python network-multithreading (22)
1. What is a thread
Threads (English: thread) are the smallest unit that the operating system can schedule operations.It is included in the process and is the actual unit of operation in the process.Threads in the same process will share all the system resources in the process. A process can have many threads, each thread executes different ta ...
Posted by krio on Tue, 30 Apr 2019 15:00:36 -0700
Android Projection Implementation Summary
This is described in the previous article. Android -> Windows Diversified Screen Projection
Record the implementation here
(1) Screen capture
MediaProjection/VirtualDisplay
VirtualDisplay of mirror type (VIRTUAL_DISPLAY_FLAG_AUTO_MIRROR) cannot be created directly due to permission issues and requires prompting the user ...
Posted by acroporas on Mon, 29 Apr 2019 00:30:36 -0700
Cobalt Strike Penetration
Gentlemen's implements move around while they are waiting, so they are safe from pelvis and corners.
——AnonySec
Preface
Cobalt Strike is a Metasploit-based GUI framework penetration testing tool that integrates port forwarding, service scanning, automatic overflow, multimodal port monitoring, exe, powershell Trojan generation, et ...
Posted by ten31studios on Sun, 28 Apr 2019 04:40:36 -0700
[scheduler]1. Introduction to several scheduler infrastructure
Introduction to ###Scheduler
A good scheduling algorithm should consider the following aspects:
Fairness: Reasonable CPU time is guaranteed for each process.
Efficient: Keep the CPU busy, that is, there are always processes running on the CPU.
Response time: Make the response time of the interactive user as short as possible.
T ...
Posted by vimukthi on Sat, 27 Apr 2019 00:54:36 -0700
Use AddressSanitizer under Windows to detect memory access violations
Use of AddressSanitizer under Windows
brief introduction
AddressSanitizer's function is roughly a variety of buffer overflow detection, such as what's beyond the bounds of an array, which can be used to avoid some undefined behavior, first used for Unix homework, and then can no longer be separated from it...AddressSanitizer ...
Posted by gabrielserban on Fri, 26 Apr 2019 05:12:36 -0700
Compression and archiving on Linux
Very, very, very simple description.
compress
The simple principle of compression is to replace the storage space on disk with the calculation time of CPU by some algorithms. At the same time, the bandwidth in network transmission can be saved.
For text files compression effect is better, for binary programs, pictures and other files com ...
Posted by rea|and on Tue, 23 Apr 2019 19:39:38 -0700
Flutter Phase I - First Understanding of Flutter
It should be updated all the time in the future, I think. First of all, I will not state the future trend of flutter. It is impossible for java to be replaced by other languages in the future. It will still be the dominant language in China. It's not very meaningful to learn or not to learn flutter personally. After debating whether or not the ...
Posted by sulen on Tue, 23 Apr 2019 17:09:35 -0700
Android ScrollView monitoring
With the rapid development of the mobile internet, it has been closely related to our lives. Many people can be seen in the bus and subway looking down at their mobile phone screens. From then on, the word "bowing tribe" came into being. As a developer of the mobile industry, I am also a "bowing tribe". I read the news on ...
Posted by jburfield on Mon, 22 Apr 2019 22:30:36 -0700
python hands-on script-timed detection of unresponsive processes and restart
background
There are always some programs in the windows platform performance is not stable, no response for a period of time, but have to use, each time is found a problem to restart manually, now write a script to check whether the process is normal, automatically restart.
Knowledge Points
schedule Timing Task Scheduling ...
Posted by kvishnu_13 on Mon, 22 Apr 2019 00:30:35 -0700
Intranet penetration/port mapping using ngrok sentence
Article directory
What is ngrok?
support system
Start using
1. Download
2. Decompress and install
3. Create an ngrok account and configure authtoken
4. Start penetrating the Intranet
Use help
Follow-up
What is ngrok?
ngrok is a reverse proxy written in go language, which establishes a secure channel between a common en ...
Posted by mbowling on Sun, 21 Apr 2019 18:33:33 -0700