wampserver写的网站,怎么让外网访问
wampserver写的网站,如何让外网访问?
我在wampserver的wwww目录下面写了一个网站。现在在本公司的局域网内,别人的电脑通过我的IP地址可以访问得到我的网站。请问如何能让外网也可访问得到呢?急!
------解决方案--------------------
花生壳
------解决方案--------------------
局域网内的人通过IP可以访问你的网站吧.而不是互联网上的人能访问你的网站
1.在局域网的路由设置端口映射到你这个ip 和 端口上 80
2.注册一个国际域名指到公司的公网ip上(固定IP地址)
3.设置apache 绑定域名
------解决方案--------------------
------解决方案--------------------
免费注册的域名,要设置为花生壳DNS解析服务
然后安装客户端登陆帐户就激活解析了吧,一会就能访问到了。很早玩过,详细过程记不住了
------解决方案--------------------
需要改路由器把80端口的包NAT到你的内网服务器,还要在路由器上配置自动登录花生壳做DDNS,这样你买个域名就可以始终域名访问了。
------解决方案--------------------
其实你还不如花个100块钱买个虚拟主机,啥事都省了,放代码就行了。
------解决方案--------------------
很简单啊,点击右下角的wamp图标,勾选 在线,等重启好了,局域网其它的机子就可以用IP访问了,如果是外网要访问,就要在路由上设置端口影射了,假如你的apache用的是80端口你就要影射80端口到你的机子IP,如果你的电脑有防火墙,你又要得在防火墙设置下规则了。如果以上做到了,应该就能正常访问了
------解决方案--------------------
然后在外网访问就要用到外网的IP,你可以在本地打开 www.ip.cn看下你的外网IP,得到IP后,外网用户就可以通过 http://外网IP/ 这样就可以访问了(如果你的apache是80端口),如果不是80端口,就要这样访问 http://外网IP:端口号/ 这样访问
如 http://13.29.23.11:8080/
------解决方案--------------------
花生壳 外网不能用
------解决方案--------------------
下载花生壳咯~~~
------解决方案--------------------

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Concurrency testing and debugging Concurrency testing and debugging in Java concurrent programming are crucial and the following techniques are available: Concurrency testing: Unit testing: Isolate and test a single concurrent task. Integration testing: testing the interaction between multiple concurrent tasks. Load testing: Evaluate an application's performance and scalability under heavy load. Concurrency Debugging: Breakpoints: Pause thread execution and inspect variables or execute code. Logging: Record thread events and status. Stack trace: Identify the source of the exception. Visualization tools: Monitor thread activity and resource usage.

To add a server to Eclipse, follow these steps: Create a server runtime environment Configure the server Create a server instance Select the server runtime environment Configure the server instance Start the server deployment project

How to implement HTTP streaming in C++? Create an SSL stream socket using Boost.Asio and the asiohttps client library. Connect to the server and send an HTTP request. Receive HTTP response headers and print them. Receives the HTTP response body and prints it.

There are a variety of attack methods that can take a website offline, and the more complex methods involve technical knowledge of databases and programming. A simpler method is called a "DenialOfService" (DOS) attack. The name of this attack method comes from its intention: to cause normal service requests from ordinary customers or website visitors to be denied. Generally speaking, there are two forms of DOS attacks: the third and fourth layers of the OSI model, that is, the network layer attack. The seventh layer of the OSI model, that is, the application layer attack. The first type of DOS attack - the network layer, occurs when a large number of of junk traffic flows to the web server. When spam traffic exceeds the network's ability to handle it, the website goes down. The second type of DOS attack is at the application layer and uses combined

1. Background of the Construction of 58 Portraits Platform First of all, I would like to share with you the background of the construction of the 58 Portrait Platform. 1. The traditional thinking of the traditional profiling platform is no longer enough. Building a user profiling platform relies on data warehouse modeling capabilities to integrate data from multiple business lines to build accurate user portraits; it also requires data mining to understand user behavior, interests and needs, and provide algorithms. side capabilities; finally, it also needs to have data platform capabilities to efficiently store, query and share user profile data and provide profile services. The main difference between a self-built business profiling platform and a middle-office profiling platform is that the self-built profiling platform serves a single business line and can be customized on demand; the mid-office platform serves multiple business lines, has complex modeling, and provides more general capabilities. 2.58 User portraits of the background of Zhongtai portrait construction

To successfully deploy and maintain a PHP website, you need to perform the following steps: Select a web server (such as Apache or Nginx) Install PHP Create a database and connect PHP Upload code to the server Set up domain name and DNS Monitoring website maintenance steps include updating PHP and web servers, and backing up the website , monitor error logs and update content.

How to Implement PHP Security Best Practices PHP is one of the most popular backend web programming languages used for creating dynamic and interactive websites. However, PHP code can be vulnerable to various security vulnerabilities. Implementing security best practices is critical to protecting your web applications from these threats. Input validation Input validation is a critical first step in validating user input and preventing malicious input such as SQL injection. PHP provides a variety of input validation functions, such as filter_var() and preg_match(). Example: $username=filter_var($_POST['username'],FILTER_SANIT

KubernetesOperator simplifies PHP cloud deployment by following these steps: Install PHPOperator to interact with the Kubernetes cluster. Deploy the PHP application, declare the image and port. Manage the application using commands such as getting, describing, and viewing logs.
