Netty Learning Summary

Articles Catalogue Summary What is Netty? Why don't Netty 2 use NIO directly? API usage Using Netty to Create Server-side Programs I. Body Code childHandler Actual Handler Using Netty to Create Client Programs I. Body Code handler Actual Han ...

Posted by FeralReason on Sun, 08 Sep 2019 23:12:24 -0700

Java Encryption Technology-Origin of Asymmetric Encryption Algorithms DH

Links to the original text: https://my.oschina.net/mohaiyong/blog/221266 DH Diffie-Hellman algorithm (D-H algorithm), key agreement protocol. It is an idea put forward by Diffie and H ...

Posted by WarDeities on Sun, 08 Sep 2019 23:06:22 -0700

The Way to Design - Decentralize Hotspot Data

Summary Popular hot data refers to data used in high frequency, such as some hot events, because of the fermentation effect of the network, the concurrency can reach hundreds of thousands or even millions in a short time. For such scenarios, we need to analyze the bottlenecks of the system, as well as the technical implementation of the respon ...

Posted by j007w on Sun, 08 Sep 2019 21:01:40 -0700

DNS Separation Resolution Service in Linux (True in Practice)

Overview of Separation Resolution: Separate Resolution Domain Name Server is actually the primary domain name server. Separate Resolution mainly refers to providing different domain name resolution records according to different clients.When clients from different addresses request to resolve the same domain name, they are provided with differ ...

Posted by zeezack on Sun, 08 Sep 2019 09:16:59 -0700

Docker concept and installation setup

Blog Outline: 1. Introduction to docker 2. Three core concepts of docker1. Mirror2. Containers3. Warehouses 3. Installation and basic operation of docker1. Installation and Startup2. Mirror operation of docker3. Container operation of docker 1. Introduction to docker As the most popular project in the open source community, Docker is an op ...

Posted by Yeti on Sat, 07 Sep 2019 10:15:57 -0700

Distributed Unique id: Thoughts on snowflake Algorithms

origin Why suddenly talk about distributed unique ids? The reason is that we are preparing to use the global unique ID recently. The project needs to be microserviced. Look at the introduction on the official website. The same business scenario needs ...

Posted by Bijan on Sat, 07 Sep 2019 02:54:12 -0700

Redisyum and Compile Installation

Articles Catalogue Linux Installation and Use of Redis Experiments: windows installs redis Experiments: yum installs redis Experiments: Compile and install redis Script: compile and install redis Linux Installation and Use of Redis Officia ...

Posted by davespring on Sat, 07 Sep 2019 02:10:48 -0700

Write WireShark script plug-in to parse custom messages in lua (full version)

0. Preface WireShark is undoubtedly relying on the Sword of Heaven in the arsenal of ICT personnel for network analysis. Although it has a long history, its sharpness has not been reduced at all. Because of open source, it is easy for users to d ...

Posted by Desdinova on Fri, 06 Sep 2019 20:24:15 -0700

Slide Paging Video Up and Down with Dummy

Directory Introduction 01. First look at the needs 02.There are several implementations 2.1 Use ViewPager 2.2 Use RecyclerView 03. Implement with ViewPager 3.1 Custom ViewPager 3.2 ViewPager and Fragment 3.3 Modify Sliding Distance Page Flipping 3.4 Modify sliding speed 04. Implement with RecyclerView 4.1 Customize LayoutManager 4.2 Add ...

Posted by jcleary on Fri, 06 Sep 2019 18:53:33 -0700

RocketMQ upgrades depend on the jar package version

Today, we found a new vulnerability in Aliyun's Cloud Security Center, which is called "fastjson < 1.2.60 Remote Denial of Service vulnerability". Generally speaking, if fastjson version is not updated, attackers may exploit the vulnerab ...

Posted by WebbieDave on Fri, 06 Sep 2019 02:34:14 -0700