[Java security] fastjson learning

preface As a supplement to the previous article, learn fastjson after half a year. Initial recognition of fastjson Fastjson is a Java library that can convert Java objects into JSON format. Of course, it can also convert JSON strings into Java objects. Fastjson can manipulate any Java object, even some pre-existing objects without source co ...

Posted by bladechob on Tue, 01 Mar 2022 14:14:07 +0100

ELK log analysis

ELK log analysis 1, ELK introduction ELK platform is a complete set of centralized log processing solution, which combines ElasticSearch, Logstash and Kiabana, three open-source tools to meet the more powerful user requirements for log query, sorting and statistics. Elastic search: it is a distributed storage and retrieval engine based on L ...

Posted by ale8oneboy on Tue, 01 Mar 2022 14:10:57 +0100

JAVA day 41 - hash table

1, You don't know hash tables 1. What is a hash table? We already know a data item, keyword mapping storage location.In fact, our search process is to compare and constantly compare keywords, so that we can find the storage location.Now you should find that they are like functions, X = keyword and Y = storage location.The difficulty of ha ...

Posted by Averice on Tue, 01 Mar 2022 14:09:52 +0100

etcd cluster construction of microservice automation

1, Set up etcd cluster There are three main types of self building clusters: Static discovery: the nodes in the etcd cluster are known in advance. When starting, directly specify the addresses of each node of the etcd through the -- initial cluster parameter.Etcd dynamic discovery: the premise of static configuration is that the informati ...

Posted by Andy82 on Tue, 01 Mar 2022 13:53:39 +0100

Penetration test exercise No.45 HackMyVm Worrosion3

Target information Download address: https://hackmyvm.eu/machines/machine.php?vm=Corrosion3 Range: hackmyvm eu Target name: Worrosion3 Difficulty: simple Release time: February 18, 2022 Prompt: nothing Target: 2 flag s Experimental environment Attack aircraft:VMware kali 192.168.7.3 Target plane:Vbox linux IP Automatic acquisit ...

Posted by Fluoresce on Tue, 01 Mar 2022 13:43:05 +0100

Detailed explanation and application of NIO

1, Detailed explanation of foundation 1. Traditional IO(BIO) Traditional IO is stream oriented and synchronous blocking io. Each socket request needs to be processed by a corresponding thread. If there are not enough threads to process, the request is either waiting or rejected. That is, each connection requires the service to be processed by ...

Posted by TheMagician on Tue, 01 Mar 2022 13:31:14 +0100

[charm of data structure] 001 Cognitive complexity & dichotomy & XOR operation

Constant time operation If the execution time of an operation is not transferred by the specific sample size, each execution time is a fixed time. Such operations are called constant time operations. Common arithmetic operations (+, -, *, /,%, etc.)Common bit operations (> >, > > >, < <, |, &, ^, etc.)Assignment, comp ...

Posted by Leadwing on Tue, 01 Mar 2022 13:25:55 +0100

Go mutex (sync.Mutex) and read / write lock (sync.RWMutex)

When do I need a lock? When there is only one thread in the program, there is no need to lock, but usually the actual code is not just a single thread, so the lock needs to be used at this time. What are the main scenarios related to the use of the lock? When multiple threads are reading the same dataWhen multiple threads write the same d ...

Posted by lazaruz on Tue, 01 Mar 2022 13:11:46 +0100

day12 function advanced operation

summary Anonymous function essence The essence of anonymous functions is still functions. They are the same except for the syntax of their definitions Note: it can only be used to implement functions with very simple functions Syntax: lambda parameter list: return value Convert to normal: def (formal parameter list): Return return value S ...

Posted by abhinic on Tue, 01 Mar 2022 13:08:30 +0100

day11 function advanced

day12 function advanced 1. Anonymous function The essence of anonymous functions is still functions. They have different syntax for definition, and everything else is the same Note: anonymity can only be used to implement functions with very simple functions Syntax: Function name = lambda parameter list: return value Convert to normal: def ...

Posted by zavin on Tue, 01 Mar 2022 13:00:51 +0100