Under linux system, ordinary users cannot directly execute the commands under the authority of root user. If you want ordinary users to execute the operation commands that only root user can execute, sudo is needed.
Before sudo was written around 1980, the general way of user management system was to use su to switch to super user. Ho ...
Posted by sigkill-9 on Fri, 04 Mar 2022 12:58:06 +0100
Network Overview (Thesis)
Related paper resources: in my resources, please pay attention to me and then download. There are three papers:
Deep Subspace Clustering NetworksDeep Multimodal Subspace Clustering NetworksCross-Modal Subspace Clustering via Deep Canonical Correlation Analysis
Next, we will explain the multimodal subspace cluste ...
Posted by xphoenixx on Fri, 04 Mar 2022 10:14:04 +0100
Project introduction and cryptography knowledge
Overall structure of the project:
Main function: encrypt and decrypt the data of network communication
Data serialization: protobufsocket communication: thread pool, connection poolShared memory IPCoracle Database: using OCI interfaceData encryption: openssl (Secure Sockets ...
Posted by gwolgamott on Wed, 02 Mar 2022 16:21:15 +0100
1, Detailed explanation of foundation
1. Traditional IO(BIO)
Traditional IO is stream oriented and synchronous blocking io. Each socket request needs to be processed by a corresponding thread. If there are not enough threads to process, the request is either waiting or rejected. That is, each connection requires the service to be processed by ...
Posted by TheMagician on Tue, 01 Mar 2022 13:31:14 +0100
1. Data transmission design of chat room
Necessary conditions: client and serverNecessary constraints: data transfer protocolPrinciple: the server listens to the message source, the client links to the server and sends a message to the server
1.1 data interaction between client and server
The client sends a message to the server, and the se ...
Posted by VMinder on Mon, 28 Feb 2022 02:58:59 +0100
This paper mainly introduces the application of centos7 9. Various deployment modes and configuration management of FullNAT mode of system deployment DPVS, including IPv4-IPv4, binding, IPv6-IPv6, IPv6-IPv4 (NAT64) and keepalived mode.
The following configurations are all based on dual arm mode, and the corresponding toa module of DPVS has b ...
Posted by ocpaul20 on Sat, 26 Feb 2022 17:59:50 +0100
1. Network architecture
You need to understand the basic client server programming model and how to write client server programs that use services provided by the Internet. Finally, combine all the concepts to develop a small but full-featured web server. Nowadays, network applications can be seen everywhere. Interestingly, all network applica ...
Posted by rotto on Fri, 25 Feb 2022 13:39:23 +0100
1, Basic concepts of network programming
1. What is computer network Computers distributed in different regions are interconnected by communication lines through network devices such as hardware Computer network, can be very convenient for information transmission, resource sharing!
2. What is the IP address of the computer IP address is the ...
Posted by marian on Thu, 24 Feb 2022 15:10:23 +0100
1, Introduction to network programming
Network programming: under the network communication protocol, data can be exchanged between programs running on different computers to realize network interconnection
1.1 three elements of network programming
IP address: to enable computers in the network to communicate with each other, you must sp ...
Posted by austrainer on Thu, 24 Feb 2022 14:07:00 +0100
Network support in Java:
InetAddress: used to represent hardware resources on the network, i.e. IP address;URL: uniform resource locator;Sockets: use TCP protocol to realize network communication;Datagram: use UDP protocol to realize network communication.
There is no public constructor. You can only create inst ...
Posted by richrock on Thu, 24 Feb 2022 12:22:34 +0100