SEARCH KEYWORD -- Shallow copy



  Hide a file in a picture

Sometimes if you want to hide some important files on your computer which you don't want others to see, how would you do that? Find a professional tool? Set password for some folders? Change the file properties to hidden? They are possible, but they may not be so convenient or so secure. Here we share with you how to hide a file in a picture. Prerequisites 1 picture for example : test.jpg 1 test file, for example : test.txt WinRAR Steps Prepare the picture test.jpg and test file test.txt Use ...

   Trick,Picture,Fil hiding,WinRAR     2012-09-13 19:36:36

  Windows 8 price is unveiled

Although it's still half month away from releases of Windows 8, Microsoft releases price of all versions of Windows 8 on Windowsteam blog. From now on, users can pre-order this product on Amazon, Bestbuy, Staples and Office Depot. The prices for different version : Windows 8 Professional Upgrade : $69.99 Windows 8 Pro Pack-Product Key Card : $69.99 Windows 8 64 bit(Full Version) -- OEM : $99.99 Windows 8 32 bit (Full Version) -- OEM : $99.99 Windows 8 Professional 32 bit (Full Version) -- OEM ...

   Windows 8, Price     2012-10-12 20:03:55

  The internals of slice in GoLang

There are 3 components of slice:a) Pointer: Points to the start position of slice in the underlying array;b) length (type is int): the number of the valid elements of the slice;b) capacity (type is int): the total number of slots of the slice. Check the following code: package main import ( "fmt" "unsafe" ) func main() { var s1 []int fmt.Println(unsafe.Sizeof(s1)) } The result is 24 on my 64-bit system (The pointer and int both occupy 8 bytes). In the next example, I will use gdb to poke t...

   GOLANG,SLICE     2019-06-30 02:55:22

  HeartBleed: Inside the heart, what causes the bleeding?

Just after a few weeks since Apple's famous goto fail bug, there is one bug in OpenSSL which catches the attention from the world again. The bug is named HeartBleed, found in OpenSSL library, a famous open source library supporting lots of  SSL/TLS communication among server/client applications. The reason why this bug catches the attentions from the world is it affects almost all sites which are using the affected OpenSSL library, these includes many applications like Nginx server, some v...

   OpenSSL,HeartBleed     2014-04-09 05:47:30

  Additional steps need to implement to setup shadow-boxV2 OPTEE on Raspberry PI

We followed the Shadow-box v2 project from the https://github.com/kkamagui/shadow-box-for-arm to set up the trustZone on Raspberry PI modeB to protect the Linux Kernel. But got a problem when doing the step: [3.6.5. Activate Shadow-Box for ARM and Start Secure Pi!] to create the hash for the memory area. The result is not shown. If you met the same problem, this is what I did to fix the problem on my PI: 1.1  When we do the step [3.5.1. Copy OP-TEE OS with Shadow-Box for ARM and N...

   HARDWARE,RASPBERRY PI     2019-05-20 08:52:55

  Top 8 website operation laws

As a website operator, in addition to have some necessary professional knowledge to master a website, such as prototype planning, interaction design, SEO, as well as basic html code, you should also know more about some of the theories which are good for site operations to ensure that the site can be long-term, stable. 1. Law of 250 Girard thinks every person knows at least 250 people. If you win the goodwill of a customer, it means you win the goodwill of 250 individuals; Conversely, if you off...

   Website management,Rules     2012-09-13 20:55:50

  OpenLDAP Proxy -- Installation and configuration

After understanding what the configuration would be for an OpenLDAP proxy, it's time to explain the installation of OpenLDAP proxy and how to make it run. In this post, we will cover how to install OpenLDAP proxy both locally and using docker. Local installation The installation is quite easy, there are a few packages to be installed including the ldap server, ldap client and some utilities. Below steps are for CentOS, the instructions for other platforms should be similar with minor differ...

   INSTALLATION,CENTOS,DOCKER,OPENLDAP,OPENLDAP PROXY     2017-11-03 20:26:41

  Understand GoLang WaitGroup internals and how it works

Background Before getting into the main content, let me give a brief introduction to WaitGroup and its related background knowledge. Here, the focus is on the basic usage of WaitGroup and the fundamental knowledge of system semaphores. For those who are familiar with these, you can skip this section directly. WaitGroup WaitGroup is one of the most common concurrency control techniques in Golang, and its function can be roughly compared to the join() in concurrency control of other languages' mul...

   GOLANG,WAITGROUP,SOURCE CODE     2023-04-26 08:02:01

  Create tweet without explicitly showing the link URL

When crafting a tweet, there are instances where we may wish to include a link, but we prefer the preview to be shown without displaying the URL explicitly after the tweet is published. How can we accomplish this? This article outlines the steps to achieve it. To begin, copy and paste the link you want to share into the tweet box. After clicking Post, the tweet will be published without displaying the link; instead, it will showcase the page preview, and clicking on the preview image will open ...

   TWEET,LINK URL,X,PREVIEW     2024-01-23 08:06:46

  Using MySQL Connector/C++ with Visual Studio 2010

MySQL Connector/C++ is one of the latest connectors for MySQL, developed by Sun Microsystems. The MySQL connector for C++ provides an object-oriented application programming interface (API) and a database driver for connecting C++ applications to the MySQL Server.When we want to build a database application with C++ using Visual Studio 2010, we may use the MySQL Connector/C++, but sometimes we may encounter different errors, either compile or runtime error. After tried many times, I finally made...

   MySQL Connector,C++,Visual Studio 2010,VS2010     2012-06-01 13:52:20