SEARCH KEYWORD -- Memory management
Android Security
Android is an open source mobile platform that includes an operating system, middleware and applications. Android has revolutionized the mobile world in a big way. Android, which started as an alternative to Apple’s iOS, is now slowly eating into the market share of Apple and is of primary concern to the company. Let’s have a brief introduction about android and then look into the security concerns and vulnerabilities that need to be focused on. Android Introduction: Android was deve...
Android security,Input validation 2013-04-16 12:19:37
Programming language choices for an IT manager
A TechRepublic reader named Aaron emailed me and posed excellent questions; here’s an excerpt from his email:“I manage a small IT department and all my skills are self-taught. At times I struggle with complex business initiatives and I believe if I had some programming skills I would be more adept at handling the initiatives. Can you recommend a programming language? Is formal education the best path or have you found that programming can be self-taught?â€I’m sure a lot ...
IT Manager,Programming,Skills,Programming knowledge 2011-10-21 08:37:10
Kubernetes Authentication & Authorization 101
If we want to build a system with user modules, Authentication and Authorization are something that we can never ignore, though they could be fuzzy to understand. Authentication (from Greek: αá½θεντικÏŒς authentikos, “real, genuine”, from αá½θÎντης authentes, “author”) is the act of proving an assertion, such as the identity of a computer s...
RBAC,AUTHORIZATION,AUTHENTICATION,KUBERNETES 2021-06-05 23:19:18
Python Process Protection Watchdog
Project Design Purpose: During participating the cyber exercise as red team member, we found that the injected malware or attack launching program can easy be stopped by the blue team or defense program / mechanisms via killing the process / deleting the file. To address this, our project aims to develop a robust watchdog program designed to bind to target programs, diligently monitor their execution states, and ensure uninterrupted functionality. Continuous Monitoring: Establish a vigilant wa...
Python FTP Server and Client
Distributed Log File Automated Archive System This week, we will introduce the automated compute cluster nodes' log automated archive system project and FTP Communication utility library module. Program Design Purpose: This project aims to create an FTP server & client lib program for file transfer and a files management system for log data synchronization. We will develop an automated log file archive system that regularly collects newly generated log files from multiple nodes in a compute...
Is Java Set ordered or not?
“Is Java Set ordered or not? ” is the most popular question asked when you interview for a Java Developer position. Many fail to answer it, and I have to admit I was one of the many. I have known the answer is “Yes and No” for a long time. No. HashSet is not ordered. Yes.TreeSet is ordered. If the interviewer continues with some follow up questions, I’m not confident that I know the answer then. Why is TreeSet ordered? Are there any other ordered S...
Investment Banking in China — What I’ve Learned & Unlearned
Anyone seeking to succeed in investment banking in China should live by one rule alone: it’s not who you know, but how well you know them. In China, more than any other country where I’ve worked, the professional is also the personal. Comradeship, if not friendship, is always a necessary precondition to doing business together. If you haven’t shared a meal – and more importantly, shared a few hundred laughs – you will never share a business deal. Competence, ex...
Business,China,Relationship,Cooperation,Advice 2011-11-18 09:13:49
Speed Hashing
A given hash uniquely represents a file, or any arbitrary collection of data. At least in theory. This is a 128-bit MD5 hash you're looking at above, so it can represent at most 2128 unique items, or 340 trillion trillion trillion. In reality the usable space is substantially less; you can start seeing significant collisions once you've filled half the space, but half of an impossibly large number is still impossibly large. Back in 2005, I wondered about the difference between a checksum and...
Speed hashing,Security,MD5 2012-04-07 10:35:15
HP To Apple: You Win.
As I write this, I’m sitting in a cafe. Around me, there are five people on laptops — four of them are MacBooks. Four other people are using tablets — all four are iPads. Welcome to the Post-PC world. That phrase was one of the first things that jumped to my mind today when I heard the news that HP was not only killing off their TouchPad and Pre webOS-based products, but also trying to spin-off their PC business. The largest PC busine...
HP,Apple,Palm,Competition,webOs 2011-08-19 07:38:41
Understand GoLang WaitGroup internals and how it works
Background Before getting into the main content, let me give a brief introduction to WaitGroup and its related background knowledge. Here, the focus is on the basic usage of WaitGroup and the fundamental knowledge of system semaphores. For those who are familiar with these, you can skip this section directly. WaitGroup WaitGroup is one of the most common concurrency control techniques in Golang, and its function can be roughly compared to the join() in concurrency control of other languages' mul...
GOLANG,WAITGROUP,SOURCE CODE 2023-04-26 08:02:01
RECENT
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- Power Grid OT Simulation System
- Why is Golang's Compilation Speed So Fast?
- SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
- Introduction to the Application of eBPF in Golang
- Flows.network: Writing an LLM Application in Rust
- more>>