23 Design Patterns (18) - Command Patterns

Command mode Concept II. Structure Specific cases Macro commands 5. Advantages of command mode Introduction In programming, it is often designed that one object needs to request another object to invoke its method to achieve some purpose. If the request does not want to deal with the requestee directly or directly, since the re ...

Posted by Chris.P on Sun, 09 Jun 2019 21:04:31 +0200

[Original] Intranet SSH password explosion tool sshcrack (with Cscan batch weak password detection)

0x000 Preface sshcrack is a command line SSH password explosion tool for SSH password detection in infiltration Of course, it can also be used for SSH password explosion on external network, supporting Windows/Linux, other systems are not tested.Tip1 0x001 directory 1.sshcrack usage 2.Cscan Batch Scan 3. Connect SSH to execute commands 4 ...

Posted by include_me on Sun, 09 Jun 2019 19:46:48 +0200

[Data Structure] Serialization and Deserialization of Search Binary Trees (BST) and Ordinary Binary Trees

[Data Structure] Serialization and Deserialization of Search Binary Trees (BST) and Ordinary Binary Trees background The structure of binary trees is often used in algorithmic problems: struct TreeNode { TreeNode* left, right; int val; TreeNode(int newval):val(newval), left(NULL), right(NULL) {} }; To construct some test ...

Posted by explore on Sun, 09 Jun 2019 18:44:31 +0200

Lazy lazy loading (lazy loading) UITableView

For example, when we use Netease News App, not all of the news we watch is interesting. Sometimes we just skip quickly and want to skip the content we don't like, but as long as we skip through, the picture starts loading, so the user experience is not good and memory is wasted. At this time, we can use lazy loading technology, when the inter ...

Posted by juddster on Sun, 09 Jun 2019 01:04:44 +0200

7.0 Compatible Camera Album Use

scene Many applications have the requirement of setting up the next avatar, which requires camera album. But when 6.0, run-time privilege detection is added. When 7.0, it restricts the building of shared files in the application, which is the file://URI used in the previous camera album can not be used. Because in applications 7.0 and above, ...

Posted by ryanbutler on Sat, 08 Jun 2019 02:31:56 +0200

MMDB ip address library operation

MMDB ip address library operation @(JAVA)[java] MMDB, Maxmind DB, is a database designed to store data information of IPv4 and IPv6. The MMDB file is a binary format file, which uses a binary lookup tree to speed up the query of IP information. 1. Data Format Description { continent => { //Continent code ...

Posted by Orio on Sat, 08 Jun 2019 01:30:39 +0200

Ultra-detailed JSON parsing steps

 AI Bible! Chinese Edition of Deep Learning Machine Learning-Data Mining System Training      Will you transform for AI? [Topping] Ultra-detailed JSON parsing steps Label: Json parsing steps 2016-09-19 14:58 4561 people reading comment(1) Collection Report Classification: ★★★ Android ★★★(229) Author' ...

Posted by Mr_Pancakes on Fri, 07 Jun 2019 21:36:45 +0200

python project to solve sandbox dependence problem in production environment without external network

python project to solve sandbox dependence problem in production environment without external network In our actual production project deployment process, such as banking, government intranet, can not access certain dependency sources. Considering the actual situation, we will see how to solve this problem. development environment Establishin ...

Posted by JeBu on Fri, 07 Jun 2019 20:01:14 +0200

Centos Nginx Multi-php Version

Record the process of an installation System: centos php version: 5.4 5.6 Purpose: Install two php versions 1: First install the first version of php5.4 via lnmp specific command lnum has specific operations on the official network 2: Modify the configuration of php-fpm Stop running php-fpm first, check pid of php-fpm first [roo ...

Posted by ciciep on Fri, 07 Jun 2019 19:57:19 +0200

New text message on mobile phone, remind me via computer

Generally, I use the mobile phone for less time, more time with the computer, mobile phone light users, the computer is heavy, after work or home, the computer is basically in use, so often there will be mobile phone not at hand or charging situation, listening to the song is hi mobile phone calls or text messages will rarely be detected, when ...

Posted by beginneratphp on Fri, 07 Jun 2019 19:32:35 +0200