<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 13 Apr 2026 07:50:53 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/iptables/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[再遇灵异事件：Oracle 云主机无法允许端口的问题]]></title><description><![CDATA[有句古话叫做：“常在河边走，哪有不湿鞋”，也句话叫做“夜路走多了总会遇见鬼”，我推及一下得出结论：常常和Linux主机打交道，总会遇到灵异问题。 (图源 ：pixabay) 话说大概是十多个月以前，我历尽千辛万苦终于申请下来一个Oracle云主机的账户，之所以不辞辛劳地弄这个账户，是因为Oracle云主机账户有些终身免费的福利——比如两台低配云主机(VPS)。]]></description><link>http://direct.ecency.com/hive-105017/@oflyhigh/4xawkn-oracle</link><guid isPermaLink="true">http://direct.ecency.com/hive-105017/@oflyhigh/4xawkn-oracle</guid><category><![CDATA[hive-105017]]></category><dc:creator><![CDATA[oflyhigh]]></dc:creator><pubDate>Thu, 06 Nov 2025 09:04:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/3jpR3paJ37V8XPrHkfZdMtiM68fywBJwYt7EuhvqRCw6BSQfyRpCkNVJaLPudcgaiJzN9gyD2mcYfLEncimNMroj2CNXdhdUa8tnrXGZnPjLocEkjSuN3PNEr6xDjwviALFEN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[每天进步一点点: 将node.js 应用绑定到80端口的方法]]></title><description><![CDATA[历尽千辛万苦，我终于将node.js的应用运行了起来，看起来貌似一切正常的样子。 可是新的问题来了，别人的网站都直接可以通过域名访问，并且一般都是80或者443(HTTPS)端口，而我这个是8080端口又是怎么回事？又该如何解决呢？ (图源 ：pixabay) 直接换端口的方式肯定是行不通的啦，因为Linux下是不允许普通用户应用绑定特权端口(0至1023)的，那就要想别的方法了。 iptables转发]]></description><link>http://direct.ecency.com/cn/@oflyhigh/-node-js-80-2019-07-08</link><guid isPermaLink="true">http://direct.ecency.com/cn/@oflyhigh/-node-js-80-2019-07-08</guid><category><![CDATA[cn]]></category><dc:creator><![CDATA[oflyhigh]]></dc:creator><pubDate>Mon, 08 Jul 2019 10:16:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYXi7kiRtPyZ4gHuqkqDfsgzQRughu8TQFKKDJcKS7PYtHRekjgc3eUVG2TM36xajTunHHiToHp?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Top 10 October must-reads: Microsoft Access alternatives, iptables tricks, Min, functional programming in Python, and more | Opensource.com]]></title><description><![CDATA[We've rounded up our top 10 articles from the past month. Source of shared Link]]></description><link>http://direct.ecency.com/dlike/@bustillo/top-10-october-must-reads-microsoft-access-alternatives-iptables-tricks-min-functional-programming-in-python-and-more-opensourcecom</link><guid isPermaLink="true">http://direct.ecency.com/dlike/@bustillo/top-10-october-must-reads-microsoft-access-alternatives-iptables-tricks-min-functional-programming-in-python-and-more-opensourcecom</guid><category><![CDATA[dlike]]></category><dc:creator><![CDATA[bustillo]]></dc:creator><pubDate>Thu, 08 Nov 2018 06:53:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrTv9DFQxxrwmQjGsUHw55AHTj38ikfka3D8LeHiMyc79HwmM5D3cNB3AGUu5DB6cS7u5WQuViUR2EQ9R5qzfFdNVd8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[每天进步一点点: Linux普通用户下程序绑定特权端口(iptables转发)]]></title><description><![CDATA[我在Linux的普通用户下运行一组程序，想让其中的一个程序监听1024以下的端口，结果运行程序提示权限不足，无法绑定端口。 (图源 ：pixabay) 难道需要我把这组程序复制到root用户下，以root权限执行？那这样的话，为了安全我特意搞了个普通用户岂不是就没有意义了。 想了想，最简单的办法就是使用iptables转发啦，执行下列指令即可： sudo iptables -t nat -A PREROUTING]]></description><link>http://direct.ecency.com/iptables/@oflyhigh/linux-iptables</link><guid isPermaLink="true">http://direct.ecency.com/iptables/@oflyhigh/linux-iptables</guid><category><![CDATA[iptables]]></category><dc:creator><![CDATA[oflyhigh]]></dc:creator><pubDate>Tue, 07 Aug 2018 13:18:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iP9UFxntMJrxg5bFaPNCmo3rVUdQDr88w7XotqUJQM282KKestAWzKMZbP1qwBYMj4cTCuaVFbC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Besser filtern mit IP Tables]]></title><description><![CDATA[Iptables installieren: Auf dem Betriebssystem muss iptables installiert sein. Die Installation von iptables starten sie mit dem folgenden Befehl: Um einen Zugriff einer bestimmten IP auf den gesamten Linux]]></description><link>http://direct.ecency.com/iptables/@djsmoke/besser-filtern-mit-ip-tables</link><guid isPermaLink="true">http://direct.ecency.com/iptables/@djsmoke/besser-filtern-mit-ip-tables</guid><category><![CDATA[iptables]]></category><dc:creator><![CDATA[djsmoke]]></dc:creator><pubDate>Thu, 14 Jun 2018 14:54:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/8SzwQc8j2KJZWBXFXnbnQ1FtoZhRqrTWozhqoqWHpGmpmnbZVFEvZYAq1ivbFE7YvSxk9Ccefu1GjYzR51kW5jejckCucPVqadbg5cqCbnaes6pQKUS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Debian系统iptables防火墙规则保存]]></title><description><![CDATA[#iptables规则保存（Debian） root身份登陆 iptables-save > /etc/iptables touch /etc/network/if-pre-up.d/iptables chmod +x /etc/network/if-pre-up.d/iptables nano /etc/network/if-pre-up.d/iptables 将以下内容粘贴至iptables文件中]]></description><link>http://direct.ecency.com/debian/@elvisw/debian-iptables</link><guid isPermaLink="true">http://direct.ecency.com/debian/@elvisw/debian-iptables</guid><category><![CDATA[debian]]></category><dc:creator><![CDATA[elvisw]]></dc:creator><pubDate>Tue, 03 Apr 2018 03:52:06 GMT</pubDate></item><item><title><![CDATA[基于无预置IP list的GFW IP解锁方法]]></title><description><![CDATA[在以往的基于路由、iptables解锁GFW IP封锁的方法中，均需要一份国内或国外的IP地址列表，然后进行策略路由。基于这种方案的解锁，需要人工去维护一张IP地址列表，其中基于chnroutes方案生成的国内IP地址列表就有8000多条记录,在加载的时候会比较耗时，同时给路由器带来一定负担。本文给出一种基于无IP列表的自动IP访问监测及路由更变策略。 1.]]></description><link>http://direct.ecency.com/cn/@highland0971/ip-list-gfw-ip</link><guid isPermaLink="true">http://direct.ecency.com/cn/@highland0971/ip-list-gfw-ip</guid><category><![CDATA[cn]]></category><dc:creator><![CDATA[highland0971]]></dc:creator><pubDate>Thu, 01 Feb 2018 15:20:21 GMT</pubDate></item><item><title><![CDATA[海外通过香港ECS访问大陆应用网站(iptables转发网站、中继)]]></title><description><![CDATA[利用阿里云香港ECS让海外用户流畅的访问大陆应用网站 直接上命了，不废话了 大陆服务器IP地址139.222.222.222端口7070 阿里云香港ECS内网IP172.31.1.123 iptables -t nat -A PREROUTING -d 172.31.1.123 -p tcp --dport 80 -j DNAT --to-destination 139.222.222.222:7070]]></description><link>http://direct.ecency.com/iptables/@ivenwang/ecs-iptables</link><guid isPermaLink="true">http://direct.ecency.com/iptables/@ivenwang/ecs-iptables</guid><category><![CDATA[iptables]]></category><dc:creator><![CDATA[ivenwang]]></dc:creator><pubDate>Mon, 29 Jan 2018 00:03:18 GMT</pubDate></item><item><title><![CDATA[The firewall of Linux: IPTables]]></title><description><![CDATA[If you own a Linux server, you know how important securing it is. A server is available to the whole world, when it's connected to the internet, and soon bad guys will try to break in. Without a firewall]]></description><link>http://direct.ecency.com/technology/@ah101/the-firewall-of-linux-iptables</link><guid isPermaLink="true">http://direct.ecency.com/technology/@ah101/the-firewall-of-linux-iptables</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[ah101]]></dc:creator><pubDate>Sat, 27 Jan 2018 16:17:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/X37EMQ9WSwsKQG7nhCXMsgXxUQHwtJm4rGgDFSP27G8NsdRKSQNA7Jp2swdkCbPr9egzbv4neVwFAg5SMVrHpCLJ84H7xS6VBzQwg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[linux iptables  설명]]></title><description><![CDATA[iptables 란? iptables는 리눅스상에서 방화벽을 설정하는 도구로서 커널 2.4 이전 버전에서 사용되던 ipchains를 대신하는 방화벽 도구이다. iptables는 커널상에서의 netfilter 패킷필터링 기능을 사용자 공간에서 제어하는 수준으로 사용할 수 있다. 패킷필터링이란 지나가는 패킷의 해더를 보고 그 전체 패킷의 운명을 결정하는 것을 말한다.]]></description><link>http://direct.ecency.com/linux/@skysparrow/linux-iptables</link><guid isPermaLink="true">http://direct.ecency.com/linux/@skysparrow/linux-iptables</guid><category><![CDATA[linux]]></category><dc:creator><![CDATA[skysparrow]]></dc:creator><pubDate>Sun, 21 Jan 2018 04:45:42 GMT</pubDate></item><item><title><![CDATA[Super Fast Steemit Connection by Blocking Suspicious IPs Connecting to my Computer while using Steemit Full List and Connection Details]]></title><description><![CDATA[I've been watching my connection, as usual, and I noticed some strange addresses that keep coming up. Some of them are new but a few I have seen before. When I block these addresses it actually enhances]]></description><link>http://direct.ecency.com/steemit/@zhanmusi/super-fast-steemit-connection-by-blocking-suspicious-ips-connecting-to-my-computer-while-using-steemit-full-list-and-connection</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@zhanmusi/super-fast-steemit-connection-by-blocking-suspicious-ips-connecting-to-my-computer-while-using-steemit-full-list-and-connection</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[zhanmusi]]></dc:creator><pubDate>Tue, 17 Jan 2017 17:14:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/o1AJ9qDyyJNSg42tMXE3yxRphXzokhbHUWbbT2WdQEgNgG6j8?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>