Summary of commands for random password generation under Linux
Sometimes it's a waste of time and effort to set up a secure password that complies with the complexity of the password. More importantly, it's often a tangle when setting the password. Finally, one day I couldn't help it, so I learned and sorted out how to use Linux to make commands randomly to generate commands that are safe and compliant wit ...
Posted by Nilanka on Tue, 16 Apr 2019 18:06:32 -0700
Android apk encryption plus shell technology
ABSTRACT: The usage of Chinese fetching doctrine is very good. In order to prevent their apk from being brought, here is a kind of technology to teach you!
I have been working on android framework for nearly three years. Now the company wants to do some research on android apk security, so I am looking for a lot of information to learn on ...
Posted by rosy on Fri, 12 Apr 2019 21:00:33 -0700
C# Get Files MD5 and SHA1
When I first started learning programming, I always wanted to write some small software gadgets by myself.
And this is the classic file MD5 check, by the way, with a SHA1.
When downloading something on the network, the author will provide the MD5 value.
Its function is that after downloading the software, we can do an MD5 check on the downlo ...
Posted by samusk on Sat, 30 Mar 2019 09:03:28 -0700
Wechat Public Number Test Account-Message Management/Event Push
Record the development process of Wechat Public Number.
First, we register a public test account of Wechat. Although the subscription number registered by the individual has this function, it has no user management function. So we will develop the public account of Wechat with the test account first.
Application for Wechat Test Number is her ...
Posted by ryy705 on Sun, 24 Mar 2019 00:21:29 -0700
Front-end ajax request to add rsa signature, nodejs request to add signature, nodejs api to add verification
Front-end ajax request to add rsa signature
How to use openssl to generate private key public key http://blog.csdn.net/scape1989/article/details/18959657
Course: https://github.com/kjur/jsrsasign/wiki/Tutorial-for-Signature-class
At the end of the article, there are js addresses that need to be introduced
The principle of signature is: ...
Posted by Copyright on Tue, 12 Feb 2019 03:39:18 -0800
python common modules (random, hashlib, os, sys)
random
The random module is used to get random numbers. Let's look at the functions commonly used in the random module:
# Return (0,1), float type
random.random()
# Return [1,3], int type
random.randint(1, 3)
# Return [1,3], int type
random.randrange(1, 3)
# Random access to an element in a list
random.choice([3,4,5,2,1, 'kitty'])
# ...
Posted by TheOracle on Sun, 03 Feb 2019 11:03:15 -0800
json, pickle, random, hashlib, collections
1. json and pickle
json is used for conversion between strings and Python data types
pickle is used for conversion between python-specific types and python-specific data types
json and pickle provide four methods: dumps,dump,loads,load
##json
dumps() ##Convert to a string
loads() ##Converting json-coded strings to python ...
Posted by zszucs on Sun, 23 Dec 2018 22:48:05 -0800