SEARCH KEYWORD -- DATABASE SUPPORT
30 minutes to fix Java vulnerability
On September 25, Adam Gowdiak from the Polish security consulting firm Security Explorations submitted a Java security vulnerability to Oracle and provided a proof-of-concept. The vulnerability exists in Java 5 6,7, once the user accesses hosted malware site, an attacker can remotely control the infected machine.Gowdiak later got in touch again with Oracle and got the response that the fix has reached the final stage. He can expect the patch in four months later. He eventually unbearable Oracle'...
Java, Vulnerability,Fix 2012-10-29 11:53:43
Guide on recovering data in MySQL
In our daily work, there might be mistakes made which got some data or even databases deleted in MySQL. If this happens on production, it would be a nightmare. In case this happens, normally DBA would jump in to save the world. And they would try to recover the data from the backup if there is any. But if there is no backup, then the show stops. Hence database backup is necessary on production environments to avoid such awkward situation. Also normally in MySQL, binlog should be enabled as well ...
Why is single threaded Redis so fast
Redis is a high-performance, in-memory key-value database. According to official test reports, it can support around 100,000 QPS (queries per second) on a single machine. However, Redis uses a single-threaded architecture in its design. Why does Redis still have such high performance with a single-threaded design? Wouldn't it be better to use multiple threads for concurrent request processing? In this article, let's explore why Redis has a single-threaded architecture and still maintains its spe...
REDIS,SINGLE-THREADED,MULTI-THREADING 2023-02-28 05:16:22
A serious security vulnerability found in MySQL/MariaDB
Recently a serious security vulnerability was found in MySQL/MariaDB. It relates to the access to the database. The issue is described below.When a user connects to MariaDB/MySQL, a token (SHA over a password and a random scramble string) is calculated and compared with the expected value. Because of incorrect casting, it might've happened that the token and the expected value were considered equal, even if the memcmp() returned a non-zero value. In this case MySQL/MariaDB would think that the p...
6 necessary WordPress plugins for personal blogs
WordPress is now adopted by most bloggers, it has various themes and powerful plugins. There are lots of amazing plugins can be chosen such as spam comment filers and sitemap generators. For novice WordPress users, you may be confused about which plugin to choose, here we share with you 6 necessary WordPress plugins. Akismet Akismet is a built-in WordPress comment plugin. It checks your comments against the Akismet web service to see if they look like spam or not and lets you review the spam it ...
WordPress plugin,Comment,Sitemap 2013-08-05 03:18:40
Consistency between Redis Cache and SQL Database
Nowadays, Redis has become one of the most popular cache solution in the Internet industry. Although relational database systems (SQL) bring many awesome properties such as ACID, the performance of the database would degrade under high load in order to maintain these properties. In order to fix this problem, many companies & websites have decided to add a cache layer between the application layer (i.e., the backend code which handles the business logic) and the storage layer (i.e., the SQL d...
Highly efficient PHP code writing
Next are some tips for writing highly efficient PHP codes. They are described below: 0. Use single quote to replace double quote, this will be better since PHP will serach for variables in double quoted strings. Note, only echo can do this; 1. If we can define methods of a class as static, then do it. It will increase access speed by 4 times; 2. $row["id"] is 7 times faster than $row[id]; 3. echo is faster than print, and also use echo's multiple parameter format such as echo $str1,$str2 inst...
PHP,Code writing,High efficient,Tips 2011-07-23 12:35:50
Never ever touch a programmer
This is a technical license plate block example. We don't know whether it is working or not, however, the idea is very good. When you drive through some of the junctions, the camera captures the license number and convert it into text with OCR, and then insert them into the database. Therefore, this license plate on the car becomes a SQL injection. This picture tells us -- never trust user input.Author : 陈皓 Source : http://coolshell.cn/articles/6639.html#more-6639...
Programmer,SQL injection 2012-04-21 01:19:48
You can get properties of pseudo-element using JavaScript now
The pseudo-element6 in CSS is extremely useful, you can use it to create CSS triangles and lots of other elements without overuse many HTML elements. In the past, you cannot get the property value of pseudo-element in CSS using JavaScript. Now you can call a new method in JavaScript to get them easily. Assume you have below CSS codes: .element:before { content: 'NEW'; color: rgb(255, 0, 0); } To get the properties in .element:before, you can use below JavaScript method: var color = window.getC...
pseudo-element,property,JavaScript 2014-04-05 20:58:25
Apple says goodbye to Google
Apple released many new products and new software in this year's WWDC.They include the new MacBook Air, the new MacBook Pro, iOS6 and more. Among them, the Apple's new map app may get the attention of people who love or hate Google. In iOS6, Apple ruled out Google map, they are saying goodbye to Google. This new Map app integrated with Siri will have voice navigation feature. This means people can receive real time traffic update and the map can offer alternate routes. Also, it will be a 3D map ...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>