensures the anonymity of money ownership and circulation transactions. The biggest difference between bitcoin and other virtual currencies is that the total amount of bitcoin is very limited and it has a strong scarcity. The monetary system used to have no more than 10.5 million in four years, after which the total number will be permanently limited to 21 million

5. 1、 Installation and configuration of network devices

when installing Linux, if you have a network card, the installation program will prompt you to give the configuration parameters of TCP / IP network, such as the IP address of the local computer, the IP address of the default gateway, the IP address of DNS, etc, The installation program will automatically compile the network card (Linux system must first support) driver into the kernel. But we must understand the process of loading the network card driver, so we can easily operate when changing the network card and using multiple network cards in the future. The network card driver is loaded into the kernel as a mole, All the network card drivers supported by Linux are stored in the directory / lib / moles / (Linux version number) / net /, for example, the driver of Inter's 82559 series 10 / 100M self-adaptive boot network card is eepro100. O, 3Com's 3c509 isa network card is 3c509. O, dlink's PCI 10 network card is via Rhine. O, NE2000 compatible network card drivers are ne2k PCI. O and ne. O. after understanding these basic drivers, we can change the network card or add the network card by modifying the mole configuration file.

1. Modify the / etc / conf.moles file

this configuration file is an important parameter file to load the mole, Let's first look at a sample file

# / etc / conf.moles

alias eth0 eepro100

alias eth1 eepro100

this file is the content of conf.moles in a Linux system with two inter 82559 series network cards. The alias command indicates the name of the driver that the Ethernet port (such as eth0) has, If you use the command modprobe eth0, the system will automatically load eepro100. O into the kernel, Therefore, it is not necessary to use options in conf.moles to specify the IO address and interrupt number of the network card. However, corresponding to isa network card, you must specify the IO address or interrupt number of the hardware in conf.moles, as shown below, It shows a conf.moles file of NE isa NIC.

alias eth0 ne

Options ne IO = 0x300 IRQ = 5

after modifying the conf.moles file, you can use the command to load the mole, For example, to insert the second network card of inter:

? Insmod / lib / moles / 2.2.14/net/eepro100. O

in this way, the mole eepro100. O can be loaded at the Ethernet port, You can also use the command to view the currently loaded mole information:

[ root@ice /Etc] # lsmod

mole size used by

eepro100 15652 (autoclean)

the meaning of the returned result is that the currently loaded mole is eepro100, with 15652 bytes in size and two users, The method is to clear automatically.

2. Modify the / etc / lilo.conf file

in some relatively new Linux versions, because the operating system automatically detects all related hardware, there is no need to modify the / etc / lilo.conf file at this time, You can modify the lilo.conf file. Add the following command to the / etc / lilo.conf file:

append = & quot; ether=5,0x240,eth0 ether=7,0x300,eth1" <

the meaning of this command is that the IO address of eth0 is 0x240, the interrupt is 5, the IO address of eth1 is 0x300, and the interrupt is 7.

in fact, this statement comes from the parameter passed when the system boot image file,

Lilo: Linux ether = 5,0x240, eth0 ether = 7,0x300, eth1

this method can also make the Linux system configure two network cards, When using more than three network cards, you can follow the same method.

after configuring the network card, you should configure the TCP / IP parameters. In general, when installing the Linux system, you will be prompted to configure the network parameters, You can use the following commands:

? Ifconfig eth0 a.b.c.d netmask e.f.g.h

a.b.c.d is the IP address of eth0, and e.f.g.h is the netmask.

in fact, in Linux system, we can set multiple IP addresses for a network card, such as the following command:

? Ifconfig eth0: 1 202.112.11.218 netmask 255.255.192

then, Use the command "ifconfig - a" to see the interfaces of all network interfaces:

eth0 link encap:Ethernet HWaddr 00:90:27:58:AF:1A
inet addr:202.112.13.204 Bcast :202.112.13.255 M ask:255.255.255.192
UP BROADCAST RUNNING MULTICAST MTU:1500 M etric:1
RX packets:435510 errors :0 dropped:0 overruns :0 frame:2
TX packets:538988 e rrors:0 dropped :0 overruns:0 carrier :0
c ollisions:318683 txqueuelen :100
I nterrupt:10 Base address:0xc000

eth0:1 Link encap:Ethernet HWaddr 00:90:27:58:AF:1A
inet addr:202.112.11.218 Bcast :202.112.11.255 M ask:255.255.255.192
UP BROADCAST RUNNING MULTICAST MTU:1500 M etric:1
I nterrupt:10 Base address:0xc000 < br />
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask :255.0.0.0
UP LOOPBACK RUNNING MTU:3924 M etric:1
RX packets:2055 errors :0 dropped:0 overruns :0 frame:0
TX packets:2055 errors :0 dropped:0 overruns :0 carrier:0
c ollisions:0 txqueuelen : 0

we can see that there are three network interfaces, eth0, eth0:1, lo, Eth0 is the real Ethernet interface. Eth0:1 and eth0 are the same network card, but they are bound with another address. Lo is the sending address. Eth0 and eth0:1 can use IP addresses of different network segments, which is very useful when the same physical network segment uses different network addresses<

in addition, the network card has a mode of prosimc. In this mode, the network card will receive all the packets in the network. Some network monitoring tools under Linux, such as tcpmp and snort, all set the network card to hybrid mode.

the ifconfig command can change the IP address of the network card ring the running time, but if the system is restarted, the IP address of the network card will be changed, Linux still starts the network interface according to the original default settings. At this time, you can use netconfig or NETCONF command to reset the default network parameters. Netconfig command is to reconfigure the basic TCP / IP parameters, including whether to dynamically obtain IP address (dhcpd and BOOTP), IP address of network card, network mask, default gateway and preferred domain name server address. NETCONF command can configure all network parameters in detail, which is divided into three parts: client task, server task and other configuration. In the client configuration, it mainly includes the configuration of basic host (host name, valid domain name, network alias, IP address of corresponding network card, network mask, network device name, kernel driver of network device), DNS address configuration, default gateway address configuration, NIS address configuration, IPX interface configuration, PPP / slip configuration and so on. In the server configuration, it mainly includes the configuration of NFS, DNS, Apache webserver, samba and Wu ftpd. Among the other configuration options, one is about the host configuration in the / etc / hosts file, one is about the network configuration information in the / etc / networks file, and the last is about the configuration information using linuxconf

under the command of linuxconf, you can also configure the network information, but you can find that the linuxconf program calls NETCONF to configure the network

in addition, the system configuration files about the network are stored in the / etc / sysconfig / network scripts directory. Examples are as follows:

: & lt; br>& lt; br>
ifcfg-eth0 * ifdown post * ifup aliases * ifup PPP *
ifcfg-eth1 * ifdown PPP * ifup IPX * ifup routes *
ifcfg lo * ifdown sl * ifup PLIP * ifup sl *
ifdown @ ifup @ ifup post * network functions

ifcfg-eth0 is the configuration information of Ethernet port eth0, and its contents are as follows:

device = & quot; eth0" /* Specify the network device name * /
IPADDR = & quot; 202.112.13.204" /* Indicate the IP address of the network device * /
netmask = & quot; 255.255.255.192" /* Specify network mask * /
Network = 202.112.13.192 / * specify network address * /
broadcast = 202.112.13.255 / * specify broadcast address * /
onboot = & quot; yes" /* Indicates whether the network card is activated at system startup * /
bootproto = & quot; none" /* Indicates whether to use BOOTP protocol * /

therefore, we can also modify this file to change the network parameters under Linux[/ Size]

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -, It introces the files related to the configuration of Linux network services.

1. The configuration file of Lilo

in Linux system, there is a system boot program, Lilo (Linux loadin), which can be used to realize the selective startup of multiple operating systems. Its configuration file is / etc / lilo.conf.in this configuration file, the configuration parameters of Lilo are mainly divided into two parts, One is the global configuration parameters, including setting the boot device and so on. The other is the local configuration parameters, including the configuration parameters of each boot image file. I will not describe each parameter in detail here, but only two important parameters: password and restricted option. The password option adds password protection to each boot image file.

as we all know, In Linux system, there is a single user mode. In this mode, the user logs in to the Linux system as a super user. By adding parameters (Linux single or Linux init 0) ring Lilo boot, people can directly enter the single user mode super user environment without password, This will be very dangerous. So the password configuration option is added in lilo.conf to add password protection to each image file.

you can use the password option in global mode (add the same password to all image files), or add a password to each indivial image file, You may find it troublesome to enter the password every time. You can use the restricted option, which enables Lilo to check the password only when the parameters (such as Linux single) are entered ring Linux startup. These two options can greatly increase the security of the system, It is recommended to set them in lilo.conf file.

since password is stored in plaintext in / etc / lilo.conf file, it is necessary to change the attribute of / etc / lilo.conf file to only root readable (0400).

in addition, in the early version of Lilo, there was a limitation that the boot sector must be stored in the first 1024 cylinder, which was broken in Lilo version 2.51, After downloading and decompressing the latest version, use the command make & quot; Note: physical security is the most basic security, even if the password protection is added in lilo.conf, if there is no password protection in lilo.conf
6. Ifconfig - a view network related information
IP related parameter profile / etc / sysconfig / network scripts / ifcfg-eth0
/ etc / init. D / network restart
DNS profile / etc / resolv. Conf
when setting manually, first run ifdown eth0, and then run the command ifup eth0
your situation seems to be a wiring problem, there is no signal.
7. 把ifcfg-eth0和ifcfg-eth1的这段都去掉:
DEVICE=bond0
BOOTPROTO=static
NM_CONTROLLED=yes
ONBOOT=yes
TYPE=Ethernet
UUID="0019500b-2cfe-4408-9538-55ef903125ca"
IPADDR=172.23.45.195
NETMASK=255.255.255.192
GATEWAY=172.23.45.193
IPV6INIT=no
USERCTL=no
HWADDR=e4:1f:13:ec:ba:d2
PREFIX=26
DEFROUTE=yes
IPV4_FAILURE_FATAL=yes
NAME="System bond:0"
LAST_CONNECT=1352702377

新建ifcfg-bond0文件,只需以下内容:
DEVICE=bond0
ONBOOT=yes
BOOTPROTO=none
IPADDR=172.23.45.195
NETMASK=255.255.255.192
GATEWAY=172.23.45.193
BONDING_OPTS="''"

然后重启一下系统, 用service network restart怕弄不干净
8. Class of items and equipment < br /
< br /
< br / < br / < br / < br / < br /
< br / < br / < br / < br / < br / < br / < br / < br / < br / < br / < br / < br / < br / < br / < br / < br / < br / < br / < br / < br / < br / < br / < each of the five runrunes are < br / < br / < br / < br / < br / < br / < br / < br / < each of the first-35\\\\\
14 # dol
15 # hel
16 # IO
17 # lum
18 # Ko
19# And they will be the last members of the world's largest (20) lem < br / < br / \\\\\\\\\\\\\/ > 40 / 15: generally, there should be IAS or max after this place, Represents 40 ed / 15ias or 40 ed / 15max damage

ar: attack hit rate
as: attack speed
ds: critical strike attribute
CB: decisive strike
Kb: repel
ow: wound
MF: chance to obtain magic items, It generally refers to a kind of behavior
CBF: not frozen attribute
FHR: fast recovery strike
FCR: fast casting spell
MDR: rece magic damage
ITD: ignore target defense
IAS: increase fast attack speed
eth: irreparable disposable items
FRW: fast moving / running attribute
req: equipment requirements of items, generally including strong, Agility, rank, etc.
icob: increase the probability of resistance
leech: blood sucking / sucking magic power / experience value

pe: perfect emerald
pr: perfect ruby
pd: perfect white diamond slpg: broken gem, the lowest gem
wmpg: perfect gem

Cr: anti ice
fr: fire prevention
LR: anti electricity
PR: anti poison
CD: ice damage
FD: fire damage
LD: electric damage
PD: poison damage
MD: magic damage
res: resistance (four defenses)
def: Defense
dam: damage, DMG in the same way
Dr: rece physical damage, which is commonly known as Wumian
ed: increase damage, or enhance defense

BC: the most commonly refers to the small amulet that increases the probability of magic equipment occurrence by 6%, and another means idiot...
SC: small amulet, generally refers to the small Amulet of 7% MF, Common currency
LC: large amulet
GC: super large amulet
b & # 39; SC: the SC dropped by Baal, because of its high level, can wash out better attributes
n & # 39; SC: the SC dropped by niserak, because of its high level, can wash out better attributes
PDSC: a small talisman to increase poison damage, It generally refers to the small talisman of 100 poison damage
LGC: 1. The super talisman of mage's electric skill

CB: the blade of the giant god
CS: the sword of the giant god
Pb: the magic blade
MS: the sword of the secret instrument
SS: the assassin's close cut
amu: necklace, talisman, amulet, XL
wbow: bow of shelter
bow: bow of matriarch
Gris: Griswold & # 39; S Legacy Ranger essence set for short
cXXq: also cXXe, refers to the weapon with the cruel prefix and light / absorb the suffix. Generally speaking, these are the best
of the same kind of weapon. For example, ccbq, cwpq, CMSE, CSSE, cmbe and so on<
gmbow: generally refers to the bow in the Amazon suit

Lionheart: the language of the talisman lion heart
Fury: the language of the talisman fury
rhyme: the language of the talisman rhyme
White: the language of the talisman white, the wizard PK's good weapon
silence: the language of the talisman silence
smoke: the language of the talisman smoke

uni: dark gold items
GF: grandfather giant's blade, The best weapon of barbarian PVC
TT: dark gold Amazon javelin, also known as Titan
WF: wind power, dark gold nine headed snake bow; Water fish, mostly refers to players who don't understand the market
wt: boots of the battlefield
SOJ: stone of Jordan. The main currency in circulation of war net is
ear: string of ears, which is usually called Wumian belt, Another one is that PK people fall out of their ears
ire: usually refers to rother armor
Sun: rising sun
orb: eyeball or Witch skills
WMJ: Wu Mian armor
WMD: Wu Mian shield
WMK: Wu Mian helmet
game: usually refers to Wu Mian helmet
Room: Sword of dark gold champion
mesh: Wu Mian armor
Mara: Mara's Kaleidoscope Necklace
skin: each battle net has There are some differences, most of them refer to the dark gold flame skin plate armor, and some refer to the dark gold sea snake skin armor
Luna: one of the dark gold shields, which has the attribute of ice absorption
Star: dark gold devil meteor hammer
sash: Wumian belt
Dapao: people often say the cannon, Ballista / DP
bow: the bow of the dark gold Crusader
wmyd: Wumian belt
Raven: Crow
shako: dark gold cap, Junmao
Jordan: Jordan's stone ring
storm: Wumian shield, storm shield
bbface: array & 39; S face Slayer guard special dark gold helmet for barbarians
mallet: Schaefer & # 39; S hammer legendary mallet, the hand weapon of Ranger
Highlord: Highlord & 39; S wrath army's anger, also known as Dajun
Zakarum: dark gold Ranger special shield

Jew: jewel jewelry
JP: boutique, best
LJ: La Ji garbage
leg: leg. It's a must to open the cow level

IK: barbarian suit, short for Immortal King
tal: taraxia suit
naj: Witch suit
Nath: Assassin suit
sign: Xigang suit
laying: glove of disciple suit
mavina: short for Amazon mavina suit, or MVN

character skill class
this class generally has one characteristic, Abbreviations are all mastered by the first letter of each word of the skill, such as CN = = cold master witch's cold magic, AMZ
CS: Amazon's double strike skill
GA: Amazon's Guide arrow skill
LF: Amazon's lightning rage skill
MS: Amazon's row arrow skill
SM: Amazon's slow attack skill
Valk: Amazon's female warrior skill

ASN: assassin, As
cm: Assassin's claw mastery skill
DF: Assassin's dragon flying skill
LS: Assassin's lightning trap skill
MB: Assassin's shockwave skill
ts: Assassin's tiger strike skill
SM: Assassin's shadow master skill
cos: Assassin's phantom Cape skill

bar: barbarian, and BB, Ymr
Bo: barbarian fighting command skill
is: barbarian's steel skin skill
La: barbarian's jumping skill
NR: barbarian's natural resistance skill
SM: barbarian's sword mastery skill
ssbar: double sword barbarian or sword shield barbarian

dru: Druid
CA: Druid's storm armor skill
OS: Druid's Oak skill < br />Fury: Druid's rage skill

SOR: witch, There are also Sorc
es: Witch's energy shield skill
cm: Witch's ice mastery skill
FW: Witch's fire wall skill
LM: Witch's electricity mastery skill
TK: Witch's space taking skill
TP: Witch's blinking skill
ts: Witch's thundercloud skill
SF: Witch's electrostatic field skill
Hydra: Witch's Hydra skill
metal R: Witch's meteorite skill

pal: Ranger, as well as Pala, ally, xxdin
HF: Ranger's holy knot skill
HS: Ranger's Holy Shield skill
con: Ranger's concentrated aura skill, Conc is the same as
FOH: Ranger's heaven fist skill
ven: Ranger's Revenge skill
conv: Ranger's trial aura skill

NEC: Wizard, Similarly, Necro
BW: bone wall skill of wizard
Ce: Corpse Explosion skill of wizard
GM: puppet master skill of wizard
PN: poison Star Skill of wizard
Ig: Iron puppet skill of wizard
Im: iron virgin skill of wizard
LR: resistance rection skill of wizard
amp: damage enhancement skill of wizard
Dec: aging skill of wizard
br/ >
STR: strong
vit: vigor
Eng: energy
DEX: Agility
HP: life value
MP: Mana value

common words class

communication in the game has formed a unique culture. Understanding common phrases is the beginning of integrating into this culture...

=: etc.
b: Baal, the last leader
1: in the process of leading people, If the number is 2, it means danger
5T: five groups of enemies in front of Baal
88: goodbye, many of the same, such as BB, bye, 886, etc.
x #: X is the number in the middle of 1-33, which means the X talisman
BD: in the forum, this word generally means helping the top, BT: pervert
ah: Diablo
3Q: Thank you. There are many more, such as thx, XX, thax, 3x, etc.
4242: Yes, yes
555 ~ ~: cry
ACC: account name
Max: maximum damage
Min: minimum damage
x H: X is a number of 1-2, which means several weapons, For example, 1 h stands for one handed weapon
x s: x stands for the number of 1-6, which means several holes weapon, for example, 6 s stands for six holes weapon
bug: Game vulnerability
ban: account blocked by administrator
BBS: Forum
btw: by the way
char: role

cow: cattle farm
Cr: create game
BRB: replace person, Please wait for me.
Cu: Goodbye
CW: colour wolf, ha ha
DD: things
ds: how much? Used in general transactions; Or "on the ground" means
al: double suction
El: el. It is equivalent to PK
en: Um
exp: experience value
fant: inverted, dizzy, or ft
GG: elder brother
JJ: elder sister
GX: congratulations:)
Hell: Hell difficulty
I C: I see
C / C: room name = China, password = China, Chinese players' home court
J / J: room name = Japan, password = Japan, game room name, Japanese players home
k / K: room name = Korea, password = Korea, game room name, Korean players home
JS: J business
KX: for example, KC / KP / km / KB, main activities of battle. Net, KC = kill cattle; KP = kill the first
jinguai after entering the Red Gate in the fifth scene; Km = kill memphisto; KB = kill bar
CK: ox king, key protection object
lag: network delay, generally means slow network speed
lol: laugh, many other similar ^ o ^, - O --_- And so on
LV: level, level
me 2: me too
mm: sister, Meimei, female player
mod: equipment attribute or alternative mode
n: many kinds of meaning, next game; NO Game room name
newbie: new person
PT: ordinary difficulty; In the forum refers to cheat paste
nm: Nightmare difficulty
dy: Hell difficulty
nor: ordinary difficulty
NP: 1: no problem; 2: Abbreviations of game name and password, such as NP? It means to ask you the name and password of the game
NR = NT: common words of UW server transaction, which means "no reply = no, thank you"
O: Oh
Oh: surprise
OMG: God ~ ~ ~
PF: admire < B
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750