Mysql version mysql Ver 8.0.28-0ubuntu0.20.04.3 for Linux on x86_64 ((Ubuntu)) The following are the errors that I will report after uninstalling and installing mysql several times. No matter how to change the configuration file according to the online tutorial, I will eventually report that the local link is rejected. My ...
Added by pbsonawane on Thu, 10 Mar 2022 02:41:13 +0200
Windows is the core of handling infinite streams. Windows divides streams into "buckets" of limited size, on which we can apply calculations. This document focuses on how to perform windowing in Flink SQL and how programmers can get the most from the functions they provide.
Apache Flink provides several window table ...
Added by mattsutton on Wed, 23 Feb 2022 18:08:35 +0200
Introduction: This article introduces the three most commonly used basic operations of Docker image: login, pull and push, as well as how to log in to a sub account. By understanding the basic operation of mirroring, you can use the container mirroring service ACR more skillfully.
For image download, domain name resolution and time synchron ...
Added by CWebguy on Tue, 22 Feb 2022 17:07:40 +0200
Awk is an excellent text processing tool and one of the most powerful data processing engines in Linux and Unix environments. The greatest function of this programming and data manipulation language (whose name comes from the initials of the surnames of its founders Alfred aihou, Peter Weinberg and Brian collinhan) depends o ...
Added by Grande on Mon, 14 Feb 2022 08:58:59 +0200
Summary of Linux polkit rights raising
As soon as I was about to take my annual leave, I received a regulatory vulnerability alert - "pkexec program in Linux Polkit has a privilege escalation vulnerability (vulnerability number: CVE-2021-4034). Pkexec application is a pre installed tool for Linux system, and the vulnerability affects main ...
Added by texmansru47 on Mon, 31 Jan 2022 22:18:08 +0200
dpkg, package manager for Debian, is a major package management tool in Debian and Debian based systems. It can be used to install, build, uninstall and manage deb format software packages.
When installing software with the dpkg command, you can use the - i option and specify the path of the deb installation packa ...
Added by gevo12321 on Fri, 21 Jan 2022 22:04:48 +0200
Copyright notice: original articles cannot be reproduced without the permission of the blogger
At the beginning of 3A5000, Godson turned to loongarch. Although the new architecture got rid of the historical burden, it also takes some time to accumulate ecology. In more than half a year, loongnix20 loongarch64 has made rapid progres ...
1. Scanning and packet capturing analysis
This case requires to be familiar with common security tools in Linux host environment and complete the following tasks:
Use nmap scan to obtain information about the specified host / network segmentScript scanning using nmapAnalysis of plaintext exchange information in FTP access ...
Added by MrQcue on Sun, 02 Jan 2022 12:44:08 +0200
The virtual file system is VFS, and the kernel provides file and file related interfaces. All files in the system not only depend on VFS coexistence, but also rely on VFS coordination.
Common file interfaces, including read, write and open, can be used to read files and hard disks.
The reason why a unified interface can be used to read an ...
Added by SteveMT on Fri, 31 Dec 2021 17:42:39 +0200