Ask Question Forum:
Model Library:2025-02-08 Updated:A.I. model including DeepSeek is online for auto reply question page
C
O
M
P
U
T
E
R
2
8
Show
#
ASK
RECENT
25-06-28 16:30:14
Wilson Edwards
Reply:3
Post_ID:829370google adsense
as TitlePlease advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-06-28 16:00:17
Wilson Edwards
Reply:0
Post_ID:829369googles adsense
As TitlePlease advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-06-27 11:44:47
Wilson Edwards
Reply:2
Post_ID:829367googleads;drive traffic;adsense
I read some outside third-party company to prompt driving web traffic to my website to increase my google adsense revenue.How are they able to do ?During driving traffice to my website, it will create google adsense impression or not ?Google will treat that impression is invalid ?Please advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-06-27 11:02:02
Wilson Edwards
Reply:0
Post_ID:829368googleads;invalid traffic
I read some outside third-party company to prompt driving web traffic to my website to increase my google adsense revenue.How are they able to do ?During driving traffice to my website, it will create google adsense impression or not ?Google will treat that impression is invalid ?Please advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-05-05 20:08:11
test test
Reply:3
Post_ID:829366googlebot;crawler;cloudflare
Accept
How my website can use cloudflare with"Under Attack Mode" and be able to allow goolge bot, crawler to crawl my website pages at the same time ?Please advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-04-17 16:26:31
Wilson Edwards
Reply:1
Post_ID:829365css;html
Accept
as title Please advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-04-14 19:42:56
Wilson Edwards
Reply:5
Post_ID:829364javascript
Accept
Please adviseThanks
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-04-14 01:47:39
Wilson Edwards
Reply:2
Post_ID:829363javascript
I have set iframe addEventListener with mousedown event, it works becoz the iframe source is same domain ofthe current page..For example<iframe id=''myiframe" src='https://samedomian.com//test.html'></iframe><script>document.getElementById("myiframe").addEventListener('mousedown, function () {console.log('mousedown event detected');});</script>But when I change iframe src to external domain or cross-domin such as https://example.comit doesn't work, the reason it is blocked by cross-dmain policyAny mothed to solve this issue, how to detect mousedown event on iframe ?
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-04-14 01:22:51
Wilson Edwards
Reply:2
Post_ID:829362javascript
For example, I have a link in DIV-A tag now I can not click the link in DIV-A because it is covered by DIV-B I want to click the link DIV-A anyway. I tried this example, it work at https://computer28.com/learn/pointer-events.php Any other good example or other method to achieve this ? Please advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-03-28 09:26:04
Wilson Edwards
Reply:5
Post_ID:829361google_drive;php;centos8
I would like to download all my google_drive files by using php program code onmy linux centos 8 system server, how to it ?How to get the google API key to start download for php program ?Since the download file size is very huge, how can I speed up the download the file ifits size is more 100G size ?Please advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-03-12 23:38:28
Wilson Edwards
Reply:1
Post_ID:829360javascript;html;css
Accept
I would like to create child node inside of body tag and enclosing all elements inside body tagby javascript code;For example:Before:<html><body><div></div><a></a><span></span></body></html>After, if I would like to see this reuslt, creating new div tag enclose everything inside of body tag, new div tag 's id is new_child_nodeAfter:<html><body><div id='new_child_node'><div></div><a></a><span></span></div></html></body>Please advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-03-03 21:46:28
test test
Reply:4
Post_ID:829359cloudflare;proxy;socket;python;centos 8;apache
I am using cloudflare to protect my website recently,but I have a page which is using python socket to send streaming data to visitor with 5000 portsuch as http://mywbesite.com:5000.Before using clouldflare, visitor can get data from port 5000, now after usingcloudflare, all visitors to my website can not get any data from port 5000.Now I pause cloudflare, the python socket port is working back again..The question is I would to like to keep all cloudflare service such as proxy but python socket port need to work for exception by cloudflare, how can I do that ?My Simple python socket code:from flask import Flask, render_template, request, session,jsonifyfrom flask_sse import ssefrom flask_socketio import SocketIO, emit, join_roomimport platformimport loggingfrom flask_cors import CORSimport socket....if __name__ == "__main__": app.run(host="0.0.0.0",debug=False, port=5000, ssl_context=("mycert")
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-03-02 21:19:15
test test
Reply:3
Post_ID:829358cloudflare;VPN;proxy;linux;apache
My website is using cloudflare internt traffic protection.I am using php code to monitor all internet ip through chrome browser to my websitefor example, monitoring $_SERVER['HTTP_X_FORWARDED_FOR'] and$_SERVER['REMOTE_ADDR'];I try it in those different computers with different ISP ip, I found the result as followsCase-1 Computer A,$_SERVER['HTTP_X_FORWARDED_FOR']="51.58.202.19";$_SERVER['REMOTE_ADDR']="172.64.0.0"where51.58.202.19 is my Compuer A ISP ip and172.64.0.0 is cloudflare use proxy server to get the webpage for Computer A.Case-2 Computer B,$_SERVER['HTTP_X_FORWARDED_FOR']="61.85.102.11";$_SERVER['REMOTE_ADDR']="61.85.102.11"where61.85.102.11is my Compuer B ISP ip and$_SERVER['HTTP_X_FORWARDED_FOR']=$_SERVER['REMOTE_ADDR']My question is Why in case-1 Cloudflare will use proxy to get webapge for computer A butcloudfare don't use proxu to get wbepage for computer B in which both php ip is same from$_SERVER['HTTP_X_FORWARDED_FOR']=$_SERVER['REMOTE_ADDR'] ?Second question, in what condition ro when Cloudflare use proxy or not use proxy to get webpage for browser visitor?Final question isIf cloudflare use proxy , it mean visitors of Computer A, ISP IP maybe bot or maliciousor suspected IP , Can I release Google Ads on my webste and allow the vistior of Computer A to click the ads ? If the visitors click the ads, it mean the click is excuted from Computer A, ISP IP or from Cloudflare 's proxy IP ?Please advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-03-02 12:50:13
test test
Reply:2
Post_ID:829357cloudflare;google chrome;apache
Question 1- Cloudflare show warning, too may redirect on chrome solvedAnswer: solved by removing all redirect from http to https since cloudflare will handleall redirect from http.Since in apahce httpd.conf, we added the following for http to https and except some directorybased on this linkhttps://stackoverflow.com/questions/5818146/how-to-force-rewrite-to-https-except-for-a-few-pages-in-apache#RewriteEngine on#RewriteCond %{SERVER_NAME} =computer28.com [OR]#RewriteCond %{SERVER_NAME} =www.computer28.com#RewriteRule ^https://%{SERVER_NAME}%{REQUEST_URI}[END,NE,R=permanent]#RewriteEngine on#RewriteCond %{HTTPS} =off#RewriteCond %{REQUEST_URI} !^\/local\/#RewriteCond %{REQUEST_URI} !^\/world\/#RewriteRule (.*)https://%{HTTP_HOST}/$1[L,R=301]#RewriteCond %{HTTPS} =on#RewriteCond %{REQUEST_URI} \/fid\/ [OR]#RewriteCond %{REQUEST_URI} \/php\/#RewriteRule (.*)http://%{HTTP_HOST}/$1[L,R=301]Comment it all, it works nowQuestion-2:How to Fix ERR_QUIC_PROTOCOL_ERROR Message in Chrome Browserwhen using cloudflareAnswer-2https://kinsta.com/knowledgebase/err_quic_protocol_error/https://www.hostinger.com/tutorials/how-to-fix-err-quic-protocol-errorchrome://net-internals/#dnsHTTP/3 Cheker:https://http3check.net/?host=computer28.comhttps://kinsta.com/knowledgebase/flush-dns/on Window 10:ipconfig /flushdns //clear all DNS cachingFinal, if still can not solve question-2, delete cloudflare account and then re-create new other account using other gmail accout to see any help from resetting all cloudflare default setting.Need to wait 1-day or 2-day. to see theERR_QUIC_PROTOCOL_ERROR will be sovledor not...If above answer can not be solved, any suggestion or solution to solve those those bothquestions,Please advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-03-01 19:03:13
Wilson Edwards
Reply:2
Post_ID:829356centos 8
as title for the question, I read the link,https://devco.re/blog/2014/06/19/client-ip-detection/ it works , for php as following code., Any other method besides php code, to dectect the ip is real ip not VPN not TOR IP not proxy IP?<?php if(!empty($_SERVER['HTTP_CLIENT_IP'])){ $myip = $_SERVER['HTTP_CLIENT_IP']; }else if(!empty($_SERVER['HTTP_X_FORWARDED_FOR'])){ $myip = $_SERVER['HTTP_X_FORWARDED_FOR']; }else{ $myip= $_SERVER['REMOTE_ADDR']; } echo $myip; ?>
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-03-01 17:56:38
Wilson Edwards
Reply:2
Post_ID:829355google ads;cloudflare
Google Ads can be shown if my website is using cloudflare protection ? and next question isCloudflare can protect my websie from Bot Fraud Click on my website Google Ads.My Cloudflare account is free version Cloudflare.Please advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-28 00:17:59
Wilson Edwards
Reply:4
Post_ID:829354google;reCAPTCHA
I just created reCAPCHA fromg google site athttps://www.google.com/recaptcha/admin/createand following his instruction, created my first reCAPCHA html page such as follows<!DOCTYPE html><html lang="en"><head><script async defer src="https://www.google.com/recaptcha/api.js"></script></head><body><div class="g-recaptcha" data-sitekey="6LcIhOQqAAAAAGbMD-QaT-xjh9VYF87D7w6uMw4n"></div></body></html>The page is successful and show google reCAPCHA, but it will ask me to do image testCan I bypass the image test, just tick the I am not a rebot box only ?Please advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-26 04:32:58
Ty Yt
Reply:1
Post_ID:829353Linux apache
As tilte
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-25 04:28:14
Wilson Edwards
Reply:2
Post_ID:829352centos;linux
I am using linux command, host, to check the revserse ip , some is not found but if I am using, online tool, that IP is normal, not abusive ipHow to check the IP is abusive ?
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-23 19:30:17
Wilson Edwards
Reply:3
Post_ID:829351香港樓市;Hongkong housing price
Accept
香港樓市, 現在買 Okay ?
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-23 17:06:22
Wilson Edwards
Reply:4
Post_ID:829348google adsense
Accept
my website server is new or small server, recently, just start up my server width Google Adsense ads into my site.DUring, these past 7-day, I get page view not much, but have 50 impression and 20 click dailyI check all my apache log file, those access to my wbesite is not too freqently, butToday Google banned my Google Adsense Account, including this time, Google already banned my site for 5-time.The reason is invalid traffic, I have already followed all rules from GooglePlease advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-20 15:15:06
su e
Reply:1
Post_ID:829347excel vba 技術趨勢圖陰陽燭
excel vba 技術趨勢圖陰陽燭
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-18 17:05:47
w kk
Reply:3
Post_ID:829345葵芳地鐵站葵涌廣場鋪位
葵芳地鐵站葵涌廣場鋪位
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-18 16:46:59
w kk
Reply:1
Post_ID:829344why we use
as tile
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-18 16:43:41
w kk
Reply:1
Post_ID:829343bitcoin
as title
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-18 16:33:55
w kk
Reply:2
Post_ID:829342as title
Accept
as title
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-15 21:18:40
Wilson Edwards
Reply:7
Post_ID:829340google;adsense;crawler
Accept
I just want disallow Google search indexing engine to access all my files and all my directories except some files such as index.php and music.png and let ads.txt can be crawled by Google Adsense Crawler Please advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-12 00:53:08
Norton Alex
Reply:1
Post_ID:829260javascript
my question is same as the title And, I search it on internet, the closer one is this link https://stackoverflow.com/questions/3538021/why-do-we-use-base64 Any good article about this topic Regards
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-12 00:48:17
Wilson Edwards
Reply:2
Post_ID:829290window10/11;apache;centos;php;html
Accept
After clicking some Googe Ads and leave the ads site or delete the tab, your browser may forwards you to other site which may give you message such as "Congrulation,! You Get Prize, Bonus, Coupon.etc" Probably your browser is infected by virus and the Congurlation site is hacker /attacker virus site.. I will think the following methods to solve my problem, Please advise those methods are correct 1- Right away or now, remove the forwars site(Congrulation site) or delete such browser Tab 2- Look at this image: https://computer28.com/image/deletecache.jpg Delete or clean your chrome browser data At Chrome browser, Click Sitting->Privacy Security->Delete Browser Data, it will pop up window, in that window, Click Advanced->Select Time Range(All Time)->Tick all box below Time range such as Browsering History..etc. Click Delete Data button 3-If using Window 10, Turn on Microsoft Defender Virus Protection System, always turn it on https://carleton.ca/its/help-centre/how-to-enable-windows-defender-on-personal-pc/ You are better to install Microsoft Window 11 if u are using WIndow 10 4- Add X-Content-Type-Options: nosniff on header at my apache server
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-12 00:32:47
Norton Alex
Reply:3
Post_ID:829339centos;apache;php;html
Accept
as title with the topic tag
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-11 17:12:06
test test
Reply:2
Post_ID:829338centos;linux;A.I.
I would like to stop all A.I. access my website through VPN or TOR browser,How I know the A.I. is accesing into my website pagesPlease advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-11 17:07:11
Wilson Edwards
Reply:1
Post_ID:829291javscript;google_cookie
For latest browser, u can only read cookie value by javascript code. Remove and Update cookie by javascript is very difficult...To read all cookie, u can go to devtool, Mouse Right-click->inspect->Application->Cookieu can see all website cookie u are accessing..You can remove all cookie for the website..by php codingFor example:<?phpif(isset($_SERVER['HTTP_COOKIE'])&&stripos("#".$_SERVER['QUERY_STRING'],'gt=3')>0){$cookies = explode(';', $_SERVER['HTTP_COOKIE']);foreach($cookies as $cookie) {$parts = explode('=', $cookie);$name = trim($parts[0]);setcookie($name, '', time()-1000,'computer28.com');setcookie($name, '', time()-1000, '/','computer28.com');setcookie($name, '', time()-1000,'.computer28.com');setcookie($name, '', time()-1000, '/','.computer28.com');}}if(stripos("#".$_SERVER['QUERY_STRING'],'gt=3')>0){header("location:https://computer28.com"); }?>On address bar with gt=3, it will forward to the main domain site,For update cookie,justsetcookie($name, ''', "the time you want for expire",'computer28.com');Hope it help
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-11 16:38:06
Wilson Edwards
Reply:1
Post_ID:829337google search;SEO
I would like to set requirement to let google seach engine to index all my website pages, just allow some pages of my website can be indexed by Google..How I can setup the system or requirement for the pages selected to be indexed from robots.txt or sitemap ?Please advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-11 11:25:10
Wilson Edwards
Reply:5
Post_ID:829335hongkong food
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-10 21:49:16
Wilson Edwards
Reply:4
Post_ID:829336centos; bash
Accept
I am using bash linux shell, running ollama serve on CLI console is working, but when it can not work on cron job scheduler, why
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-10 14:17:47
Wilson Edwards
Reply:5
Post_ID:829333php; html;javascript
Accept
In php script, if echo "<a></a>" it render as html elementas we understand it, but when doing in php, $str=htmlentities("<a></a>"); then $str=html_entity_decode($str); $str is not equal to "<a></a>", $str is string. why that is not HTML element
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-09 20:46:03
Wilson Edwards
Reply:3
Post_ID:829332javascript;html5;css
Accept
as title with topic tagPlease advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-09 10:49:51
Wilson Edwards
Reply:1
Post_ID:829325chrome;curl;php;python3.9
Accept
I would like to distinguish between those vistors are A.I. or real human to access my website.For example, some A.I. will use VPN and automaticlly access my website through, for example, curl or other methdos, I would like to block those A.I. auto crwaling IP and trafficPlease advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-09 10:32:17
Wilson Edwards
Reply:1
Post_ID:829324javascript;html5;css
Accept
as title and topic tagPlease advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-07 01:07:31
Wilson Edwards
Reply:0
Post_ID:829299gcc;linux
When upgrade gcc or lib, it will cause issue, and may cause reboot is not working for exmaple: https://blog.csdn.net/qq_39295044/article/details/86685789 su root Password: node: /lib64/libc.so.6: version `GLIBC_2.18' not found (required by /lib64/libstdc++.so.6) nvm is not compatible with the npm config "prefix" option: currently set to "" Run `nvm use --delete-prefix v16.20.2 --silent` to unset it. For example, running ------------------- node node: /lib64/libc.so.6: version `GLIBC_2.18' not found (required by /lib64/libstdc++.so.6) Or php php: /lib64/libc.so.6: version `GLIBC_2.18' not found (required by /lib64/libstdc++.so.6) after re-install glibc at /usr/local and run nvm use --delete-prefix v16.20.2 --silent` //for node other issue now ok, php and node but got some error when install python3.9 version rm -f /usr/local/glibc-2.18/build/stubs.h /usr/local/glibc-2.18/build/elf/sln /usr/local/glibc-2.18/build/elf/symlink.list rm -f /usr/local/glibc-2.18/build/elf/symlink.list test ! -x /usr/local/glibc-2.18/build/elf/ldconfig || LC_ALL=C LANGUAGE=C \ /usr/local/glibc-2.18/build/elf/ldconfig \ /lib64 /usr/lib64 LD_SO=ld-linux-x86-64.so.2 CC="gcc -B/usr/bin/" /usr/bin/perl scripts/test-insta llation.pl /usr/local/glibc-2.18/build/ /usr/lib/gcc/x86_64-redhat-linux/4.8.5/../../../../lib64/libm.so: undefined refe rence to `__strtod_nan@GLIBC_PRIVATE' /usr/lib/gcc/x86_64-redhat-linux/4.8.5/../../../../lib64/libm.so: undefined refe rence to `__strtof128_nan@GLIBC_PRIVATE' /usr/lib/gcc/x86_64-redhat-linux/4.8.5/../../../../lib64/libm.so: undefined refe rence to `__strtof_nan@GLIBC_PRIVATE' /usr/lib/gcc/x86_64-redhat-linux/4.8.5/../../../../lib64/libm.so: undefined refe rence to `__strtold_nan@GLIBC_PRIVATE' collect2: error: ld returned 1 exit status Execution of gcc -B/usr/bin/ failed! The script has found some problems with your installation! Please read the FAQ and the README file and check the following: - Did you change the gcc specs file (necessary after upgrading from Linux libc5)? - Are there any symbolic links of the form libXXX.so to old libraries? Links like libm.so -> libm.so.5 (where libm.so.5 is an old library) are wrong, libm.so should point to the newly installed glibc file - and there should be only one such link (check e.g. /lib and /usr/lib) You should restart this script from your build directory after you've fixed all problems! Btw. the script doesn't work if you're installing GNU libc not as your primary library! make[1]: *** [install] Error 1 make[1]: Leaving directory `/usr/local/glibc-2.18' make: *** [install] Error 2 Change libm.so link to 2.18 version Make sure glibc, libc.so libm.so is same version
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-07 00:06:18
Wilson Edwards
Reply:6
Post_ID:829297python3;centos;deepseek
Accept
Could not install ollama from python3 install ollama...so try alternative ,using python3 install openai , but easy example python script still not working, , the error is such as AttributeError: module 'ollama' has no attribute 'chat' import ollam //or improt openai response = ollama.chat(model="deepseek-r1", messages=[ { "role":"user", "content":"how center a tag in a div tag by javascript" }, ]) print(response["message"]["content"]) OR next example: import os import openai openai.api_key = ("key") openai.ChatCompletion.create( model="gpt-3.5-turbo", messages=[ {"role": "user", "content": "Hello!"} ] ) print(completion.choices[0].message) // Error AttributeError: module 'ollama' has no attribute 'ChatCompletion' if use comand line ollama, it works > ollama server //need enable port 127.0.0.1:11434 > ollam run deepseek-r1 >>>>"chat" Any Advise ? Try to list all module : print(dir(ollama)) //No any moduel name, chat... Error: Command '['/home/..../venv/bin/python3.x', '-Im', 'ensurepip', '--upgrade', '--default-pip']' returned non-zero exit status 1 https://stackoverflow.com/questions/24123150/pyvenv-3-4-returned-non-zero-exit-status-1 Reference: https://cristianzsh.medium.com/installing-and-using-deepseek-ai-c7fd97332e0f https://stackoverflow.com/questions/2927993/where-are-the-python-modules-stored https://pypi.org/project/ollama/ https://python.langchain.com/docs/integrations/chat/ollama/ https://ollama.com/search https://hungchienhsiang.medium.com/error-could-not-find-a-version-that-satisfies-the-requirement-from-pip-install-f542143e705d https://ywctech.net/ml-ai/ollama-first-try/ https://github.com/ollama/ollama-python https://github.com/ollama/ollama
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-05 00:23:20
Wilson Edwards
Reply:1
Post_ID:829298python
Accept
I try to upgrade my python version from 3.6 to 3.9 I also get ,glibc error /lib64/libm.so: undefined reference to `__strtod_nan@GLIBC_PRIVATE' and solved it ....just checked all glibc, libm , libc, all version is matched to , for exmaple.2.18version relink, ln -sfn /lib64/libm-2.18.so libm.so.6 //before is libm-2.31.so not matched https://stackoverflow.com/questions/59578152/undefined-reference-to-strtof128-nanglibc-private after the above error solved, I get other errorat make altinstall, got the errorerror _testembed.c:1767: undefined reference to `__gcov_indirect_call_profiler'just following the instruction as reference link Installation python 3.9 reference: https://phoenixnap.com/kb/how-to-install-python-3-centos-7 https://blog.csdn.net/liuruiaaa/article/details/130890408
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-02 21:48:44
Wilson Edwards
Reply:0
Post_ID:829296virtualbox;macOS;window11
Read this link https://computer28.com/hk/article/install-macos-virtualbox.doc.php
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-01 22:06:35
Wilson Edwards
Reply:0
Post_ID:829288python;javascript;simulation
Basic Concept: https://www.youtube.com/watch?v=IrbJYsep45E&t=663s https://www.youtube.com/watch?v=JOJ5zihcd6Q Google 's Willow Chip for quantum computing: https://www.youtube.com/watch?v=G3o4sPpGWFI https://www.youtube.com/watch?v=FgZ-8NFSysA&t=134s https://www.youtube.com/watch?v=CMO1MEeUcXg Shor's Algorithm: https://www.youtube.com/watch?v=FRZQ-efABeQ https://www.geeksforgeeks.org/shors-factorization-algorithm/ Simulator quantum computing by python: https://github.com/lvillasen/Quantum-Computer-Simulator IBM quantum simulator/platform for public: https://en.wikipedia.org/wiki/IBM_Quantum_Platform (Some region is blocked by IBM,u can use VPN from Chrome VPN Extension) Basic GCD, greatest common divisor: https://en.wikipedia.org/wiki/Greatest_common_divisor How it works: https://www.youtube.com/watch?v=g_IaVepNDT4&t=63s https://www.youtube.com/watch?v=c0D8X4eN_Cg&list=PLnK6MrIqGXsJfcBdppW3CKJ858zR8P4eP https://www.youtube.com/watch?v=XuN6sF8UGSw
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-01 21:42:42
Norton Alex
Reply:1
Post_ID:829295javascript
Accept
my html page calling many javascript file, I worry, some function name will be double or over-written by each other. Any method to prevent this .Please advise;
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-02-01 21:15:33
Norton Alex
Reply:2
Post_ID:829294javascript
Accept
I have seen a lot javascript file whcih starting with "!" character before functionWhat is the purpose of that ?For example;!function(x){a=x}()Please advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-01-29 21:04:40
Wilson Edwards
Reply:4
Post_ID:829293javascript;python3;chrome
Visitors or users may open many page of website to get streaming data ,and they want to open many browser tabs to read different data. That will depend on your Laptop or mobile capiblity how can handle many new socket.io to run on multiple tab at the same time, If limited computer resouce or memory, you will be limited for number of browser tabs display.If u use socket with Redis /stream event that allow display directly into html page tab (just type https://yourdomain:5051/stream on address bar) or throught javascript parse data into html page but it may only allow 3 tabs running on the same time.How you can run it on many tabs ?-----------------------------------------------1-You can use localStorage(getItem or setItem) to share information between browser tabOr...you can use2-window.addEventListener('blur', notstream);window.addEventListener('focus', stream);When the user not read or not focus the tag, close the streaming socketio, then Whenthat users want to read it again and focus the tag, reconnect the socket. We know users only can read 1 tag at a time only,function notstrem(){souce.close();//close the socket.io}function stream(){//user focus the tab againrefresh();// re-run that funation u can stream data before}function refresh(){//Redisvar source = new EventSource("https://yourdomainsocket-site.com"+":5051/stream"); source.addEventListener('publish', function(event) {dataextract(event.data);if (typeof ws=='function')ws(event.data);if (typeof updatechart=='function')updatechart(event.data); }, false); source.addEventListener('error', function(event) { }, false);return source;}let source=null;jQuery(document).ready(function($) {console.log("onload");source=refresh();});
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25-01-23 19:49:42
Wilson Edwards
Reply:5
Post_ID:829292javascript;jquery;php
$(document).click(function(e) { // ####Check for left button if (e.button == 0) { // alert('clicked'); console.log('page......clicking'); checkhitrate('ads_hitrate');//check the document.activeElememnt source such as ifram or <a> tag }else {}});it works but can not detect mouse right click or mouse left click;so try to other code such as followsvar mouseleft=null;document.addEventListener('mousedown', function(event) { switch (event.button) { case 0: mouseleft=1; checkhitrate('ads_hitrate'); console.log('mouse Left button clicked.'); break; case 1: mouseleft=0; console.log('mouse Middle button clicked.'); break; case 2: mouseleft=0; console.log('mouse Right button clicked.'); break; case 3: mouseleft=0; console.log('mouse Browser Back button clicked.'); break; case 4: console.log('Browser Forward button clicked.'); break; default: console.log('Unknown button clicked.'); }});*/it is working ok, but not work if the content area with iframe...so we need use blur as followswindow.addEventListener('blur', notFocused);function notFocused() { localStorage.setItem('focus','0');setTimeout(()=>{$(window).focus();},200);checkhitrate('ads_hitrate');console.log('NOT focused',ia2++);return 0;}and check whether visitor leave current page to forward to other site, use this function becoz we can not idenity it is right or left click.if .onbeforeunload even is triggered it mean it is from left clickwindow.onbeforeunload=function(e){ console.log('hist-onbeforeunload'); localStorage.removeItem("stateHistoryonbeforeunload"); localStorage.setItem("stateHistoryonbeforeunload", 1);}event onbeforeunload should be earlier than checkrate();function checkhitrate(hitrate){ if (hitrate=='ads_hitrate')sendclick();}function sendclick(){if (document.activeElement.src) var tmp=document.activeElement.src ; else tmp=""if (document.activeElement.tagName === "IFRAME"){if (tmp.indexOf('client=ca-pub-')>0){setTimeout(()=>{console.log('notfocused _post3',"stateHistoryonbeforeunload",localStorage.getItem("stateHistoryonbeforeunload"));document.activeElement.blur(); if (localStorage.getItem("stateHistoryonbeforeunload")=="1"){_post3(url,JSON.stringify(obj),fun);localStorage.removeItem("stateHistoryonbeforeunload")}},200);}}Note: every click then clear last document.activeElement by document.activeElement.blur() so next check click will be working again
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
24-12-31 23:06:18
Wilson Edwards
Reply:0
Post_ID:829289economy
https://www.investopedia.com/terms/t/trilemma.asp https://en.wikipedia.org/wiki/Trilemma Example Video: https://www.youtube.com/watch?app=desktop&v=pNlUmPZ1UC4 Any region is only able to do 2 options from the following 3 choices for itseconomy system at the same time, 3 choices: A=Independent monetary policy(獨立自主貨幣政策), B=fixed Exchange Rate(固定匯率) ,C=Free Flow of Capitial(資本自由流動)For example:USA: ACHongkong: BCChina:AB
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
24-11-27 13:34:32
Wilson Edwards
Reply:2
Post_ID:829287yoututbe
Accept
as the title, which online site is the bestPlease advise
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
←
- Underline
- Bold
- Italic
- Indent
- Step
- Bullet
- Quote
- Cut
- Copy
- Paste
- Table
- Spelling
- Find & Replace
- Undo
- Redo
- Link
- Attach
- Clear
- Code
Below area will not be traslated by Google,you can input code or other languages
Hint:If find spelling error, You need to correct it,1 by 1 or ignore it (code area won't be checked).
X-position of the mouse cursor
Y-position of the mouse cursor
Y-position of the mouse cursor
Testcursor
caretPos
Attachment:===
how to allow python socket streaming data if using cloudflare proxy on my website
Asked by test test
at 2025-03-03 21:46:28
Point:500 Replies:4 POST_ID:829359USER_ID:12424
Topic:
cloudflare;proxy;socket;python;centos 8;apache
I am using cloudflare to protect my website recently,
but I have a page which is using python socket to send streaming data to visitor with 5000 port
such as http://mywbesite.com:5000.
Before using clouldflare, visitor can get data from port 5000, now after using
cloudflare, all visitors to my website can not get any data from port 5000.
Now I pause cloudflare, the python socket port is working back again..
The question is I would to like to keep all cloudflare service such as proxy but python socket port need to work for exception by cloudflare, how can I do that ?
My Simple python socket code:
from flask import Flask, render_template, request, session,jsonify
from flask_sse import sse
from flask_socketio import SocketIO, emit, join_room
import platform
import logging
from flask_cors import CORS
import socket....
if __name__ == "__main__":
app.run(host="0.0.0.0",debug=False, port=5000, ssl_context=("mycert")
Expert: rcschroeder replied at 2025-03-03 21:49:39
To allow streaming data from your Python socket server to be accessible even when Cloudflare is enabled, you'll need to configure Cloudflare to exempt the specific port range (5000 in this case) and also set up a special URL that bypasses Cloudflare's proxying. Here's a step-by-step guide:
**Cloudflare Configuration:**
1. Log in to your Cloudflare account and navigate to the "Proxy Rules" section.
2. Click on "Create Rule" and select "HTTP request headers, URLs, or IP addresses."
3. Name this rule something like "Allow streaming data on port 5000." (e.g., "Streaming Data Exemption")
4. In the "Match any of the following" field, enter `http://mywebsite.com:5000`. You can also use a regex pattern if needed.
5. In the "Request headers, URLs, or IP addresses to block" field, leave it blank.
6. Click "Save changes."
However, this will only exempt direct requests from Cloudflare's proxy rules. To allow your Python socket server to be accessible even when Cloudflare is enabled, you'll need to set up a special URL that bypasses the proxy.
**Bypassing Cloudflare Proxy with a Custom URL**
1. Create a new page on your website (e.g., `https://mywebsite.com/stream`) that will serve as the "bypass" URL for your Python socket server.
2. In this new page, include a meta tag that tells Cloudflare to bypass its proxy rules:
```html
<meta http-equiv="X-Frame-Options" content="SAMEORIGIN">
<meta http-equiv="Cache-Control" content="no-cache, no-store, must-revalidate">
<meta http-equiv="Pragma" content="no-cache">
<meta name="robots" content="noindex, nofollow">
```
3. In your Python socket server code, use the `getsockname()` method to get the address of your listening socket and then serve this address from your "bypass" URL:
```python
import socket
# ...
def stream_data():
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.bind(("0.0.0.0", 5000))
s.listen(1)
while True:
conn, addr = s.accept()
# Serve data here...
pass
```
4. In your "bypass" URL page, use the `getsockname()` method to get the address of your listening socket and serve it directly:
```html
<% if request.method == 'GET' %>
<script>
var addr = '<%= s.getsockname()[0] %>:5000';
window.location.href = 'http://' + addr;
</script>
<% endif %>
```
Note: The above code snippet is a simplification, and you should adapt it to your specific use case.
**Apache Configuration (optional)**
If you're using Apache as your web server, you can set up a custom URL to bypass Cloudflare's proxy rules. Create an `.htaccess` file in the same directory as your "bypass" page:
```bash
# Custom URL to bypass Cloudflare proxy
RewriteRule ^/stream$ http://localhost:5000 [L,R=301]
```
This will rewrite any request to `/stream` to `http://localhost:5000`, allowing your Python socket server to be accessible even when Cloudflare is enabled.
**Testing**
1. Verify that your "bypass" URL is working correctly by visiting it in a browser.
2. Use tools like Wireshark or Fiddler to inspect network traffic and ensure that data is being sent from the `http://mywebsite.com:5000` port when accessing the "bypass" URL.
By following these steps, you should be able to allow streaming data from your Python socket server to be accessible even when Cloudflare's proxy is enabled.
**Cloudflare Configuration:**
1. Log in to your Cloudflare account and navigate to the "Proxy Rules" section.
2. Click on "Create Rule" and select "HTTP request headers, URLs, or IP addresses."
3. Name this rule something like "Allow streaming data on port 5000." (e.g., "Streaming Data Exemption")
4. In the "Match any of the following" field, enter `http://mywebsite.com:5000`. You can also use a regex pattern if needed.
5. In the "Request headers, URLs, or IP addresses to block" field, leave it blank.
6. Click "Save changes."
However, this will only exempt direct requests from Cloudflare's proxy rules. To allow your Python socket server to be accessible even when Cloudflare is enabled, you'll need to set up a special URL that bypasses the proxy.
**Bypassing Cloudflare Proxy with a Custom URL**
1. Create a new page on your website (e.g., `https://mywebsite.com/stream`) that will serve as the "bypass" URL for your Python socket server.
2. In this new page, include a meta tag that tells Cloudflare to bypass its proxy rules:
```html
<meta http-equiv="X-Frame-Options" content="SAMEORIGIN">
<meta http-equiv="Cache-Control" content="no-cache, no-store, must-revalidate">
<meta http-equiv="Pragma" content="no-cache">
<meta name="robots" content="noindex, nofollow">
```
3. In your Python socket server code, use the `getsockname()` method to get the address of your listening socket and then serve this address from your "bypass" URL:
```python
import socket
# ...
def stream_data():
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.bind(("0.0.0.0", 5000))
s.listen(1)
while True:
conn, addr = s.accept()
# Serve data here...
pass
```
4. In your "bypass" URL page, use the `getsockname()` method to get the address of your listening socket and serve it directly:
```html
<% if request.method == 'GET' %>
<script>
var addr = '<%= s.getsockname()[0] %>:5000';
window.location.href = 'http://' + addr;
</script>
<% endif %>
```
Note: The above code snippet is a simplification, and you should adapt it to your specific use case.
**Apache Configuration (optional)**
If you're using Apache as your web server, you can set up a custom URL to bypass Cloudflare's proxy rules. Create an `.htaccess` file in the same directory as your "bypass" page:
```bash
# Custom URL to bypass Cloudflare proxy
RewriteRule ^/stream$ http://localhost:5000 [L,R=301]
```
This will rewrite any request to `/stream` to `http://localhost:5000`, allowing your Python socket server to be accessible even when Cloudflare is enabled.
**Testing**
1. Verify that your "bypass" URL is working correctly by visiting it in a browser.
2. Use tools like Wireshark or Fiddler to inspect network traffic and ensure that data is being sent from the `http://mywebsite.com:5000` port when accessing the "bypass" URL.
By following these steps, you should be able to allow streaming data from your Python socket server to be accessible even when Cloudflare's proxy is enabled.
Expert: rcschroeder replied at 2025-03-03 12:40:43
The issue you're facing is due to Cloudflare's proxying behavior, which blocks incoming connections on ports below 1024 by default. This is a security feature to prevent unauthorized access to your server.
To allow your Python socket streaming data to work while still using Cloudflare's proxying service, you have a few options:
1. **Use a non-standard port above 1024**: Modify your `app.run()` line to use a custom port number above 1024. For example:
```python
if __name__ == "__main__":
app.run(host="0.0.0.0", debug=False, port=8080, ssl_context=("mycert"
```
Then, in your Cloudflare settings, you can specify a custom proxy port that points to your server's `localhost:8080`. This way, incoming requests on the specified port will be proxied through your server.
2. **Use Cloudflare's "Proxied" setting**: In Cloudflare's proxy settings, you can select the option for the specific domain or subdomain to use a custom proxy port. Go to Cloudflare > Proxies > Custom Proxied Ports and add your custom port number there.
3. **Configure Cloudflare's proxy rules**: You can also configure Cloudflare to allow specific IP addresses or domains to bypass the proxying behavior on certain ports. To do this, go to Cloudflare > Rules > Custom SSL/TLS Settings and create a new rule that specifies the IP address or domain you want to allow.
4. **Use a reverse proxy server**: Set up a reverse proxy server in front of your Python application, which will sit between your server and Cloudflare's proxy. This way, Cloudflare won't see any incoming connections on port 5000, but instead, they'll go through the reverse proxy, and then to your server.
Here is an example using `Apache` as a reverse proxy server:
Firstly you need to install necessary modules:
```bash
sudo yum install -y httpd24 mod_proxy_http
```
Create an Apache configuration file (`httpd.conf`):
```bash
<VirtualHost *:80>
ServerName mywebsite.com
ProxyPass / http://localhost:5000/
ProxyPassReverse / http://localhost:5000/
</VirtualHost>
<VirtualHost *:8080>
ServerName localhost
ProxyPass / http://localhost:5000/
ProxyPassReverse / http://localhost:5000/
</VirtualHost>
```
You can adjust this configuration to suit your needs. Now, when you run your Python application on port 5000, it will be proxied through Apache's reverse proxy server instead of being blocked by Cloudflare's default behavior.
Remember to replace `mywebsite.com` and `localhost` with the actual names or IP addresses of your domain and server respectively.
5. **Use a WebSockets reverse proxy server like `wsserver`**: wsserver is an open-source WebSocket reverse proxy that can handle bidirectional communication between clients and servers, including HTTP/2.
For example:
```bash
pip install wsserver
from flask_sse import sse
import socketserver
class WebSocketServer(socketserver.TCPServer):
def __init__(self, *args, **kwargs):
super(WebSocketServer, self).__init__(*args, **kwargs)
def handle_client(client_socket, address):
# Your code here to handle client connections
pass
server = WebSocketServer(('localhost', 8080), RequestHandlerClass=handle_client)
server.serve_forever()
```
Here are all the options explained above.
To allow your Python socket streaming data to work while still using Cloudflare's proxying service, you have a few options:
1. **Use a non-standard port above 1024**: Modify your `app.run()` line to use a custom port number above 1024. For example:
```python
if __name__ == "__main__":
app.run(host="0.0.0.0", debug=False, port=8080, ssl_context=("mycert"
```
Then, in your Cloudflare settings, you can specify a custom proxy port that points to your server's `localhost:8080`. This way, incoming requests on the specified port will be proxied through your server.
2. **Use Cloudflare's "Proxied" setting**: In Cloudflare's proxy settings, you can select the option for the specific domain or subdomain to use a custom proxy port. Go to Cloudflare > Proxies > Custom Proxied Ports and add your custom port number there.
3. **Configure Cloudflare's proxy rules**: You can also configure Cloudflare to allow specific IP addresses or domains to bypass the proxying behavior on certain ports. To do this, go to Cloudflare > Rules > Custom SSL/TLS Settings and create a new rule that specifies the IP address or domain you want to allow.
4. **Use a reverse proxy server**: Set up a reverse proxy server in front of your Python application, which will sit between your server and Cloudflare's proxy. This way, Cloudflare won't see any incoming connections on port 5000, but instead, they'll go through the reverse proxy, and then to your server.
Here is an example using `Apache` as a reverse proxy server:
Firstly you need to install necessary modules:
```bash
sudo yum install -y httpd24 mod_proxy_http
```
Create an Apache configuration file (`httpd.conf`):
```bash
<VirtualHost *:80>
ServerName mywebsite.com
ProxyPass / http://localhost:5000/
ProxyPassReverse / http://localhost:5000/
</VirtualHost>
<VirtualHost *:8080>
ServerName localhost
ProxyPass / http://localhost:5000/
ProxyPassReverse / http://localhost:5000/
</VirtualHost>
```
You can adjust this configuration to suit your needs. Now, when you run your Python application on port 5000, it will be proxied through Apache's reverse proxy server instead of being blocked by Cloudflare's default behavior.
Remember to replace `mywebsite.com` and `localhost` with the actual names or IP addresses of your domain and server respectively.
5. **Use a WebSockets reverse proxy server like `wsserver`**: wsserver is an open-source WebSocket reverse proxy that can handle bidirectional communication between clients and servers, including HTTP/2.
For example:
```bash
pip install wsserver
from flask_sse import sse
import socketserver
class WebSocketServer(socketserver.TCPServer):
def __init__(self, *args, **kwargs):
super(WebSocketServer, self).__init__(*args, **kwargs)
def handle_client(client_socket, address):
# Your code here to handle client connections
pass
server = WebSocketServer(('localhost', 8080), RequestHandlerClass=handle_client)
server.serve_forever()
```
Here are all the options explained above.
Expert: rcschroeder replied at 2025-03-03 12:35:36
To allow Python socket streaming data to work with Cloudflare proxy, you'll need to configure Cloudflare to allow certain ports or protocols while still using its proxy services. Here's a step-by-step guide to help you achieve this:
**1. Create an exception in Cloudflare:**
* Log in to your Cloudflare account and go to the "Security & DNS" tab.
* Click on "Proxy Rules" and then click on "Add Rule".
* Enter a name for your rule, e.g., "Allow Python Socket Streaming".
* In the "Request URL" field, enter a regex pattern that matches your Python socket port (in this case, `^/5000$`).
* In the "Request method" field, select "GET, POST, PUT, DELETE, HEAD, OPTIONS" to allow all HTTP methods.
* In the "Response headers" section, add the following header:
```nginx
X-Frame-Options: SAMEORIGIN
```
This will prevent Clickjacking attacks and ensure that your socket connections are not hijacked.
**2. Configure Cloudflare's SSL/TLS settings:**
* Go to the "SSL/TLS" tab in Cloudflare.
* In the "Server Name Indication (SNI)" section, select "Allow all SNI domains".
* Make sure the "Proxy protocol" is set to "HTTP/1.1".
**3. Add a custom HTTP header in Cloudflare:**
* Go to the "Proxy Rules" page and click on the three dots next to your rule.
* Select "Edit rule".
* In the "Request headers" section, add a new header:
```nginx
Custom-Header: socket-streaming-enabled=true
```
This will allow your Python socket code to detect that it's running behind Cloudflare's proxy.
**4. Configure your Python socket code to work with Cloudflare:**
In your Python socket code, you can use the `custom-header` header to detect if you're running behind a proxy:
```python
import requests
def get_custom_header():
response = requests.head('https://example.com', headers={'Custom-Header': 'socket-streaming-enabled'})
return response.headers.get('Custom-Header') == 'socket-streaming-enabled'
```
If the header is present, your code can proceed to handle the socket connections. Otherwise, it can fall back to a different configuration or display an error message.
**5. Test your setup:**
* Start your Python socket server again.
* Go to `http://mywebsite.com:5000` in your web browser.
* If everything is configured correctly, you should receive streaming data from the socket port without any issues.
By following these steps, you should be able to allow Python socket streaming data to work with Cloudflare proxy while still using its security features.
**1. Create an exception in Cloudflare:**
* Log in to your Cloudflare account and go to the "Security & DNS" tab.
* Click on "Proxy Rules" and then click on "Add Rule".
* Enter a name for your rule, e.g., "Allow Python Socket Streaming".
* In the "Request URL" field, enter a regex pattern that matches your Python socket port (in this case, `^/5000$`).
* In the "Request method" field, select "GET, POST, PUT, DELETE, HEAD, OPTIONS" to allow all HTTP methods.
* In the "Response headers" section, add the following header:
```nginx
X-Frame-Options: SAMEORIGIN
```
This will prevent Clickjacking attacks and ensure that your socket connections are not hijacked.
**2. Configure Cloudflare's SSL/TLS settings:**
* Go to the "SSL/TLS" tab in Cloudflare.
* In the "Server Name Indication (SNI)" section, select "Allow all SNI domains".
* Make sure the "Proxy protocol" is set to "HTTP/1.1".
**3. Add a custom HTTP header in Cloudflare:**
* Go to the "Proxy Rules" page and click on the three dots next to your rule.
* Select "Edit rule".
* In the "Request headers" section, add a new header:
```nginx
Custom-Header: socket-streaming-enabled=true
```
This will allow your Python socket code to detect that it's running behind Cloudflare's proxy.
**4. Configure your Python socket code to work with Cloudflare:**
In your Python socket code, you can use the `custom-header` header to detect if you're running behind a proxy:
```python
import requests
def get_custom_header():
response = requests.head('https://example.com', headers={'Custom-Header': 'socket-streaming-enabled'})
return response.headers.get('Custom-Header') == 'socket-streaming-enabled'
```
If the header is present, your code can proceed to handle the socket connections. Otherwise, it can fall back to a different configuration or display an error message.
**5. Test your setup:**
* Start your Python socket server again.
* Go to `http://mywebsite.com:5000` in your web browser.
* If everything is configured correctly, you should receive streaming data from the socket port without any issues.
By following these steps, you should be able to allow Python socket streaming data to work with Cloudflare proxy while still using its security features.
Expert: rcschroeder replied at 2025-03-03 10:29:21
I'd be happy to help you configure Cloudflare to allow Socket.IO streaming data while keeping the proxy enabled.
**Understanding the Issue**
Cloudflare's proxying feature blocks incoming connections on ports other than 80 (HTTP) and 443 (HTTPS) by default. When you use a port other than 80 or 443, like 5000 in your case, Cloudflare intercepts the request and blocks it from reaching your server.
**Solution: Using Cloudflare's "Request Blocking" feature**
To allow Socket.IO streaming data to work while keeping the proxy enabled, you'll need to use Cloudflare's "Request Blocking" feature. This feature allows you to specify which ports or IP addresses should be blocked by Cloudflare.
Here are the steps:
1. **Log in** to your Cloudflare account and navigate to the **Security** tab.
2. In the **Request Blocking** section, click on the **+ Add Rule** button.
3. Select "Port Range" from the dropdown menu.
4. Set the **Start Port** to 5000 (or the port you're using for Socket.IO).
5. Set the **End Port** to a value higher than 5000 (e.g., 6000). This will block all ports above 5000, ensuring that only your Socket.IO server can receive connections on port 5000.
6. Click **Save Changes**.
By setting this rule, Cloudflare will allow incoming requests on port 5000 while still proxying all other traffic through their servers.
**Alternative Solution: Using Apache's Listen Directive**
If you prefer not to use Cloudflare's Request Blocking feature or if it doesn't work for your specific setup, you can use Apache's `Listen` directive to specify which ports your server should listen on. This will allow Socket.IO to work while keeping the proxy enabled.
Here's an example configuration:
```apache
<VirtualHost *:80>
# Proxy settings...
</VirtualHost>
<VirtualHost *:5000>
ServerName mywebsite.com
Listen 5000
# Socket.IO server settings...
</VirtualHost>
```
In this example, Apache will listen on port 80 for proxying traffic and on port 5000 specifically for your Socket.IO server.
**Additional Tips**
* Make sure to restart your Apache service after making changes to the configuration.
* If you're using a reverse proxy setup, ensure that your client (e.g., browser) is configured to use the correct URL (e.g., `http://mywebsite.com:5000`) for Socket.IO requests.
* Be aware that this configuration may introduce additional latency or overhead due to the proxying and listening configurations.
I hope this helps you find a solution to allow Socket.IO streaming data while keeping Cloudflare's proxy enabled!
**Understanding the Issue**
Cloudflare's proxying feature blocks incoming connections on ports other than 80 (HTTP) and 443 (HTTPS) by default. When you use a port other than 80 or 443, like 5000 in your case, Cloudflare intercepts the request and blocks it from reaching your server.
**Solution: Using Cloudflare's "Request Blocking" feature**
To allow Socket.IO streaming data to work while keeping the proxy enabled, you'll need to use Cloudflare's "Request Blocking" feature. This feature allows you to specify which ports or IP addresses should be blocked by Cloudflare.
Here are the steps:
1. **Log in** to your Cloudflare account and navigate to the **Security** tab.
2. In the **Request Blocking** section, click on the **+ Add Rule** button.
3. Select "Port Range" from the dropdown menu.
4. Set the **Start Port** to 5000 (or the port you're using for Socket.IO).
5. Set the **End Port** to a value higher than 5000 (e.g., 6000). This will block all ports above 5000, ensuring that only your Socket.IO server can receive connections on port 5000.
6. Click **Save Changes**.
By setting this rule, Cloudflare will allow incoming requests on port 5000 while still proxying all other traffic through their servers.
**Alternative Solution: Using Apache's Listen Directive**
If you prefer not to use Cloudflare's Request Blocking feature or if it doesn't work for your specific setup, you can use Apache's `Listen` directive to specify which ports your server should listen on. This will allow Socket.IO to work while keeping the proxy enabled.
Here's an example configuration:
```apache
<VirtualHost *:80>
# Proxy settings...
</VirtualHost>
<VirtualHost *:5000>
ServerName mywebsite.com
Listen 5000
# Socket.IO server settings...
</VirtualHost>
```
In this example, Apache will listen on port 80 for proxying traffic and on port 5000 specifically for your Socket.IO server.
**Additional Tips**
* Make sure to restart your Apache service after making changes to the configuration.
* If you're using a reverse proxy setup, ensure that your client (e.g., browser) is configured to use the correct URL (e.g., `http://mywebsite.com:5000`) for Socket.IO requests.
* Be aware that this configuration may introduce additional latency or overhead due to the proxying and listening configurations.
I hope this helps you find a solution to allow Socket.IO streaming data while keeping Cloudflare's proxy enabled!