Tiny RTC DS1307 clock module complete code (Arduino) and some points needing attention
In fact, this thing is OK, but there is no technical support. There will be holes in many details. It took me more than ten days (during which I also spent a week learning welding) to fully succeed. During this period, I was very angry. I thought I bought a piece of garbage and even wanted to throw away this 2 yuan thing. So I bought another on ...
Posted by FillePille on Thu, 17 Feb 2022 11:01:54 +0100
Qt plug-in development summary -- plug-in manager
1, Foreword
Plug in development summary - creation and use of plug-ins This article shows how to use QT low API plug-in example in QT. However, this can not meet the actual scenario of large-scale applications and has no scalability. The communication between plug-ins, loading and unloading (releasing memory), plug-in metadata, plug-in lif ...
Posted by wshell on Thu, 17 Feb 2022 10:58:38 +0100
SpringBoot--yml/yaml configuration file
prefaceIn addition to the properties configuration file, spring boot can also use yaml configuration file, which is more intuitive.brief introductionYAML is not an acronym for recursive markup language. When developing this language, YAML actually means "Yet Another Markup Language".It is very suitable for data centric configuration f ...
Posted by Mr_Pancakes on Thu, 17 Feb 2022 10:56:55 +0100
Literal translation of scheme language into Chinese
1, Representation of complex numbers
In previous articles, I once had a question, that is, how does scheme language realize polymorphism? No, the book seems to give us the answer to this question soon.
We know that the plural number can be expressed in two ways:
1. Representation of rectangular coordinate system Real part(
...
Posted by Drace on Thu, 17 Feb 2022 10:55:48 +0100
python crawler diary 01
PYTHON reptile diary 01
Record your learning reptile diary
Choose python as the programming language
1. Environmental preparation
python3.6+
mysql
pycharm
2. Ideas
The goal is to climb the top 100 of the cat's eye
1. Analyze the law of url
https://maoyan.com/board/4?offset=10 Find their URLs and use the url parameter offset as th ...
Posted by totof06 on Thu, 17 Feb 2022 10:51:49 +0100
Java encapsulation, inheritance and polymorphism
encapsulation
Example:
//student class
public class Student {
//Property private get/set
private String name;
private int age;
private char sex;
//Provide some public get and set methods
//get this data
public String getName() {
return this.name;
}
//set assigns a value to this property
public void setName(String name) {
this ...
Posted by sunil.23413 on Thu, 17 Feb 2022 10:42:21 +0100
Sub database and sub table: row expression
Realization motivation
The simplification and integration of configuration are the two main problems that line expressions want to solve.
In the cumbersome data fragmentation rule configuration, with the increase of data nodes, a large number of repeated configurations make the configuration itself difficult to maintain. The line expression c ...
Posted by Griff1324 on Thu, 17 Feb 2022 10:39:38 +0100
Factory mode of design mode
Factory mode
And Singleton mode Similarly, the factory pattern also belongs to a kind of creative design pattern. Singleton mode is used to ensure that there is only one instance of a class, while factory mode is used to create different objects related to types. It also has different implementation methods. It can be subdivided into simple fa ...
Posted by intodesi on Thu, 17 Feb 2022 10:38:31 +0100
Various ways of DLL injection
Various ways of DLL injection
Registry injection
In Windows NT/2000/XP/2003 operating system, when it is necessary to load user32 When the program of DLL starts, user32 DLL will load the registry key HLM\Software\Microsoft\WindowsNT\CurrentVersion\Windows\AppInit_DIls all modules listed below.
Therefore, the path of the module to be injected ...
Posted by gikon on Thu, 17 Feb 2022 10:32:15 +0100
Some attack methods of redis
reference resources https://www.redteaming.top/2019/07/15/%E6%B5%85%E6%9E%90Redis%E4%B8%ADSSRF%E7%9A%84%E5%88%A9%E7%94%A8/Redis default port 6379
If there is an unauthorized problem, anyone can transfer commands to this Redis serverCommon Redis attacks include
Write shell (the most commonly used), write key, write crontab, rebound shell, info ...
Posted by peachsnapple on Thu, 17 Feb 2022 10:30:10 +0100