PHP implementation of JS pigmented text encryption and decryption process-aaencode
When debugging a JS of a website, a lot of germinating code appears and can be executed successfully. I am curious about this and have implemented the PHP-side encoding and decoding process.
For example, the following code outputs a piece of text after execut ...
Posted on Sat, 04 Apr 2020 18:39:09 -0400 by davidska
linux provides different functions for reading files, with the following references:
When a random read-write operation is performed on the same file handle (under Windows) or file descriptor (under Linux), there are two steps to locate and read/write the file pointer, but since this is not an atomic operation, ...
Posted on Sat, 04 Apr 2020 17:10:10 -0400 by MrAlaska
1. CSI Storage Mechanism
1.1 Introduction to CSI
Kubernetes introduced the Container Storage Interface (CSI) mechanism from version 1.9 to establish a standard storage management interface between Kubernetes and external storage systems, which provides storage services for containers.
1.2 Design background for CSI
Kubernetes has provided a ...
Posted on Sat, 04 Apr 2020 12:31:19 -0400 by jeethau
1. Disk management du command details
The du(disk usage) command calculates the disk space occupied by a file or directory. When no option is specified, it measures the current working directory and all subdirectories, displays the number of blocks occupied by each directory respectively, and finally displays ...
Posted on Sat, 04 Apr 2020 08:29:37 -0400 by archbeta
1. It can be used as a cluster management tool.
2. Profiles can be managed centrally.
1.1.1. Installation of Zookeeper
JDK: above 1.7
Zookeeper is developed by java and can run in windows and linux environment. The jdk needs to be installed first.
Step 1: insta ...
Posted on Sat, 04 Apr 2020 02:13:10 -0400 by pheagey
Suggested collection, otherwise you can't find it!!!
In Android, memory leaks are very common; however, the consequences of memory leaks will make Crash a comprehensive introduction to the nature, causes and solutions of memory leaks, and ultimately provide some common memory leak analysis tools that you will like.
1. Introduc ...
Posted on Fri, 03 Apr 2020 23:33:31 -0400 by Snewzzer
KubeSphere's real battle of troubleshooting
KubeSphere troubleshooting Practice II
In the later use of kubesphere, some usage problems are also recorded, hoping to be helpful to others, and a container management platform with silky smooth experience.
XIV deletion of abnormal containers
Before using helm to deploy consumer, delet ...
Posted on Fri, 03 Apr 2020 19:34:48 -0400 by kbc1
Lazy people don't talk much
Lancher official website is too targeted. Basically, it is k8s cluster that requires rke to deploy. Admitting that lancher dashboard is not bad, it can improve development efficiency. But rke is shit, rke is shit, rke is shit, and important things are said three times
The scheme of deploying ha with helm has been t ...
Posted on Fri, 03 Apr 2020 16:12:34 -0400 by swebajen
LVM can adjust the size of filesystem flexibly, but the disadvantage is that it may not accelerate the function of hardware backup (different from snapshot). The disk array has the function of performance and backup, but it can not provide the advantages similar to LVM. In this scenario, we want to use the function of "bui ...
Posted on Fri, 03 Apr 2020 12:57:47 -0400 by ChrisDarl
Operating system version: CentOS release 6.4 (Final) software version: outsundelete-0.2.4.tar.bz2
1. Use the rz command to upload the extundelete-0.2.4.tar.bz2 to the / tmp folder and extract the software.
[root@localhost tmp]# tar -jxvf extundelete-0.2.4.tar.bz2
2. Enter the directory under which the extract is extracted, and perform the co ...
Posted on Fri, 03 Apr 2020 12:08:04 -0400 by sword