python network-multithreading (22)

1. What is a thread Threads (English: thread) are the smallest unit that the operating system can schedule operations.It is included in the process and is the actual unit of operation in the process.Threads in the same process will share all the system resources in the process. A process can have many threads, each thread executes different ta ...

Posted by krio on Tue, 30 Apr 2019 15:00:36 -0700

Android Projection Implementation Summary

This is described in the previous article. Android -> Windows Diversified Screen Projection Record the implementation here (1) Screen capture MediaProjection/VirtualDisplay VirtualDisplay of mirror type (VIRTUAL_DISPLAY_FLAG_AUTO_MIRROR) cannot be created directly due to permission issues and requires prompting the user ...

Posted by acroporas on Mon, 29 Apr 2019 00:30:36 -0700

Cobalt Strike Penetration

Gentlemen's implements move around while they are waiting, so they are safe from pelvis and corners. ——AnonySec Preface Cobalt Strike is a Metasploit-based GUI framework penetration testing tool that integrates port forwarding, service scanning, automatic overflow, multimodal port monitoring, exe, powershell Trojan generation, et ...

Posted by ten31studios on Sun, 28 Apr 2019 04:40:36 -0700

[scheduler]1. Introduction to several scheduler infrastructure

Introduction to ###Scheduler A good scheduling algorithm should consider the following aspects: Fairness: Reasonable CPU time is guaranteed for each process. Efficient: Keep the CPU busy, that is, there are always processes running on the CPU. Response time: Make the response time of the interactive user as short as possible. T ...

Posted by vimukthi on Sat, 27 Apr 2019 00:54:36 -0700

Use AddressSanitizer under Windows to detect memory access violations

Use of AddressSanitizer under Windows brief introduction AddressSanitizer's function is roughly a variety of buffer overflow detection, such as what's beyond the bounds of an array, which can be used to avoid some undefined behavior, first used for Unix homework, and then can no longer be separated from it...AddressSanitizer ...

Posted by gabrielserban on Fri, 26 Apr 2019 05:12:36 -0700

Compression and archiving on Linux

Very, very, very simple description. compress The simple principle of compression is to replace the storage space on disk with the calculation time of CPU by some algorithms. At the same time, the bandwidth in network transmission can be saved. For text files compression effect is better, for binary programs, pictures and other files com ...

Posted by rea|and on Tue, 23 Apr 2019 19:39:38 -0700

Flutter Phase I - First Understanding of Flutter

It should be updated all the time in the future, I think. First of all, I will not state the future trend of flutter. It is impossible for java to be replaced by other languages in the future. It will still be the dominant language in China. It's not very meaningful to learn or not to learn flutter personally. After debating whether or not the ...

Posted by sulen on Tue, 23 Apr 2019 17:09:35 -0700

Android ScrollView monitoring

With the rapid development of the mobile internet, it has been closely related to our lives. Many people can be seen in the bus and subway looking down at their mobile phone screens. From then on, the word "bowing tribe" came into being. As a developer of the mobile industry, I am also a "bowing tribe". I read the news on ...

Posted by jburfield on Mon, 22 Apr 2019 22:30:36 -0700

python hands-on script-timed detection of unresponsive processes and restart

background There are always some programs in the windows platform performance is not stable, no response for a period of time, but have to use, each time is found a problem to restart manually, now write a script to check whether the process is normal, automatically restart. Knowledge Points schedule Timing Task Scheduling ...

Posted by kvishnu_13 on Mon, 22 Apr 2019 00:30:35 -0700

Intranet penetration/port mapping using ngrok sentence

Article directory What is ngrok? support system Start using 1. Download 2. Decompress and install 3. Create an ngrok account and configure authtoken 4. Start penetrating the Intranet Use help Follow-up What is ngrok? ngrok is a reverse proxy written in go language, which establishes a secure channel between a common en ...

Posted by mbowling on Sun, 21 Apr 2019 18:33:33 -0700