Installation and configuration of Ubuntu firewall

Ubuntu Install UFW firewall sudo apt-get install ufw For general users, only the following settings are required: sudo apt-get install ufw sudo ufw enable sudo ufw default deny The above three commands are safe enough. If you need to open some services, you can use sudo ufw allow. Enable sudo ufw enable sudo ufw default deny #Aft ...

Added by konn on Fri, 10 Jul 2020 19:12:17 +0300

Android implements request HTTP authentication

These days, the development of external SDK, can achieve landing, payment.Similar to developing a set of QQ, WeChat third party login.The authorization protocol used is OAuth 2.0.Among them, Http Authentication is used, and you can consult the online materials. There are all kinds of answers, some don't know if they have been verified, and some ...

Added by ekalath on Fri, 10 Jul 2020 17:54:48 +0300

An algorithm for searching all paths between two points based on a graph's contiguity list implementation

The algorithm is implemented in C++. Why write this algorithm? Because it is so hard to find only the implementation of the adjacency matrix on the network, I have made an implementation of the adjacency chain table myself, which can increase the speed. This is achieved by using one of three stacks to traverse all vertices, the second stack t ...

Added by LoganK on Thu, 02 Jul 2020 18:16:21 +0300

cocos2d loads plist files (frame animation)

Integrate the pictures into one large picture, reduce the picture occupancy, there are plist files and png supporting files. cocos loads plist files in two ways (queried) 1. If you load in the following way, your plist file must contain an animations node, otherwise the load will fail auto cache = AnimationCache::get ...

Added by zahidraf on Tue, 30 Jun 2020 19:21:37 +0300

Huawei -- DHCP experiment

@Huawei - DHCP experiment preface DHCP (Dynamic Host Configuration Protocol) is a protocol designed by IETF to realize automatic IP configuration. It can automatically assign TCP/IP parameters such as IP address, subnet mask, IP address of default gateway and DNS server for clients 1: Experimenta ...

Added by mikeweb on Mon, 29 Jun 2020 11:02:44 +0300

Create a custom thread pool (how to set the maximum number of threads?)

CPU intensive IO intensive 1: CPU intensive: Definition: CPU intensive also refers to calculation intensive. Programs that spend most of their time doing CPU actions such as calculation logic judgment are called CPU intensive tasks. This type of task requires a lot of calculation, which mainly consumes CPU resources. Although this kind of comp ...

Added by Arez on Sun, 28 Jun 2020 09:04:04 +0300

pxe+kickstart+dhcp+tftp+httpd to realize unattended installation of CentOS7 system

Article catalog 1, Introduction 1. What is PXE 2. Working process of PXE 2, Realize network manual installation 1. System environment preparation 2. Install and configure dhcp service 3. Install and configure tftp service 4. Install and configure httpd service 5. Configure PXE boot program (1) PX ...

Added by webweever on Fri, 26 Jun 2020 09:39:26 +0300

Microservice - call of service

typora-copy-images-to: imgs Call between microservices 1. Call of microservice - Ribbon + resttemplate (independent component) 1. What makes Ribbon Ribbon is a client-side load balancer, which is used to call the load balancing of microservices between spring cloud 2. Load balancing between se ...

Added by PcGeniusProductions on Fri, 26 Jun 2020 09:14:44 +0300

Redis from entry to mastery (VIII. Redis cluster)

This article introduces the Redis Cluster cluster, and briefly introduces the implementation of the cluster. It is mainly a specific practical part: cluster startup, failover, adding nodes, removing nodes Basic concepts of Redis cluster Redis's cluster mode provides data fragmentation and ensures the availability of each partition. Each node of ...

Added by jdorsch on Thu, 25 Jun 2020 14:10:22 +0300

[Video and Audio Data Processing] H.264 video stream analysis

0. Basic concepts The location of the 0.1 video stream in the video player is as follows: H.264 original code stream (also known as "naked stream") is composed of one NALU. Their structure is shown in the figure below. 0.2 to be more accurate, the original NALU unit is composed of: [st ...

Added by Termina on Wed, 24 Jun 2020 10:42:32 +0300