net Package--Reading Abstracts

brief introduction In the net package, there are many structures, various functions and methods. I decided to go through it on the whole and make a map. Copy and paste source: https://studygolang.com/stati... constant const ( IPv4len = 4 IPv6len = 16 ) global variable Commonly used IPv4 address. var ( IPv4bcast = IPv4(255, 255, ...

Posted by notsleepy on Mon, 12 Aug 2019 05:30:27 -0700

Automatic system signature based on gradle+shell

Preface Sometimes our application needs system-level privileges to implement some functions (such as silent installation), at this time we need to sign the application, package the APK for routine operations, decompress the apk, delete CERT.RSA and META-INF. CERT.SF, then compressed, signed with the system signature tool, a meal may be 10 minut ...

Posted by Mardoxx on Fri, 09 Aug 2019 05:14:54 -0700

FRR Learning Day 9 - Complete Data Center Network Model

Network Topology Topological description The experimental environment is a 16G memory host. The above three virtual machines are run using vmware, and the running system is ubuntu-19.04. The three virtual machines are connected in host-only mode. spine, leaf1 and leaf2 are all ubuntu-19.04. The FRR program is running on them. host1, host2, ho ...

Posted by Elemen7s on Wed, 07 Aug 2019 03:30:19 -0700

EMQ X Auth & ACL Based on MySQL

Before reading this tutorial, assume you already know it. MQTT,MQTT 5 as well as EMQ X Simple knowledge. emqx-auth-mysql It achieves access control by checking whether the username and password accessed by each terminal are consistent with the information stored in the MySQL database specified by the user. Its function logic is as follows: Thi ...

Posted by vipes on Sun, 04 Aug 2019 02:08:13 -0700

V-REP Adding Vision Sensor and Image Acquisition

Articles Catalogue V-REP End Operation 1. Open scene 2. Add vision sensor 3. Add Floating View 4.Associate Vison_sensor 5. Modify vision sensor parameters 6. Mobile and Rotating Sensors Python-side operations Code test result annotation Before completing this article, the communication between ...

Posted by clewis4343 on Sun, 04 Aug 2019 00:11:33 -0700

[dp+Game] Winning Strategy of Chess Board

Links: https://ac.nowcoder.com/acm/problem/21797Source: Niuke.com Time limit: C/C++ 1 second, 2 seconds for other languages Space limitations: C/C++ 32768K, other languages 65536K 64bit IO Format: %lld Title Description There is a two-dimensional chessboard with rows r and columns c. Each position on the board has the fol ...

Posted by Chris16962 on Sat, 03 Aug 2019 19:57:56 -0700

Mac installed Mangodb database to implement a simple Python page crawler

Mangodb Baidu Encyclopedia There are a lot of software that can't be installed without Mac version on Mac computer, but some software has Mac version and the way of installation is more complex than Windows platform. For example, now we want to install it on Mac computers. mangodb database First, we nee ...

Posted by poltort on Fri, 02 Aug 2019 01:18:28 -0700

Snowflake algorithm (improved version) - Snowflake

Snowflake algorithm Snowflake is an open source distributed ID generation algorithm based on Twitter. It divides 64-bit bits into several parts in the way of namespace partition, each part represents different meanings. The 64 bit integer in Java is Long type, so the ID generated by SnowFlake algorithm in Java is long to store. Bit 1 occupies ...

Posted by riex1 on Wed, 31 Jul 2019 06:15:44 -0700

Learn the overall architecture of jQuery source code and build your own js class library

Although jQuery is hardly used now, it is still necessary to learn its source code for JS libraries that have been popular for more than 10 years. You can also learn to build your own JS class library, job interviews can add a lot of color. This article is about v3.4.1.unpkg.com source address: https://unpkg.com/jquery@3.4.... jQuery github rep ...

Posted by zoozoo on Mon, 29 Jul 2019 03:33:29 -0700

Implementation of DES Encryption Algorithms in java

Reproduced from: https://blog.csdn.net/zyhlwzy/article/details/77948137 Because of the illegal copying of computer software, the leakage of communication and the security of data are threatened, the problem of decryption and piracy is becoming more and more serious, even leading to international dispute ...

Posted by faifas on Tue, 23 Jul 2019 03:40:32 -0700