net Package--Reading Abstracts
brief introduction
In the net package, there are many structures, various functions and methods. I decided to go through it on the whole and make a map.
Copy and paste source: https://studygolang.com/stati...
constant
const (
IPv4len = 4
IPv6len = 16
)
global variable
Commonly used IPv4 address.
var (
IPv4bcast = IPv4(255, 255, ...
Posted by notsleepy on Mon, 12 Aug 2019 05:30:27 -0700
Automatic system signature based on gradle+shell
Preface
Sometimes our application needs system-level privileges to implement some functions (such as silent installation), at this time we need to sign the application, package the APK for routine operations, decompress the apk, delete CERT.RSA and META-INF.
CERT.SF, then compressed, signed with the system signature tool, a meal may be 10 minut ...
Posted by Mardoxx on Fri, 09 Aug 2019 05:14:54 -0700
FRR Learning Day 9 - Complete Data Center Network Model
Network Topology
Topological description
The experimental environment is a 16G memory host. The above three virtual machines are run using vmware, and the running system is ubuntu-19.04. The three virtual machines are connected in host-only mode.
spine, leaf1 and leaf2 are all ubuntu-19.04. The FRR program is running on them.
host1, host2, ho ...
Posted by Elemen7s on Wed, 07 Aug 2019 03:30:19 -0700
EMQ X Auth & ACL Based on MySQL
Before reading this tutorial, assume you already know it. MQTT,MQTT 5 as well as EMQ X Simple knowledge.
emqx-auth-mysql It achieves access control by checking whether the username and password accessed by each terminal are consistent with the information stored in the MySQL database specified by the user. Its function logic is as follows:
Thi ...
Posted by vipes on Sun, 04 Aug 2019 02:08:13 -0700
V-REP Adding Vision Sensor and Image Acquisition
Articles Catalogue
V-REP End Operation
1. Open scene
2. Add vision sensor
3. Add Floating View
4.Associate Vison_sensor
5. Modify vision sensor parameters
6. Mobile and Rotating Sensors
Python-side operations
Code
test result
annotation
Before completing this article, the communication between ...
Posted by clewis4343 on Sun, 04 Aug 2019 00:11:33 -0700
[dp+Game] Winning Strategy of Chess Board
Links: https://ac.nowcoder.com/acm/problem/21797Source: Niuke.com
Time limit: C/C++ 1 second, 2 seconds for other languages
Space limitations: C/C++ 32768K, other languages 65536K
64bit IO Format: %lld
Title Description
There is a two-dimensional chessboard with rows r and columns c. Each position on the board has the fol ...
Posted by Chris16962 on Sat, 03 Aug 2019 19:57:56 -0700
Mac installed Mangodb database to implement a simple Python page crawler
Mangodb Baidu Encyclopedia
There are a lot of software that can't be installed without Mac version on Mac computer, but some software has Mac version and the way of installation is more complex than Windows platform. For example, now we want to install it on Mac computers. mangodb database First, we nee ...
Posted by poltort on Fri, 02 Aug 2019 01:18:28 -0700
Snowflake algorithm (improved version) - Snowflake
Snowflake algorithm
Snowflake is an open source distributed ID generation algorithm based on Twitter. It divides 64-bit bits into several parts in the way of namespace partition, each part represents different meanings. The 64 bit integer in Java is Long type, so the ID generated by SnowFlake algorithm in Java is long to store.
Bit 1 occupies ...
Posted by riex1 on Wed, 31 Jul 2019 06:15:44 -0700
Learn the overall architecture of jQuery source code and build your own js class library
Although jQuery is hardly used now, it is still necessary to learn its source code for JS libraries that have been popular for more than 10 years. You can also learn to build your own JS class library, job interviews can add a lot of color.
This article is about v3.4.1.unpkg.com source address: https://unpkg.com/jquery@3.4....
jQuery github rep ...
Posted by zoozoo on Mon, 29 Jul 2019 03:33:29 -0700
Implementation of DES Encryption Algorithms in java
Reproduced from: https://blog.csdn.net/zyhlwzy/article/details/77948137
Because of the illegal copying of computer software, the leakage of communication and the security of data are threatened, the problem of decryption and piracy is becoming more and more serious, even leading to international dispute ...
Posted by faifas on Tue, 23 Jul 2019 03:40:32 -0700