Hi there
Remember, Your job gives you authority. Your behavior gives you respect!
hostctl - A Cross-platform Hosts Management Tool

While writing internal technical documentation involving domain name consistency issues, I discovered the hostctl tool, which integrates well with the Docker ecosystem…
Setting Up a VPN with Outline

This tool comes from a Google team called Jigsaw. Regarding Jigsaw’s mission, Eric Schmidt stated in a Medium post using the Jigsaw account to use technology to tackle the toughest geopolitical challenges, combat violent extremism, thwart online censorship, and reduce threats caused by digital attacks.
Iris with Vue History Mode SPA

This article aims to solve the 404 error caused by SPA History routing mode when refreshing frontend route pages, and how to package frontend project resources into executable binary files.
Managing Service Configuration

As systems become more complex and configuration items increase, configuration management becomes cumbersome on one hand, and redeploying after configuration changes becomes equally painful on the other. At this point, a centralized configuration management system is needed to provide unified configuration management and automatic distribution of configuration changes for timely effect.
Setting Up a Blog with Ghost

Blogs seem to be declining step by step, with short message platforms like Weibo becoming more popular. The difference is quite obvious - your 2012 blog post might still receive comments in 2014, while even hot topics on Weibo get buried in the flood of information.
Apply for a Wildcard Certificate for Your Domain

Let’s Encrypt has finally announced support for free wildcard subdomain certificate applications in the community. This is a blessing for individuals who need multiple subdomain certificates, because Let’s Encrypt is a CA authority, but this CA authority is free! This means that issuing certificates doesn’t require any fees.
Custom Yii Module Routing

Most companies today customize the original features or rules of frameworks to some extent when using them, making them more suitable for the company’s actual development scenarios.
Login to Linux Using RSA Public Key

I’ve been using username and password to log in to Linux servers, but recently I found many failed login attempts in the Linux logs, with many IPs trying to brute force user passwords. For security reasons, I decided to disable password login and use SSH RSA Key for authentication instead.