SEARCH KEYWORD -- app design
Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
We are excited to share that the Power Grid Simulation System we developed was used as part of one red team's targeted critical infrastructure system the international cyber exercise Crossed Swords 2024 which conducted in December 2024. In this article, we will introduce one power outage attack case study which use the Power Grid Simulation System as the demo platform for OT cyber security workshop. Project Design Purpose: This case study demonstrates using the Power Grid Simulation System as a...
Our Go Cache Library Choices
In Build a Go KV Cache from Scratch in 20 minutes, I walked you through what matters when writing a local cache, and eventually implemented one, whose performance was beaten badly by that of the popular go-cache on Github though. However, the bright side is that we can learn a lot from those excellent Github Go cache products, studying their features, applicable scenarios, and implementations, and extracting what we need. In this article, I will mainly analyze and compare the four...
GOLANG,CACHE,GO-CACHE,BIGCACHE,GOURPCACHE 2022-04-16 07:48:11
Mock Solutions for GoLang Unit Test
In Go development, Unit Test is inevitable. And it is essential to use Mock when writing Unit Tests. Mock can help test isolate the business logic it depends on, enabling it to compile, link, and run independently. Mock needs Stub. Stub function replaces the real business logic function, returns the required result, and assists the test. I involved the related test code for Controllers while writing Kubernetes Operator recently, and there would be mocks for GRPC and HT...
IT System Cyber Attack Case Study 01: Malicious Macro and Backdoor Trojan Attack on IT-Network
Project Design Purpose: The objective of this cyber attack case study is to develop a workshop showcasing a practical demonstration of a red team attacker implementing an IT system/network attack via a Malicious Macro MS-Office-Word file (CVE-2015-1641) and phishing email generation program to penetrate multiple layers of firewall defenses and implant a backdoor trojan into the railway system's OT network. Related Links: GitHub Project Link , LinkedIn Post Link Attacker Vector: Malicious Macro ...
How expensive is a MySQL query?
Database access speed is always the bottle neck of many applications. Many application have large amount of data to search, retrieve and display nowadays. How do we improve the performance of our applications, how do we reduce the cost of database access? Apart from the design of database, the quality of the query is also one important factor to take care. But before that, we need to know how much network traffic a query will consume. Yunyang,Zhang from Nubee in Singapore did some research...
MySQL,Network traffic,Query 2013-04-09 05:13:33
A walk through of different ways accessing Kubernetes application
When a web application is deployed on KUbernetes, to access the application, there must be some set up needs to be done so that external users can access the resource within the Kubernetes clusters. IN this post, we will walk through different ways to access application from outside. Before exploring different ways, let's set up a simple nginx eb application which will just serve the nginx welcome message when loading. # deployment.yaml apiVersion: apps/v1 kind: Deployment metadata: name: ngin...
KUBERNETES,PORT FORWARD,SERVICE,CLUSTERIP,NODEPORT,LOADBALANCER,INGRESS 2021-05-31 00:20:27
LinkedIn is out of China and replaced with LinkedIn Jobs
The popular job searching site LinkedIn has come out a special version for China which is just offering job searching capabilities and messaging capabilities in the connections. The social media capability like news feeds and peoples activities are stripped out. Now if you are in China and open LinkedIn app, it will prompt you and ask you to download an app called LinkedIn Jobs. You will not be able to dismiss the dialog and you are forced to download the other app if you wanna continue to...
LINKEDIN,LINKEDIN JOBS,CHINA,MICROSOFT 2021-12-24 20:13:24
Set Real-Time Clock Unit for OT/IoT Device
Configure DS1307 RTC on BeagleBone-Black Arduino or Raspberry-PI Figure-00: Project Overview Diagram , version v0.1.2 (2024) Program Design Purpose: Real-Time Clock (RTC) modules are essential for maintaining accurate timekeeping in various applications, including system clocks, data logging, and alarm systems. In scenarios where devices operate offline, such as a ship's NMEA 0183 data recorder that logs engine and rudder data, or an RTU (Remote Terminal Unit) with real time state change config...
Nokia is still alive and lives a good life indeed
1 Do you believe that Nokia, which you thought had gone bankrupt, not only survived but is still one of the world's most profitable technology companies, making trillions of dollars in profit every year? In 2022, Nokia's annual revenue reached 24.9 billion euros. Its net profit of 4.25 billion euros also hit a new high in nearly a decade. Moreover, as early as 2017, it quietly returned to the Fortune Global 500. In the telecommunications field, it is the world's third-largest telecommunications...
Is Toutiao taking general content creators seirously?
Tiktok is now very popular among the Z-generation around the world. This is an app created by the Chinese company ByteDance. In China, the Chinese version of Tiktok called Douyin is not the only popular app created by ByteDance, there are a few other apps created by ByteDance are also popular such as Jinri Toutiao, a news app famous for its recommendation algorithm similar to Tiktok, also Huoshan Video, another video app similar to YouTube. This Toutiao app encourages general people to create co...
JINRI TOUTIAO,CONTENT CREATION,TOUTIAO,BYTEDANCE 2021-10-03 01:10:27
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>