[algorithm] - 6. Hill sorting
Algorithm Introduction
The core of hill sorting lies in the setting of interval sequence. The interval sequence can be set in advance or defined dynamically. The algorithm of defining interval sequence dynamically is proposed by Robert Sedgewick, coauthor of algorithm (4th Edition).
Algorithm description and Implementation
...
Added by theonlydrayk on Mon, 02 Dec 2019 19:55:16 +0200
Too tired to brush, teach you to use Python to crawl down all the beautiful ladies and sisters and watch them slowly
Preface
Text and pictures of the text come from the network for learning and communication purposes only. They do not have any commercial use. Copyright is owned by the original author. If you have any questions, please contact us in time for processing.
Author: Star Ango, AirPython
Target Scene
I believe that when you brush short video with sh ...
Added by pourmeanother on Sat, 23 Nov 2019 11:11:17 +0200
LPK Trojan analysis-03
Preface
The previous analysis is the main program, the following analysis of the load, lpk.dll will be propagated to each folder containing exe
Overview
BOOL __stdcall DllEntryPoint(HINSTANCE hinstDLL, DWORD fdwReason, LPVOID lpReserved)
{
BOOL result; // eax@9
if ( fdwReason == 1 )
{
hModule = hinstDLL;
Get ...
Added by Imad on Mon, 18 Nov 2019 16:36:41 +0200
Dry | CVE-2019-11043: Any Code Execution Vulnerability Analysis for PHP-FPM under Nginx specific configuration
Recently, Andrew Danau, a foreign security researcher, stumbled upon a bug in the processing of a specific request by the php-fpm component during the flag race (CTF: Capture the Flag): a particular constructed request could cause a php-fpm processing exception under a specific Nginx configuration, resulting in remote execution of arbitrar ...
Added by JeditL on Thu, 14 Nov 2019 09:48:58 +0200
Exploit Vulnhub replication vulnerability - GhostScript sandbox bypass (command execution) vulnerability (CVE-2019-6116)
GhostScript sandbox bypass (command execution) vulnerability (CVE-2019-6116)
Official reproduction of Vulnhub
Loophole principle
Replication vulnerability
Boot environment
Loophole reappearance
POC
Upload POC file
Test success
Official reproduction of Vulnhub
https://vulhub.org/#/env ...
Added by clodagh2000 on Fri, 01 Nov 2019 11:50:38 +0200
Examples of recursive function calls and anonymous function lambda's summation of 1-100 and calculation factorial examples in Python
1. Script example of recursively listing files in directoryTo list the files in the directory, you can do the following: os.listdir()
In [1]: import os
In [4]: os.listdir('/root')
Out[4]:
['.tcshrc',
'.bash_history',
'.bashrc',
'ENV',
'.cache',
'.config',
'.cshrc',
'.bash_logout',
'python',
'.ssh',
'shell',
'.bash_profile',
'.ip ...
Added by thesimon on Fri, 01 Nov 2019 06:26:20 +0200
User creation process
How is a user created?
/etc/passwd user account information
/etc/shadow security user account information
/etc/group group account information
/etc/gshadow security group account information
/The default value when the etc/default/useradd account is created. (the default value in this file will be used when no parameter is specified)
[r ...
Added by phpdeveloper82 on Thu, 31 Oct 2019 13:31:03 +0200
Linux configuration of single machine and multiple instances of Tomcat
Sometimes you need to deploy multiple Tomcat on a server, and distinguish them through different ports, such as reverse proxy. But I don't want to simply copy tomcat, which is not convenient for future upgrade or management. At this time, I need to configure a single machine with multiple instances of ...
Added by Deemo on Fri, 25 Oct 2019 05:54:09 +0300
Python -- Network Programming 3
Socket socket (module): responsible for receiving data from the transport layer, processing it, and handing it to the operating system from the bottom layer.
Effect
To avoid the use of interfaces and protocols in each layer of computer learning, socket has encapsulated all interfaces, which is convenient to use and improves development effi ...
Added by incubi on Wed, 23 Oct 2019 20:54:31 +0300
Judge the browser running environment in detail (probably the most comprehensive judgment, it's worth seeing)
Pay attention to Uzero public number, more front-end small dry goods are waiting for you!
Preface
Seeing the title, you can remember that this requirement can be used in many projects. The front-end applications we deploy on the Web server can be accessed by either PC browser or mobile browser. With the promotion of smart devices, we can even a ...
Added by ChrisF79 on Thu, 17 Oct 2019 07:15:18 +0300