SEARCH KEYWORD -- file transfer
Build Hadoop environment in Linux
Hadoop standalone installation: 1. Install JDK Install JDK with below command: sudo apt-get install sun-java6-jdk Configure Java environment, open /etc/profile, add below contents: export JAVA_HOME = (Java installation directory) export CLASSPATH =".:$JAVA_HOME/lib:$CLASSPATH" export PATH = "$JAVA_HOME/:PATH" Verify installation of Java Type java --version, if it outputs Java version information, then Java is successfully installed. 2. Install SSH Install SSH with below command: sudo ...
Hadoop.Linux,Configuration 2013-07-31 23:22:27
Package Control doesn't show up in Sublime Text 3
Package Control is a package management console for managing packages in Sublime Text. It is frequently used to install, update packages. In Sublime Text 3, the Package Control package can be installed by following instructions at https://packagecontrol.io/installation After installation, when you press Ctrl + Shift + P, a dialog with a text field will show up and package control commands can be typed and executed. However, if you don't see the expected package control commands ...
SUBLIME TEXT 3,SUBLIME TEXT,PACKAGE CONTROL 2016-09-25 09:35:07
Top 10 reasons to use a low-code platform
Generally, as the best coding platforms, low code includes low code app development, process development solutions and software development tools. IT users utilize low code solutions as a source of the required building blocks for the building of workflows and applications. The building blocks make it easier to assemble apps and workflows without requiring hand-coding. The growth of low-code platforms therefore levels business grounds by reducing the time spent in coding among other benefits.&nb...
LOW CODE,PROGRAMMING 2021-02-18 19:43:49
Be careful when running knife vault command
While using Chef, one would frequently use knife commands which are used to manage resources on the Chef server. One can list all nodes, data bags, vault items and many other stuff on the Chef server. In this post, we would cover one command which may need your attention when using it -- knife vault. On Chef server, one can store data to data bags which can be accessed by registered clients. These data bags usually store the data in plain text format. In some cases, one would need to store data ...
KNIFE VAULT,KNIFE DATA BAG,CHEF-VAULT,CHEF 2017-08-19 00:26:54
Python Deserialization Attack Introduction: How to Build a Python Pickle Bomb
This article introduces an old and classic unsecured Python data serialization feature (the pickle library) and demonstrates how a red team attacker can exploit it to create a malicious binary or text data file that executes remote code or commands upon deserialization. The following attack flow diagram illustrates this process: We will follow 3 steps with the program code to show how Deserialization Attacks Work: [ Step1 ] Crafting Malicious Data: An attacker crafts a malicious payloa...
Remove the Small Arrow on Desktop Application Shortcut on Windows
Maybe many of us have seen a small arrow on desktop application shortcut after we install the application on Windows. Some may like it but some people may think it doesn't look beautiful enough. We may need to remove these small arrows somehow the desktop can be clean. So how? Many people may use a third party software to remove the small arrow, then they must go to download the software and install them. But do we necessary do this in order to remove the small arrow?The a...
SMALL ARROW,SHORTCUT,DESKTOP,APPLICATION,WINDOWS 2014-10-25 08:39:58
The Evolution of a Programmer
High School/Jr.High 10 PRINT "HELLO WORLD" 20 END First year in College program Hello(input, output) begin writeln('Hello World') end. Senior year in College (defun hello (print (cons 'Hello (list 'World)))) New professional #include <stdio.h> void main(void) { char *message[] = {"Hello ", "World"}; int i; for(i = 0; i < 2; ++i) printf("%s", message[i]); printf("\n"); } Seasoned professional #include <iostream....
Humour,Evolution,Programmer 2012-04-23 06:30:33
Using msmtp to replace sendmail
sendmail is a mail client in Linux with many vulnerabilities and tedius configuration steps, many system administrators have disabled using it. Then how do we know what happens if a crontab script executes with error? Actually there are some replacements for sendmail, one is ssmtp, but this application is no longer maintained, we even cannot find its source code on Google. Fortunately, we can use msmtp to replace sendmail. The address : http://msmtp.sourceforge.net/ 1. Installation After downloa...
sendmail, msmtp, replacement 2012-09-27 11:41:48
Implement struct no copy in GoLang
There is some case where some of the struct in GoLang which is not meant to be copied. For example, sometimes a global configuration which should have only one version passed around the whole application and should not be copied and modified. In GoLang, there is no intuitive solution on preventing copying of struct. But there is still some way which can be leveraged to help prevent this while developing the code. The trick is to define some struct implementing sync.Locker interface and has this ...
10 design principles of Google data center
Google's data center supports the world's largest search engine, smart phone application platform and cloud computing services. The data center is Google's core engine and competitiveness. Over the years, Google also plays the role of the founder and innovator of large-scale web service data center technology. Its data center infrastructure design is also at the forefront of the industry, including renewable energy use, low-power refrigeration, new energy utilization as well as data center room ...
Google,Data center,Design principle 2013-03-11 19:09:25
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>