[algorithm] - 6. Hill sorting

Algorithm Introduction The core of hill sorting lies in the setting of interval sequence. The interval sequence can be set in advance or defined dynamically. The algorithm of defining interval sequence dynamically is proposed by Robert Sedgewick, coauthor of algorithm (4th Edition). Algorithm description and Implementation ...

Added by theonlydrayk on Mon, 02 Dec 2019 19:55:16 +0200

Too tired to brush, teach you to use Python to crawl down all the beautiful ladies and sisters and watch them slowly

Preface Text and pictures of the text come from the network for learning and communication purposes only. They do not have any commercial use. Copyright is owned by the original author. If you have any questions, please contact us in time for processing. Author: Star Ango, AirPython Target Scene I believe that when you brush short video with sh ...

Added by pourmeanother on Sat, 23 Nov 2019 11:11:17 +0200

LPK Trojan analysis-03

Preface The previous analysis is the main program, the following analysis of the load, lpk.dll will be propagated to each folder containing exe Overview BOOL __stdcall DllEntryPoint(HINSTANCE hinstDLL, DWORD fdwReason, LPVOID lpReserved) { BOOL result; // eax@9 if ( fdwReason == 1 ) { hModule = hinstDLL; Get ...

Added by Imad on Mon, 18 Nov 2019 16:36:41 +0200

Dry | CVE-2019-11043: Any Code Execution Vulnerability Analysis for PHP-FPM under Nginx specific configuration

Recently, Andrew Danau, a foreign security researcher, stumbled upon a bug in the processing of a specific request by the php-fpm component during the flag race (CTF: Capture the Flag): a particular constructed request could cause a php-fpm processing exception under a specific Nginx configuration, resulting in remote execution of arbitrar ...

Added by JeditL on Thu, 14 Nov 2019 09:48:58 +0200

Exploit Vulnhub replication vulnerability - GhostScript sandbox bypass (command execution) vulnerability (CVE-2019-6116)

GhostScript sandbox bypass (command execution) vulnerability (CVE-2019-6116) Official reproduction of Vulnhub Loophole principle Replication vulnerability Boot environment Loophole reappearance POC Upload POC file Test success Official reproduction of Vulnhub https://vulhub.org/#/env ...

Added by clodagh2000 on Fri, 01 Nov 2019 11:50:38 +0200

Examples of recursive function calls and anonymous function lambda's summation of 1-100 and calculation factorial examples in Python

1. Script example of recursively listing files in directoryTo list the files in the directory, you can do the following: os.listdir() In [1]: import os In [4]: os.listdir('/root') Out[4]: ['.tcshrc', '.bash_history', '.bashrc', 'ENV', '.cache', '.config', '.cshrc', '.bash_logout', 'python', '.ssh', 'shell', '.bash_profile', '.ip ...

Added by thesimon on Fri, 01 Nov 2019 06:26:20 +0200

User creation process

How is a user created? /etc/passwd user account information /etc/shadow security user account information /etc/group group account information /etc/gshadow security group account information /The default value when the etc/default/useradd account is created. (the default value in this file will be used when no parameter is specified) [r ...

Added by phpdeveloper82 on Thu, 31 Oct 2019 13:31:03 +0200

Linux configuration of single machine and multiple instances of Tomcat

Sometimes you need to deploy multiple Tomcat on a server, and distinguish them through different ports, such as reverse proxy. But I don't want to simply copy tomcat, which is not convenient for future upgrade or management. At this time, I need to configure a single machine with multiple instances of ...

Added by Deemo on Fri, 25 Oct 2019 05:54:09 +0300

Python -- Network Programming 3

Socket socket (module): responsible for receiving data from the transport layer, processing it, and handing it to the operating system from the bottom layer. Effect To avoid the use of interfaces and protocols in each layer of computer learning, socket has encapsulated all interfaces, which is convenient to use and improves development effi ...

Added by incubi on Wed, 23 Oct 2019 20:54:31 +0300

Judge the browser running environment in detail (probably the most comprehensive judgment, it's worth seeing)

Pay attention to Uzero public number, more front-end small dry goods are waiting for you! Preface Seeing the title, you can remember that this requirement can be used in many projects. The front-end applications we deploy on the Web server can be accessed by either PC browser or mobile browser. With the promotion of smart devices, we can even a ...

Added by ChrisF79 on Thu, 17 Oct 2019 07:15:18 +0300