23 Design Patterns (18) - Command Patterns
Command mode
Concept
II. Structure
Specific cases
Macro commands
5. Advantages of command mode
Introduction
In programming, it is often designed that one object needs to request another object to invoke its method to achieve some purpose. If the request does not want to deal with the requestee directly or directly, since the re ...
Posted by Chris.P on Sun, 09 Jun 2019 21:04:31 +0200
[Original] Intranet SSH password explosion tool sshcrack (with Cscan batch weak password detection)
0x000 Preface
sshcrack is a command line SSH password explosion tool for SSH password detection in infiltration
Of course, it can also be used for SSH password explosion on external network, supporting Windows/Linux, other systems are not tested.Tip1
0x001 directory
1.sshcrack usage
2.Cscan Batch Scan
3. Connect SSH to execute commands
4 ...
Posted by include_me on Sun, 09 Jun 2019 19:46:48 +0200
[Data Structure] Serialization and Deserialization of Search Binary Trees (BST) and Ordinary Binary Trees
[Data Structure] Serialization and Deserialization of Search Binary Trees (BST) and Ordinary Binary Trees
background
The structure of binary trees is often used in algorithmic problems:
struct TreeNode {
TreeNode* left, right;
int val;
TreeNode(int newval):val(newval), left(NULL), right(NULL) {}
};
To construct some test ...
Posted by explore on Sun, 09 Jun 2019 18:44:31 +0200
Lazy lazy loading (lazy loading) UITableView
For example, when we use Netease News App, not all of the news we watch is interesting. Sometimes we just skip quickly and want to skip the content we don't like, but as long as we skip through, the picture starts loading, so the user experience is not good and memory is wasted.
At this time, we can use lazy loading technology, when the inter ...
Posted by juddster on Sun, 09 Jun 2019 01:04:44 +0200
7.0 Compatible Camera Album Use
scene
Many applications have the requirement of setting up the next avatar, which requires camera album. But when 6.0, run-time privilege detection is added. When 7.0, it restricts the building of shared files in the application, which is the file://URI used in the previous camera album can not be used.
Because in applications 7.0 and above, ...
Posted by ryanbutler on Sat, 08 Jun 2019 02:31:56 +0200
MMDB ip address library operation
MMDB ip address library operation
@(JAVA)[java]
MMDB, Maxmind DB, is a database designed to store data information of IPv4 and IPv6. The MMDB file is a binary format file, which uses a binary lookup tree to speed up the query of IP information.
1. Data Format Description
{
continent => { //Continent
code ...
Posted by Orio on Sat, 08 Jun 2019 01:30:39 +0200
Ultra-detailed JSON parsing steps
AI Bible! Chinese Edition of Deep Learning
Machine Learning-Data Mining System Training
Will you transform for AI?
[Topping] Ultra-detailed JSON parsing steps
Label:
Json parsing steps
2016-09-19 14:58
4561 people reading comment(1)
Collection
Report
Classification:
★★★ Android ★★★(229)
Author' ...
Posted by Mr_Pancakes on Fri, 07 Jun 2019 21:36:45 +0200
python project to solve sandbox dependence problem in production environment without external network
python project to solve sandbox dependence problem in production environment without external network
In our actual production project deployment process, such as banking, government intranet, can not access certain dependency sources. Considering the actual situation, we will see how to solve this problem.
development environment
Establishin ...
Posted by JeBu on Fri, 07 Jun 2019 20:01:14 +0200
Centos Nginx Multi-php Version
Record the process of an installation
System: centos
php version: 5.4 5.6
Purpose: Install two php versions
1: First install the first version of php5.4 via lnmp specific command lnum has specific operations on the official network
2: Modify the configuration of php-fpm
Stop running php-fpm first, check pid of php-fpm first
[roo ...
Posted by ciciep on Fri, 07 Jun 2019 19:57:19 +0200
New text message on mobile phone, remind me via computer
Generally, I use the mobile phone for less time, more time with the computer, mobile phone light users, the computer is heavy, after work or home, the computer is basically in use, so often there will be mobile phone not at hand or charging situation, listening to the song is hi mobile phone calls or text messages will rarely be detected, when ...
Posted by beginneratphp on Fri, 07 Jun 2019 19:32:35 +0200