- Please note that when you are working with a KVM session or another application that captures the keyboard,
- you can't use some keyboard shortcuts such as Ctrl+Alt+Del (which will be caught by your OS) or Ctrl+W (caught by your browser).
+ 请注意,在使用KVM会话或另一个捕获键盘的应用程序时,您不能使用一些键盘快捷键,
+ 例如Ctrl+Alt+Del(这将被您的操作系统捕获)或Ctrl+W(将被您的浏览器捕获)。
-
To override this limitation you can use Google Chrome
- or Chromium in application mode.
+
WARNING! We strongly don't recommend you to use IPMI in untrusted networks because
- this protocol is completely unsafe by design. In short, the authentication process for IPMI mandates
- that the server send a salted SHA1 or MD5 hash of the requested user's password to the client,
- prior to the client authenticating.
+
NEVER use the same passwords for KVMD and IPMI users. And even better not to use IPMI.
- Instead, you can directly use KVMD API via curl. Here some examples:
+
This image was connected manually using kvmd-otgmsd
+
该镜像是kvmd-otgmsd通过手动连接的
@@ -437,12 +435,12 @@
-
Read-write mode is enabled
+
读写模式已启用
-
Do not turn off PiKVM while this is active to prevent
- filesystem corruption. Use read-only mode where possible,
- as writing to SD card often can reduce its lifespan.
// These kind people donated money to the PiKVM project
- // and supported the work on it. We are very grateful
- // for their help, and memorializing their names
- // is the least we can do in gratitude.
- // If you also want to support this project,
- // you can donate on Patreon
- or Paypal.
+
\ No newline at end of file
diff -ur /usr/share/kvmd/web/login/index.html ./login/index.html
--- /usr/share/kvmd/web/login/index.html 2023-11-05 07:33:58.431778505 +0000
+++ ./login/index.html 2023-11-03 13:47:13.633011312 +0000
@@ -25,7 +25,7 @@
- PiKVM Login
+ PiKVM 登录
@@ -49,21 +49,21 @@
-
Username:
+
账号:
-
Password:
+
密码:
-
2FA code:
+
双因素身份验证:
-
+
@@ -74,7 +74,7 @@
-
+
@@ -82,9 +82,10 @@
-
This site is actively using JavaScript.
- It doesn't contain ads, but is blocked by some ad filters.
- Please turn it off to continue and reload the page.
+
This PiKVM device has running kvmd-vnc daemon and provides VNC access to the server.
-
WARNING! We strongly don't recommend you to use VNC in untrusted networks without
- enabled X.509 or TLS encryption. Otherwise your passwords are transmitted in a plain text
- over the network.
+
- Your VNC client must support Tight JPEG compression and password authentication.
- TigerVNC is a good choice.
- On Linux, this client will most likely be available for installation from the repository.
- It can also be called vncviewer.
+ 您的 VNC 客户端必须支持 Tight JPEG 压缩和密码验证。
+ TigerVNC 是一个不错的选择。
+ 在 Linux 上,该客户端很可能可以从软件源中安装。
+ 它也叫做 vncviewer。