Let me in.
Skynet management system
Forgot the password
Guess Next Session
Experiment bar Web Topic series 3
Let me in.
I believe you can get what you want
Hint: you may want to know wha ...
Posted on Mon, 24 Feb 2020 07:22:30 -0500 by vinaip
Like the author: redis source code, many comments and very detailed. Before looking at the source code of the compressed list, you can first look at the comments at the top of the ziplist.c file to basically understand the data structure design.
The compressed list ziplist is a two-wa ...
Posted on Thu, 30 Jan 2020 00:22:05 -0500 by markmax33
Jupyter Notebook is a very easy-to-use gadget, but it can only be accessed locally without configuration.
This article references[ Brief book ]The jupyter notebook is configured to realize cross host browser access.
Install jupyter notebook
conda install jupyter notebook
The. Jupyte ...
Posted on Mon, 27 Jan 2020 04:52:52 -0500 by solaris77
frp error on jupyternobook remote agent
Before that, frp was used to expose the jupyter notebook to the Internet for the remote use of the author. But one day suddenly my jupyter notebook page couldn't be opened
So I went to the lab server to check the error log:
Posted on Wed, 22 Jan 2020 04:17:26 -0500 by bow-viper1
checksec mechanism and file information
RELRO: Full RELRO
Stack: No canary found
NX: NX enabled
PIE: No PIE (0x8048000)
./babyrop: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter
/lib/ld-, for GNU ...
Posted on Mon, 20 Jan 2020 10:19:22 -0500 by adammo
This series of tutorials will be based on springboot2.1.8.RELEASE
This article will implement
Registered account number
Access to WeChat
Certification as a developer
2, Enter wechat public platform to register account
Personal user suggested to register subscription number
Finally, the registration was ...
Posted on Thu, 16 Jan 2020 01:54:45 -0500 by galayman
First of all, we need to know what kind of identity is 32-bit and 64 bit.
PC server X86 series
I386--I686 are all 32 bits
X86 ʄ is 64 bit
Order is not too much, in order to prevent the obstacles of selectivity, choose the first method unanimously, the latter is only for supplement.
Posted on Wed, 08 Jan 2020 13:46:56 -0500 by mediamind
Note the following:
The first step is to understand what is websocket, which is not described here
Understand the interaction protocol of websocket
Handshake protocol and protocol analysis
A lot of materials have detailed introduction to the handshake protocol of websocket. I won't talk about it here. Just go to th ...
Posted on Wed, 08 Jan 2020 11:33:28 -0500 by skyloon
The full name of TOTP is "Time-based One-time Password". It is recognized as a reliable solution and has been written into the international standard RFC6238.
I have known this thing for a long time, but I don't know how to realize it
For example, QQ security center's key, U shield, is dynamic password and so on
Today, I saw teacher R ...
Posted on Wed, 08 Jan 2020 10:15:14 -0500 by joshblue
Like friends can pay attention.
I haven't shared a technical article for a long time. Today, I took a moment to tell you how to call the scan interface provided by wechat.
I need to apply for a public number: I will not ask for the information required to apply for the public number. What will I need to apply for We ...
Posted on Sat, 28 Dec 2019 10:45:00 -0500 by Plxply