Collect this 20000 word summary, ❤️ Docker ❤️ This piece is guaranteed to be pinched to death. Jesus can't do what I said
⭐ Welcome to subscribe Interview raids in big factories Column, interview the high-frequency interview knowledge summarized by more than 10 large factories. In the free stage, please subscribe quickly
⭐More introduction to boutique columns can be found here
⭐ For more java interview learning materials, please send a private letter to " ...
Posted by 182x on Mon, 20 Dec 2021 05:56:42 +0100
3 Ubuntu18. 04 implementation of ROS UDP communication
Ubuntu18. 04 implementation of ROS UDP server communication
This section describes the udp Server sending and receiving data. UDP communication belongs to frame transmission. In the process of frame transmission, there is no requirement for the order and arrival of messages, and no verification is carried out. Therefore, UDP belongs to unrelia ...
Posted by richever on Sat, 18 Dec 2021 04:46:59 +0100
⁉ Using socket to implement Ping command ⚡ Here comes the BOSS ⚡ Fishing artifact ⭐ A lot of dry goods ❤ Suggestions collection ❤ ️
Hello, I'm 😎
I wrote an article on hydrology earlier< Obtain the ip address and mac address of all connected devices under the current LAN >But what I didn't expect was that I was on the hot list, which was also my first article on the hot list, and the reading volume soared instantly 💥. However, few people have seen my hard core tech ...
Posted by chaiwei on Thu, 16 Dec 2021 18:41:53 +0100
[Dubbo] Provider request processing
1. Preface
The previous article analyzes how the Consumer initiates an RPC call, and how the Request object Request is encoded from the client, then sent to the server through the network, and then decoded by the server. Next, it starts to analyze how the service Provider handles RPC call requests.
This paper will analyze from two dimension ...
Posted by Gambler on Thu, 16 Dec 2021 17:27:13 +0100
6 methods of cross domain data acquisition
1, Basic guidance
(1) Get data through Ifram
Get index2 through Ifram's contentWindow HTML data
//index1
<iframe src="index2.html" id="myIframe"></iframe>
<script type="text/javascript">
var myIframe = document.getElementById('myIframe');
window.name = 'mainWindow';
myIframe.onload = function(){
console. ...
Posted by nyfael on Thu, 16 Dec 2021 10:59:29 +0100
Log4j2 Vulnerability Replication
Preface
Log4j2's remote execution vulnerability has recently become so hot that I've been using logback s to save lives and lie in bed to watch the show this weekend. We don't need to, but we still need to know.
Reproduction
Control server
■ RMIServer
RMIServer starts an rmi service, which starts two ports, a registry setting, and a ra ...
Posted by JamesThePanda on Tue, 14 Dec 2021 18:49:19 +0100
11, [advanced] wireless communication module (Nrf)
Introduction to Internet of things and communication module
Embedded Internet of things: ARM architecture certification, Huawei Internet of things certification, Ministry of industry and information technology Communication technology of Internet of things: wired communication Ethernet
OSI7 layer network structure:
Application layer: t ...
Posted by NilayKomal on Mon, 13 Dec 2021 02:25:11 +0100
Example of creating a simple proxy server with sockets in Java
In these examples, you can find different ways to create a simple proxy socket server. This is useful for a number of reasons:
Capture traffic between clients and servers.Limit upload / download bandwidth to see how your website loads slow connections.View the system's response when there is a problem with the network."Dynamically" m ...
Posted by jkarr on Sun, 12 Dec 2021 12:40:49 +0100
Implementation of okhttp3- source code analysis interceptor chain
Interceptor chain should be one of the core of okhttp framework.
Responsibility chain model
The implementation of okhttp request Interceptor is a typical responsibility Chain mode, which generally requires the Interceptor class to implement the same interface. There is an Interceptor interface in okhttp. Both the default Interceptor and our c ...
Posted by Megienos on Sat, 11 Dec 2021 08:09:04 +0100
Prometheus deployment alarm docking QQ mailbox
introduction
Prometheus' ability to collect and store indicators belongs to two independent components, Prometheus Server and alertmanager (general component). The former is only responsible for generating alarm notifications based on "alarm rules", and the specific alarm operations are completed by the latter. Alertmanager i ...
Posted by rigi2 on Fri, 10 Dec 2021 12:58:49 +0100