In Linux, we often encounter Permisson denied errors.Whether sudo or switching root users continue execution without understanding the logic behind it.Today we'll break and tear Linux's Discretionary Access Control.
Tips: Key terms and content categorization referenced in this article may differ from the standard.Please understand flexibly
Posted on Thu, 19 Mar 2020 03:55:39 -0400 by Joshua F
There are no rules for IDs generated using UUID s or GUID s
Snowflake algorithm is implemented by Twitter engineers for incremental but not repetitive ID s
OverviewIn distributed systems, there are scenarios where a globally unique ID is required. In order to prevent ID conflicts, a 36-bit UUID can be used, but it has some drawbacks. First, it ...
Posted on Thu, 19 Mar 2020 03:20:03 -0400 by Tea_J
SonarQube is an open platform for managing code quality to quickly locate potential or obvious errors in your code. The installation, configuration, and use of this tool are described below.(This article refers to others'writings and adds a summary of your own problems)
1. jdk (please Baidu yourself, very easy)
2,sonarqube: http://ww ...
Posted on Thu, 19 Mar 2020 03:08:31 -0400 by kentopolis
Spring cloud using spring cloudconfig to configure remote configuration center
With more and more services, more and more modules, more and more configuration files of our various services. At the same time, the way of multiple services using configuration files in projects is becoming more and more inadequate. It is often troubl ...
Posted on Wed, 18 Mar 2020 08:30:35 -0400 by shaundunne
Job queue task queue application scenario is to delay (asynchronously) processing of time-consuming tasks, such as sending mail, so as to greatly shorten the time of Web request and response.
1.1 connection and queue
There is a connections configuration entry in the configuration file config/queue.php. This configuration item defi ...
Posted on Wed, 18 Mar 2020 00:17:05 -0400 by pillarofautumn
The black line is the flow direction of normal data
Red is the data flow direction under abnormal conditions
Centos7-1 (Master) 192.168.13.128 nginx reverse agent (Master), redis cache processor (Master), mysql database (Master)
Centos7-2 (backup) 192.168.13.129 nginx reverse agent (standb ...
Posted on Tue, 17 Mar 2020 10:55:55 -0400 by True`Logic
1. Build an integrated environment
Integration note: there are many ways to integrate ssm. We use xml configuration file + annotationIntegration ideas:
1. Set up a spring environment to run independently
2. Build = = springMVC = = environment, can run independently
3. Integrate the running environment ...
Posted on Tue, 17 Mar 2020 01:34:09 -0400 by Mr Mako
4. List of installation packages
5.1 Transport Installation Pack
5.2 Configure yum source
5.3 Install GCC GCC-C++.
5.4 yum acceleration
5.5 Host Name to IP Mapping
6.1 Unzip the installation package
6.2 Install My ...
Posted on Mon, 16 Mar 2020 21:54:08 -0400 by felipeebs
Code audit: xss vulnerability recurrence of bluecms user registration
BlueCMS is a solution focusing on the construction of local portal website. It is based on PHP+MySQL technology development, and all source codes are open.
The duplicate version ...
Posted on Mon, 16 Mar 2020 05:42:54 -0400 by ajna
1, Create database model
1. The basic principles are as follows:
Each model exists in Django as a Python class
Each model is a subclass of django.db.models.Model
Each class in the model represents a table in the database
Each field (property) of the model represents a column of the data table
Posted on Sun, 15 Mar 2020 05:52:00 -0400 by swordske