SEARCH KEYWORD -- Native code
Different types of keystore in Java -- DKS
Domain KeyStore(DKS) is a keystore of keystore. It abstracts a collection of keystores that are presented as a single logical keystore. Itself is actually not a keystore. This new keystore type is introduced in Java 8. There is a new class DomainLoadStoreParameter which closely relates to DKS. To load different keystores into the single logical keystore, some configuration is needed. Here is the format of the configuration for grouping different keystores. domain [ ...] { keystore [ ....
Beauty of front end--List of front end tools used by GitHub
I did this summarization when I added Lirate_CoffeeScript support for GitHub-Linguist, i.e how does GitHub do Marjdown render and code highlight in its front end. Lots of font end tools used by GitHub are open sourced. They are: 1. HTML/CSS/JavaScript 1.1 HTML template GitHub markup and template styleguide : https://github.com/styleguide/templates 1.2 Style and CSS GitHub uses replacement of CSS: SCSS:https://github.com/nex3/sass KSS:https://github.com/kneath/kss GitHub CSS styleguide ...
Data as code
What is a good command line parser API? A good command line parser should consider below 5 aspects: Support convenient help information generation Support sub commands, for example, git has push,pull,commit sub commands. Support single character option, word option, flag option and option with parameter. Support default option, for example, if no -port is set, set it as 5037 Support usage model, for example, tar's -c and -x is mutually exclusive, they belong to different usage models. Here are...
Command line,API 2013-08-08 22:40:36
Those famous Emacs users
I don't think using Emacs can improve one's programming skills, I don't think some famous people used Emacs before can provide something, either. But these famous people encouraged me to learn Emacs when I wanted to give it up. Here I created a list of famous Emacs users. Most of people in this list are not famous because they developed or used Emacs, but they are famous and also use Emacs. Joe Armstrong -- Erlang's author In The Setup, Joe mentioned that "I write books using XML markup in emacs...
Mock Solutions for GoLang Unit Test
In Go development, Unit Test is inevitable. And it is essential to use Mock when writing Unit Tests. Mock can help test isolate the business logic it depends on, enabling it to compile, link, and run independently. Mock needs Stub. Stub function replaces the real business logic function, returns the required result, and assists the test. I involved the related test code for Controllers while writing Kubernetes Operator recently, and there would be mocks for GRPC and HT...
It makes nothing but sense...Mobile Payment...
Chinese New Year is around the corner, every place in China and lots of places in the work have been in the CNY mode. People are rushing out to get all the stuff ready to welcome the New Year Eveand the Spring Festival. I also packed my stuff and flew back to my howntown in China to enjoy the great moment to stay with families and hang out with friends whom I have't been seeing for almost one year. I am exited... However, the first thing stunned me is not my friends but the mobile payment s...
CHINA,WECHAT PAY,ALIPAY,MOBILE PAYMENT 2018-02-12 00:07:46
Some measures for improving Linux server security
The hackers often exploit server weakness to gain access control to some servers. With a scanner, aimlessly looking undefended host, backdoor, control, and sold to people in need. Some basic security measures can be taken on Linux servers to avoid being attacked by hackers. Disable root remote login As the default administrative account, root is the account which is most likely to be attacked.Disabling ssh remote login is necessary. Method: Edit / etc / ssh / sshd_config PermitRootLogin no At t...
Linux server,Server security 2012-08-21 05:08:50
10 Tools Every Software Developer Should Use in 2018
The main problem I noticed about most programmers is that even though they know about latest software development tools, they never really spend significant time to learn them well. As a programmer, I always try to learn new tools and latest technologies. At the same time, I also look to improve my knowledge of tools which I have been using for many years. Whether you're a front-end developer, full-stack programmer or part of a DevOps team, you should familiarize yourself with the latest develop...
SOFTWARE DEVELOPMENT, SOFTWARE DEVELOPMENT TOOLS, PROGRAMMING TOOLS 2018-04-28 07:08:00
8 very useful and free web security testing tools
With more pervasive of web applications, web security threats are becoming increasingly prominent. Hackers gain web server control by exploiting web server vulnerabilities and SQL injection vulnerabilities, then they may tamper with web content, or steal important internal data, the more serious is to inject malicious code into web pages to affect visitors of websites. Attention is gradually warming up to Web Application Security. Here we recommend eight very useful and free web security testing...
Website, security,Web security,Attack 2012-07-22 10:59:09
SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
Project Design Purpose: In a Security Information and Event Management (SIEM) system, effective monitoring and visualization of scam events is crucial to detecting and responding to cyberattacks. Cybercriminals often use deceptive methods to exploit individuals or organizations, aiming to steal sensitive information, financial assets, or disrupt operations. This project seeks to develop a web plugin dashboard to help cybersecurity researchers and managers better understand the scope and impact ...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>