After installing Python 3.6.3 on CentOS 7, the following errors occurred when using the pip command
Traceback (most recent call last):
File "/usr/Python3.6.3/lib/python3.6/site-packages/pip/basecommand.py", line 215, in main
status = self.run(options, args)
File "/usr/Python3.6.3/lib/python3.6/site-packages/pip/commands/search.py", l ...
Posted on Mon, 13 Jul 2020 12:30:51 -0400 by ionik
First of all, I'm not a professional in cryptography. I don't have the knowledge base in this area. This blog and the next blog are all based on the materials and blogs I can find on the Internet. I've explored and summed them up a little bit. I asked many predecessors and bloggers, but I didn't see ...
Posted on Wed, 24 Jun 2020 00:00:29 -0400 by Xyox
1, Elliptic curve cryptography
Elliptic curve: it is a kind of bivariate polynomial equation whose solution forms an elliptic curve.
Elliptic curve parameter: defines a unique elliptic curve. Two parameters g (base point) and n (order) are introduced. G point (xG, yG) is the base point on the elliptic c ...
Posted on Sat, 20 Jun 2020 04:22:35 -0400 by rane500
Official website address: http://httpd.apache.org/ , take version 2.4.43 as an example
Click Download to enter the relevant Download pageHere's another way to download: wget Download
First we download dependency
yum groupinstall "Development Tools" -y
yum install libtool -y
yum install expat-devel pcr ...
Posted on Thu, 11 Jun 2020 04:18:17 -0400 by knight
With all due respect, programmers who can't even be lazy are really tired~
Some time ago, WeChat official account was developed. WeChat official account was required to configure public domain name. The local ones don't work.
Set up the ngrok little white manual
Mapping local services to the public n ...
Posted on Tue, 09 Jun 2020 00:40:28 -0400 by intercampus
Now information disclosure is more and more serious, and a strong password is the first step to prevent the disclosure of personal sensitive information. Liang Xu once shared an article about how to judge whether your password is secure enough. Click the following link to check:
In the era of information disclosure, how to make your password mo ...
Posted on Thu, 04 Jun 2020 09:32:18 -0400 by gamblor01
Because you have an IM application, you decide to add live and short video capabilities in order to improve it.There are currently two ways to do live broadcasting, one is to directly connect with the third party's live service products, the other is to develop the services themselves.So here are also two ways to recommend simple impl ...
Posted on Tue, 19 May 2020 13:06:49 -0400 by stevebrett
Yunqi information:[ Click to see more industry information]Here you can find the first-hand cloud information of different industries. What are you waiting for? Come on!
As the most commonly used Java Web server, Tomcat's performance will drop sharply with the increasing concurrency. Is there any way to optimize the performance of Tomcat ...
Posted on Sat, 09 May 2020 04:21:50 -0400 by bstruss
1, Network environment
Host A: 192.168.0.11
Host B: 188.8.131.52
Host C: 184.108.40.206
Host A and host B communicate with each other, and host B and host C communicate with each other. If A accesses C network slowly or not, it can be accessed through stunnel+squid agent.
2, squid installation configuration
Squid and stunnel can be c ...
Posted on Sat, 02 May 2020 17:22:49 -0400 by karq
There are many tutorials in this part. There are basically no holes. I just skipped them
Try to connect
$deviceToken = 'xx=';
$ctx = stream_context_create();
// ck.pem is your certificate file
stream_context_set_option($ctx, 'ssl', 'local_cert', '/cert/ ...
Posted on Fri, 01 May 2020 23:59:18 -0400 by BlueNosE