Summary of leetcode brushing
2019/8/3: Minimum stack
Problem description
Design a stack that supports push, pop, top operations and can retrieve the smallest elements in a constant time.
push(x) - Push element x into the stack.
pop() - delete the element at the top of the stack.
top() - Gets the top element of the stack.
getMi ...
Posted by vincente on Fri, 11 Oct 2019 10:13:03 -0700
MySQL does not open slave how to complete remote replication
1. Loading data in batches through remote binlog
New business needs, online database data pulled to this time, but slave service is not allowed to open, database account of direct external network is not established, and the network of database external network can not be connected, so our test enviro ...
Posted by hwmetzger on Fri, 11 Oct 2019 08:05:50 -0700
Command based day3 (20190929)
1. What is an order?
1. Linux commands
Instructions or programs used to implement a certain type of functionWhen Linux executes most commands, it must find the appropriate program.Green: Executable Procedures
2. General format of command line
Basic Usage
Command word [option]... [parameter 1] [parameter 2]...
[root@nsd ~]# cat --help ...
Posted by robman2100 on Fri, 11 Oct 2019 07:41:42 -0700
java Foundation (24): Conversion Stream, Buffer Stream
1. Conversion flow
What does it mean to construct an InputStreamReader or OutputStreamWriter on the basis of byte streams when learning about character streams (FileReader, FileWriter)?
1.1 OutputStreamWriter class
Referring to the API introduction of Output Stream Writer, Output Stream Writer is a bridge between character flow and ...
Posted by Jude on Fri, 11 Oct 2019 02:44:51 -0700
python web Framework Flask-csrf Attack
What is CSRF?
Cross Site Request Forgery (Cross Site Request Forgery) is a network attack. It was listed as one of the 20 major security risks of the Internet in 2007. It is also known as "One Click Attack" or Session Riding. It is usually abbreviated as CSRF or XSRF. It is a malicious use of the website, which is known as phishing w ...
Posted by phpnow on Thu, 10 Oct 2019 23:48:03 -0700
HTML Makes Simple Clocks
HTML Makes Simple Clocks
Using HTML, CSS, jQuery, JS to make clocks can get the system time and make the pointers of the clocks change in real time without much code.
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width= ...
Posted by ctsttom on Thu, 10 Oct 2019 14:04:50 -0700
The Perfect Solution of RestTemplate Chinese Scrambling
RestTemplate uses the default encoding in String HttpMessageConverter for Strings
public class StringHttpMessageConverter extends AbstractHttpMessageConverter<String> {
//Eliminate other code
public static final Charset DEFAULT_CHARSET = StandardCharsets.ISO_8859_1;
}
In ISO_8859_1 encoding lattice, Chinese is disorderly. So we ne ...
Posted by itarun on Thu, 10 Oct 2019 09:22:22 -0700
Noejs Language Implements Verification Code Generation Function
Verification code has been a very common anti-cheating and anti-attack means, in fact, it is not difficult for people with good technical level to achieve this function, but not everyone, every language is naturally suitable for a function... But we can shield differentiation by encapsulating interfaces, simplify the problem, and now use a simp ...
Posted by eddy556 on Thu, 10 Oct 2019 07:48:40 -0700
Simple interface calls, perfect completion of shortening the site
Short web addresses are sometimes a very new requirement. There are many such websites on the Internet, but sometimes they want to call interfaces to shorten the web addresses. Many of these websites are not provided. Commonly used interfaces on the Internet, such as Sina's short web interface, shallot computing Short web interface In fact, the ...
Posted by fodder on Thu, 10 Oct 2019 07:12:15 -0700
What should Java crawlers do when they encounter websites that need to be logged in?
This is the second in a series of Java Web Crawler blogs, in the last one Java web crawler, it's so simple In this article, we have simply learned how to use Java for web crawling. In this article, we will briefly talk about web crawlers, encounter the need to log on to the site, what should we do?
When doing crawler, it is common to encounter ...
Posted by miro_igov on Wed, 09 Oct 2019 23:24:05 -0700