SEARCH KEYWORD -- SYSTEM



  Configure a PHP web server on CentOS

Are you used to use cPanel or Plesk on VPS for your PHP website management? If for some reason you don't want to use them? What can you do? How do you maintain your website? How do you access Emails, use FTP to upload files or use phpMyAdmin to manage your databases? You may need to configure all these services yourself on a VPS without cPanel or Plesk or other similar apps.But to configure all these services on a Linux server is not an easy job. You may spend many nights but still fail to get s...

   Cron,Linux,CentOS,Email,FTP,MySQL     2012-07-08 06:01:56

  Welcome To The Latest Technology Of This ERA

In the era of 70’s, Hollywood showed us a glimpse of gadgets that we would be having in the 21st century. Here we are! Driving cars without a driver, having one phone in our wrists and another one in our pockets, and what not!? The promises that Hollywood made are eventually coming true. Here is a list of some latest technologies that we have never thought of if we go back to the 70’s and now they are so common. Waterproof Phone Now-a-days people are so addicted to phones that they ...

   GENERATOR,RESEARCH,APPS,TECHNOLOGY,ASACITATION.,HOLLYWOOD     2017-07-08 10:15:25

  Different types of keystore in Java -- Overview

Keystore is a storage facility to store cryptographic keys and certificates. They are most frequently used in SSL communications to prove the identity of servers and clients. A keystore can be a file or a hardware device. Three are three kinds of entries can be stored in a keystore depending on the types of keystores. The three types of entries are: PrivateKey : This is a type of keys which are used in asymmetric cryptography. It is usually protected with password because of its sensitivity. It ...

   JAVA,KEYSTORE,OVERVIEW,JKS,PKCS12,JCEKS,PKCS11,DKS,BKS     2014-08-18 02:09:54

  Python Process Protection Watchdog

Project Design Purpose: During participating the cyber exercise as red team member, we found that the injected malware or attack launching program can easy be stopped by the blue team or defense program / mechanisms via killing the process / deleting the file. To address this, our project aims to develop a robust watchdog program designed to bind to target programs, diligently monitor their execution states, and ensure uninterrupted functionality. Continuous Monitoring: Establish a vigilant wa...

       2024-09-14 11:09:14

  Deep Dive into Spin Locks in Golang

In concurrent programming, a Mutex is a commonly used synchronization mechanism to protect critical resources and prevent data races. However, in certain specific scenarios, especially when the lock-holding time is short and the number of threads is limited, a more lightweight lock known as a Spin Lock can provide higher performance. What is a Spin Lock A Spin Lock is a form of busy-wait lock. When a thread attempts to acquire a lock held by another thread, it continuously checks the lock's stat...

   SPINLOCK,MUTEX,GOLANG     2024-01-10 05:53:28

  The use of Erlang in Facebook chat

Erlang  is a general-purpose concurrent, garbage-collected programming language and runtime system. It stays strong while building concurrency programs. Erlang provides language-level features for creating and managing processes with the aim of simplifying concurrent programming. It has large application in many chat service well known now such as Whatsapp and initial version of Facebook chat. Previously we have written an article Use of Erlang in WhatsApp. In this post, we will talk about...

   Facebook,Erlang     2014-02-25 07:12:36

  Maybe we need //Comment comment

Do we need comment in our programs? Depends, if we can write a program which can clearly tell s the reader what the program does, then we had better to avoid unnecessary comments. However, if the program we develop is complex enough and it involves some uncommon logic which needs more explanation, then we have to add comment and make sure the comment we add can correctly tell the readers what we do. The worst scenarios is not you forget or you don't want to add comment, it's that you add comment...

   comment,programming     2014-07-23 04:38:04

  One Way to Quickly Locate SQL with High CPU Usage in MySQL

When the CPU usage of a MySQL database rises abnormally, it's necessary to quickly identify the problematic SQL statements. In this post, we try to provide one way to achieve this.  Below are the actual steps. 1. Use the top command to find the threads with the highest CPU usage in the MySQL process. # Find the MySQL process ID ps -ef | grep mysql # Use the process ID to find the thread IDs with the highest CPU usage: top -H -p In top, press P to sort by CPU usage. Note the thread ID, fo...

   MYSQL,DEBUG,HIGH CPU,SLOW QUERY     2024-08-01 21:25:48

  JSP connect MySQL

To connect MySQL with Java Server Page(JSP). Some steps should be followed:Step 1: Download MySQL JDBC connector driver from the Internet. URL:  http://dev.mysql.com/downloads/connector/j/Step 2: Put the jar file downloaded in Step 1 in the Tomcat common lib folder and add this jar file to the CLASSPATH so that the JSP page can find the specified class.Step 3: Create the JSP page with MySQL connection : Example is shown below:        <% String driver="com.mysql.j...

   MySQL,JSP,Connection,Driver,Download     2011-05-11 10:04:57

  Alibaba launches NASA program

On March 9, the China E-Commerce giant Alibaba held its first internal tech conference in its headquarter Hangzhou. During this conference, Jack Ma, Alibaba founder, announced a new program code named "NASA" which aims to build up technologies serving 2 billion people in next 20 years by forming independent and powerful R&D department. On March 13, Alibaba formerly announced this program to the public. The research area of this program would include machine learning, chi...

   ALIBABA,NASA,CHINA,NEWS     2017-03-13 11:32:22