Ubuntu action-04 SUDO settings

Under linux system, ordinary users cannot directly execute the commands under the authority of root user. If you want ordinary users to execute the operation commands that only root user can execute, sudo is needed. Before sudo was written around 1980, the general way of user management system was to use su to switch to super user. Ho ...

Posted by sigkill-9 on Fri, 04 Mar 2022 12:58:06 +0100

Deep multimodal subspace clustering network + code implementation

Network Overview (Thesis) Related paper resources: in my resources, please pay attention to me and then download. There are three papers: Deep Subspace Clustering NetworksDeep Multimodal Subspace Clustering NetworksCross-Modal Subspace Clustering via Deep Canonical Correlation Analysis Next, we will explain the multimodal subspace cluste ...

Posted by xphoenixx on Fri, 04 Mar 2022 10:14:04 +0100

Data security transmission platform project note-1

Project introduction and cryptography knowledge Overall structure of the project: Main function: encrypt and decrypt the data of network communication Basic components: Data serialization: protobufsocket communication: thread pool, connection poolShared memory IPCoracle Database: using OCI interfaceData encryption: openssl (Secure Sockets ...

Posted by gwolgamott on Wed, 02 Mar 2022 16:21:15 +0100

Detailed explanation and application of NIO

1, Detailed explanation of foundation 1. Traditional IO(BIO) Traditional IO is stream oriented and synchronous blocking io. Each socket request needs to be processed by a corresponding thread. If there are not enough threads to process, the request is either waiting or rejected. That is, each connection requires the service to be processed by ...

Posted by TheMagician on Tue, 01 Mar 2022 13:31:14 +0100

Socket network programming learning notes (10) simple chat room case

1. Data transmission design of chat room Necessary conditions: client and serverNecessary constraints: data transfer protocolPrinciple: the server listens to the message source, the client links to the server and sends a message to the server 1.1 data interaction between client and server The client sends a message to the server, and the se ...

Posted by VMinder on Mon, 28 Feb 2022 02:58:59 +0100

DPVS fullnat mode management

This paper mainly introduces the application of centos7 9. Various deployment modes and configuration management of FullNAT mode of system deployment DPVS, including IPv4-IPv4, binding, IPv6-IPv6, IPv6-IPv4 (NAT64) and keepalived mode. The following configurations are all based on dual arm mode, and the corresponding toa module of DPVS has b ...

Posted by ocpaul20 on Sat, 26 Feb 2022 17:59:50 +0100

Chapter 11 of csapp: network io md

1. Network architecture You need to understand the basic client server programming model and how to write client server programs that use services provided by the Internet. Finally, combine all the concepts to develop a small but full-featured web server. Nowadays, network applications can be seen everywhere. Interestingly, all network applica ...

Posted by rotto on Fri, 25 Feb 2022 13:39:23 +0100

TCP network programming

1, Basic concepts of network programming 1. What is computer network Computers distributed in different regions are interconnected by communication lines through network devices such as hardware Computer network, can be very convenient for information transmission, resource sharing! 2. What is the IP address of the computer IP address is the ...

Posted by marian on Thu, 24 Feb 2022 15:10:23 +0100

java learning notes - network programming

1, Introduction to network programming Network programming: under the network communication protocol, data can be exchanged between programs running on different computers to realize network interconnection 1.1 three elements of network programming IP address: to enable computers in the network to communicate with each other, you must sp ...

Posted by austrainer on Thu, 24 Feb 2022 14:07:00 +0100

Network operation

Network operation Network support in Java: InetAddress: used to represent hardware resources on the network, i.e. IP address;URL: uniform resource locator;Sockets: use TCP protocol to realize network communication;Datagram: use UDP protocol to realize network communication. InetAddress There is no public constructor. You can only create inst ...

Posted by richrock on Thu, 24 Feb 2022 12:22:34 +0100