2014-09-22

中華電信 iPhone 6 第一梯次領貨通知

第1梯次
機型預約單號時間可領貨日期(三個工作天)
iPhone 6 16GB灰色2014-09-16 10:00:00~2014-09-16 10:26:58(含)2014-09-26~2014-09-30
iPhone 6 16GB銀色2014-09-16 10:00:00~2014-09-16 10:26:42(含)2014-09-26~2014-09-30
iPhone 6 16GB金色2014-09-16 10:00:00~2014-09-16 10:27:25(含)2014-09-26~2014-09-30
iPhone 6 64GB灰色2014-09-16 10:00:00~2014-09-16 10:18:03(含)2014-09-26~2014-09-30
iPhone 6 64GB銀色2014-09-16 10:00:00~2014-09-16 10:20:21(含)2014-09-26~2014-09-30
iPhone 6 64GB金色2014-09-16 10:00:00~2014-09-16 10:12:45(含)2014-09-26~2014-09-30
iPhone 6 128GB灰色2014-09-16 10:00:00~2014-09-16 10:25:40(含)2014-09-26~2014-09-30
iPhone 6 128GB銀色2014-09-16 10:00:00~2014-09-16 10:24:06(含)2014-09-26~2014-09-30
iPhone 6 128GB金色暫無供貨2014-09-26~2014-09-30
iPhone 6 Plus 16GB灰色2014-09-16 10:00:00~2014-09-16 10:12:02(含)2014-09-26~2014-09-30
iPhone 6 Plus 16GB銀色2014-09-16 10:00:00~2014-09-16 10:06:17(含)2014-09-26~2014-09-30
iPhone 6 Plus 16GB金色2014-09-16 10:00:00~2014-09-16 10:08:22(含)2014-09-26~2014-09-30
iPhone 6 Plus 64GB灰色2014-09-16 10:00:00~2014-09-16 10:04:21(含)2014-09-26~2014-09-30
iPhone 6 Plus 64GB銀色暫無供貨2014-09-26~2014-09-30
iPhone 6 Plus 64GB金色2014-09-16 10:00:00~2014-09-16 10:04:22(含)2014-09-26~2014-09-30
iPhone 6 Plus 128GB灰色暫無供貨2014-09-26~2014-09-30
iPhone 6 Plus 128GB銀色暫無供貨2014-09-26~2014-09-30
iPhone 6 Plus 128GB金色暫無供貨2014-09-26~2014-09-30
資料來源
http://iphone6.emome.net/

2014-07-23

[轉貼]VLC media player外掛字幕顯示亂碼

備份用
重點是預設編碼要選UTF-8 & 字型Microsoft YaHei

來源:VLC media player外掛字幕顯示亂碼


2014-05-08

AWS EC2 install fail2ban

1.yum -y install fail2ban
2.vim /etc/fail2ban/fail2ban.conf
這個設定檔需要調整的部份不多,請修改 logtarget 的參數如下:
#預設的參數
#logtarget = SYSLOG
#調整後的參數
logtarget = /var/log/fail2ban.log

3.vim /etc/fail2ban/jail.conf
#預設的參數
#backend = auto 
#調整後的參數
backend = gamin

[ssh-iptables]
#是否啟用
enabled  = true
#過濾名稱,使用預設的即可
filter   = sshd
#iptables設定
action   = iptables[name=SSH, port=ssh, protocol=tcp]
           #發生阻擋時的寄信設定
           sendmail-whois[name=SSH, dest=pulipuli.chen@gmail.com, sender=root@server.nccu.edu.tw]

#需要掃描的記錄檔
logpath  = /var/log/secure
#最高嘗試錯誤次數
maxretry = 2
#阻擋的時間,-1表示永久阻擋
bantime  = -1

4.設定fail2ban開機順序

chkconfig --add fail2ban
設定好之後重開機
reboot

用iptables的語法來刪除被阻擋的IP:
[root@server ~]# iptables -D fail2ban-SSH  –s 140.119.1.110 -j REJECT


參考來源
http://www.fail2ban.org/wiki/index.php/Main_Page
http://pulipuli.blogspot.tw/2011/07/centosfail2ban.html#postcata1399533997683_anchor0

2014-01-08

AWS新增台灣的edge機房,提供cloudfront (CDN) 及 route53 ( DNS) 這兩個服務



據非官方消息來源是放在中華電信的是方機房



因此放在cloudfront (CDN)上的東西現在存取會更快了,以前依據routing不同會到香港、東京、新加坡存取cloudfront的資料

http://aws.amazon.com/about-aws/whats-new/2014/01/07/new-pops-added-taipei-rio-de-janeiro-amazon-cloudFront-amazon-route-53/



New Edge Locations Added in Taipei and Rio de Janeiro for Amazon CloudFront and Amazon Route 53

We are excited to announce the launch of edge locations in Taipei, Taiwan and Rio de Janeiro, Brazil. This is our first edge location in Taiwan and our second edge location in Brazil (joining Sao Paulo). These new locations will improve performance and availability for end users of your applications being served by Amazon CloudFront and Amazon Route 53, and they bring the total number of AWS edge locations to 51 worldwide.

These new edge locations support all Amazon CloudFront functionality, including accelerating your entire website (static, dynamic and interactive content), live and on-demand streaming media, and security features like custom SSL certificates, private content and geo-restriction of content. They also support all Amazon Route 53 functionality including health checks, DNS failover, and latency-based routing.

The pricing for the edge location in Taipei is the same as that in Hong Kong, the Philippines, South Korea and Singapore, and the pricing for the edge location in Rio de Janeiro is the same as that in Sao Paulo. That means your end users in these regions will benefit from the lower latency without any additional costs.

To learn more about Amazon CloudFront, please visit the Amazon CloudFront detail page. To learn more about Amazon Route 53, please visit the Amazon Route 53 detail page.



We'd also like to invite you to join our "Using Amazon CloudFront to Protect Your Content Delivery via Geo-Restriction, Private Content, and Custom SSL Certificates" webinar on February 4th, 2014 at 10:00 AM Pacific (UTC-7). In this webinar, you can learn about several new features that give you the protection and control that you need to deliver your content securely to your viewers via Amazon CloudFront. You can register for this webinar here.
Related Posts Plugin for WordPress, Blogger...