SEARCH KEYWORD -- Error handling style
How to check when an API is introduced in GoLang
Normally people would not pay much attention to which GoLang version is being used as lots of functions are backward compatible. However there are cases where GoLang version does matter as some functions may not be supported by old version of GoLang. For example, strings.Builder is introduced in Go 1.10, but below code would fail to be compiled on Go 1.10. package main import ( "fmt" "strings" ) func main() { var b strings.Builder b.WriteString("polarisxu") fmt.Println(b.Cap()) } The ...
GOLANG,API VERSION,GO TOOL 2021-02-07 00:43:24
Fix SSL 'alert protocol version' issue while git clone remote repository
Git provides ways to securely connect to remote repository and clone remote repository to local machine. This post will teach you how to fix the "SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version" issue while cloning a remote repository. The issue would look like: If this error occurs, it is most probably caused by out of date git version being used.To improve its security awareness, some weak cryptographic algorithms have been disabled and all git clients should upgrade to latest ones to acc...
GIT,GIT CLONE,GIT SECURITY 2018-07-08 05:41:39
How to check a port is taken by which program on Linux
Lots of you may have encountered some error message stating that the port has been taken by another program while trying to start a program on Linux. And you would want to know which program takes the port you want to use. This post will provide some feasible ways to check out which program is taking a specific port. lsof -i:[port] lsof is the command to list open files on Linux. And if you know more about Linux you should get to know everything on Linux is a file even including networ...
Encrypting and decrypting PGP file or text on MacOS
When doing data exchange among different parties, there is a frequent need of encrypting data or file and sending it to partner and asking partner to use corresponding key to decrypt the data or file. A famous way of exchanging data is using asymmetric keys where no secret key needs to be shared. One party can just use the public key shared by partner to encrypt the data and the other party uses the private key to decrypt the data. Today, we will introduce how to use PGP to encrypt and decrypt d...
PGP,GPG,ENCRYPTION,DECRYPTION,TUTORIAL 2020-10-29 05:06:09
RECENT
- Fix Surface Keyboard not Working Issue
- Python Process Protection Watchdog
- The Strange Behavior of the void Type in TypeScript
- MySQL Index Merge Optimization Practices
- Applying Large Language Models (LLMs) to Solve Cybersecurity Questions
- Everyone Can Write Tech Blogs
- Python SSH Connection Tools
- Revolutionize Your Event Planning with Interactive Presentation Templates
- New Unreal Engine 5 and Nvidia Technology in Black Myth: Wukong
- 10-32 rack screws
- more>>