Common API obfuscation methods and handling methods of malicious code
Many articles can't be updated to CSDN, and can be concerned about my official account number (programmer sailing).
1. Summary
When analyzing malicious code, we often encounter the situation that there is no import function in the import table when statically Analyzing Malicious Code. This situation is usually that malicious code confused t ...
Added by wgordonw1 on Thu, 10 Feb 2022 04:53:37 +0200
Dynamic programming 3: continuous subarray class problem
Current topic
53. Maximum subarray and
918. Maximum sum of circular subarrays
152. Product maximum subarray
1567. Longest subarray length with positive product
53. Maximum subarray and
The common feature of several topics in this issue is to find a continuous array in an array to maximize the goal. We start wit ...
Added by garfx on Thu, 10 Feb 2022 04:42:20 +0200
[embedded] revisit the Mini2440 - U-Boot
I preface
The s3c2440 equipped with Mini2440 has long been discontinued, but the platform will be outdated and the technology will not be outdated. It still has certain learning significance. Let's give full play to the waste heat of this development board for the last time. The technology involved in U-Boot is bare metal development. In a ...
Added by mullz on Thu, 10 Feb 2022 04:39:20 +0200
Spring cloud - Eureka Registration Center
Eureka principle
eureka comes from ancient Greek words, meaning "discovered"
eureka is divided into two parts, Server side and Client side
Register
Service registration
The instance that wants to participate in service registration discovery needs to register information with Eureka server first
Registration is submitted when th ...
Added by eatfishy on Thu, 10 Feb 2022 04:32:14 +0200
Shiro+JWT realizes authentication and authorization in the front and rear end separation project
Disadvantages of traditional Session authentication
In the last lesson, we used Shiro for user authentication. The internal identification is Subject through Session, and the server identifies cookies that depend on JSESSIONID. However, in the front-end and back-end separated projects, the front-end project will run separately, and the server ...
Added by codebuilder on Thu, 10 Feb 2022 04:31:01 +0200
Design mode (02) singleton mode
1. Interpretation of single case mode
1.1 introduction to singleton mode
@1. Single case mode
It belongs to the creation mode, which involves a single class, which is responsible for creating its own objects and ensuring that only a single object is created. This class provides a way to access its unique object, which can be accessed directl ...
Added by mouloud2001 on Thu, 10 Feb 2022 04:27:09 +0200
Gin framework builds Golang interface project template -- ORM implementation
stay Gin framework building Golang interface project template -- controller layer In this chapter, we briefly introduce how to use gin to create a simple api interface, but in the actual development, it is not a complete project if there is only interface definition and no database interaction. In this project, gorm is used as a framework of pe ...
Added by Mordecai on Thu, 10 Feb 2022 04:25:41 +0200
Luogu UVA101 The Blocks Problem [simulation / linked list]
Input format Output format
Meaning translation Initially, there are from left to right
n
n
n wooden blocks numbered
0
...
n
−
1
...
Added by physaux on Thu, 10 Feb 2022 04:24:26 +0200
Thread pool create thread
Definition: using pooling technology to manage and use ready-made technology is called thread pool Advantages of thread pool Generally speaking, thread pool has the following advantages: (1) Reduce resource consumption. Reduce the consumption caused by thread creation and destruction by reusing the created threads. (2) Improve response speed. W ...
Added by stuworx on Thu, 10 Feb 2022 04:19:00 +0200
Section 8: specifying the configuration file for SpringBoot
Rules for spring boot configuration propertiesPass Separate elementsthe last one. Separate prefix from attribute nameMust be letters (az) and numbers (0-9)Must be lowercaseSeparate words with hyphens -The only other characters allowed are [and], which are used for the index of the ListCannot start with a numberSame configuration itemSpring Boot ...
Added by kate_rose on Thu, 10 Feb 2022 04:13:02 +0200