SEARCH KEYWORD -- pre-order
Additional steps need to implement to setup shadow-boxV2 OPTEE on Raspberry PI
We followed the Shadow-box v2 project from the https://github.com/kkamagui/shadow-box-for-arm to set up the trustZone on Raspberry PI modeB to protect the Linux Kernel. But got a problem when doing the step: [3.6.5. Activate Shadow-Box for ARM and Start Secure Pi!] to create the hash for the memory area. The result is not shown. If you met the same problem, this is what I did to fix the problem on my PI: 1.1 When we do the step [3.5.1. Copy OP-TEE OS with Shadow-Box for ARM and N...
HARDWARE,RASPBERRY PI 2019-05-20 08:52:55
bash network interface
Some of us may have seen /dev/tcp/<host>/<port> before, is this a special file system implemented in some BSD kernel? Because there is no /dev/tcp in Linux. Actually, this one is implemented in bash. We no need to rely on wget,nc to do network connection. It's very easy to use this interface: bash-4.2$ cat </dev/tcp/time.nist.gov/13 56188 12-09-18 15:34:26 50 0 0 733.5 UTC(NIST) * bash-4.2$ exec 3<>/dev/tcp/www.w3.org/80 bash-4.2$ echo -e "GET / HTTP/1.0\n\n" >&3 b...
Bash,Network interface,/dev/tcp 2013-07-20 00:57:52
Resolving error "SSL certificate problem: self signed certificate in certificate chain"
In a PHP application, cURL is frequently used to make connection to remote server to request some resource. It can be used to transfer data with different protocols such as HTTP, HTTPS, FTP etc. While using cURL in PHP, someone may get an error with message similar to "SSL certificate problem: self signed certificate in certificate chain". This may happen when cURL tries to make a SSL connection server and the server returns a server certificate which is self-signed and it's not trusted by the c...
How can you test if your VPN is working properly?
Installing a VPN on your device is one of the essential steps you need to take in order to have a safe and pleasant online experience. It good functioning is in your best interest and this is why you need to make sure that your VPN is working properly. Unfortunately, a lot of problems can occur if it turns out that your VPN is not up to the task and that it has some leaks. Can a leak really occur? To answer you most directly – Yes! Yes, it can! Unfortunately, no system is perfect an...
VPN 2020-09-17 06:53:19
ScrollerJS vs Odometer
Both ScrollerJS and Odometer are two JavaScript libraries to transition one number to another number with animation. They provide user a fancy animation about scrolling numbers. These libraries can be used in many scenarios such as user statistic counter, timer or odometer. This post is going to have a comparison on these two open source libraries. Below is a table which lists the features the two libraries have: Feature ScrollerJS Odometer Language JavaScript and CSS JavaScript and CSS S...
JavaScript, Odometer, ScrollerJS, Open source, CSS Transition 2015-05-13 02:10:55
Coming up Next for JavaScript Web Apps Is Next.Js 3
Are wondering who is going to be the next PHP of the internet; except JavaScript. Next.js is all set to bring the PHP experience to JavaScript with its latest version. As the technology continues to be considered as a “win” amongst a number of developers across the globe, professionals are trying to improve it as much as they can. Because of its minimalist approach to server-rendered apps, this highly customizable framework can be recommendable for beginners as well as experienced pr...
NEXT.JS3,JAVASCRIPT 2017-11-20 23:43:38
Be careful when running knife vault command
While using Chef, one would frequently use knife commands which are used to manage resources on the Chef server. One can list all nodes, data bags, vault items and many other stuff on the Chef server. In this post, we would cover one command which may need your attention when using it -- knife vault. On Chef server, one can store data to data bags which can be accessed by registered clients. These data bags usually store the data in plain text format. In some cases, one would need to store data ...
KNIFE VAULT,KNIFE DATA BAG,CHEF-VAULT,CHEF 2017-08-19 00:26:54
OpenLDAP Proxy -- Installation and configuration
After understanding what the configuration would be for an OpenLDAP proxy, it's time to explain the installation of OpenLDAP proxy and how to make it run. In this post, we will cover how to install OpenLDAP proxy both locally and using docker. Local installation The installation is quite easy, there are a few packages to be installed including the ldap server, ldap client and some utilities. Below steps are for CentOS, the instructions for other platforms should be similar with minor differ...
INSTALLATION,CENTOS,DOCKER,OPENLDAP,OPENLDAP PROXY 2017-11-03 20:26:41
Data as code
What is a good command line parser API? A good command line parser should consider below 5 aspects: Support convenient help information generation Support sub commands, for example, git has push,pull,commit sub commands. Support single character option, word option, flag option and option with parameter. Support default option, for example, if no -port is set, set it as 5037 Support usage model, for example, tar's -c and -x is mutually exclusive, they belong to different usage models. Here are...
Command line,API 2013-08-08 22:40:36
malloc/free and new/delete in C++
malloc and free are C++/C language standard library functions, while new/delete are operator of C++. They can be used to allocate dynamic memory and free memory in C++ programs malloc/free can not meet the requirements of dynamic objects creation. Object needs to call the constructor to initialize the object when creating, the object needs to call the destructor before it is destroyed Since malloc() and free() are library functions rather than operators, the compiler has no control permiss...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>