Latest Articles
Penetration Testing Theory
Penetration Testing Theory1. Definition of Penetration TestingPenetration Test is a test in which personnel with information security knowledge and skills are entrusted to simulate the attack methods of malicious hackers.
Usually we describe it as a method/activity that explores possible vulner
...
More >>
2024-04-26
Penetration
/
Testing
Block Is Used for Communication between OC and C++
Block Is Used for Communication between OC and C++BackgroundIn iOS development, we often encounter the situation of mixing OC and C++, so how to communicate between then? This article will introduce how to use block for communication between oc and c++. Due to the different memory management style o
...
More >>
2024-04-17
Back End
/
communication
/
OC
/
C++
Convolutional Neural Networks in Deep Learning
Convolutional Neural Networks in Deep LearningWhat is Convolutional Neural Network?Convolutional neural networks are a model of deep learning that mainly processes tasks such as images and videos. CNN has achieved great success in the field of computer vision, such as multi object tracking, object r
...
More >>
Understanding Garbage Collection in Go
Understanding Garbage Collection in GoGarbage collection is a mechanism Go developers use to find memory space that is allocated recently but is no longer needed, hence the need to deallocate them to create a clean slate so that further allocation can be done on the same space or so that memory can
...
More >>
2024-04-01
GO
/
Back End
/
Garbage Collection
MySQL Backups
MySQL Backups1. Why backup is necessary
Disaster recovery: Hardware failures, unintentional bugs causing data damage, or servers and their data being inaccessible or unusable due to certain reasons (such as a computer room building burning down, malicious hacker attacks, or MySQL bugs).
People chang
...
More >>
2024-03-25
Back End
/
MySQL
The Use and Principle Analysis of Coroutines
The Use and Principle Analysis of Coroutines1st. Why Use CoroutinesWhether it’s the birth of a technology or a product, it often comes with demand, and coroutines are no exception. When asked why to use coroutines, the first thing to understand is, what is a coroutine? In summary, it is a lightweigh
...
More >>
2024-03-18
Front End
/
Coroutines
Analyzing Redis Bloom Filters and Their Applications in Detail
Analyzing Redis Bloom Filters and Their Applications in DetailWhat’s Bloom FilterA Bloom Filter is a clever probabilistic data structure proposed by Howard Bloom in 1970, designed to determine whether a certain element exists in a set. It can indicate with a certain probability whether something def
...
More >>
Redis Master-Slave Replication Principle
1.IntroductionIn most cases, we use redis stand-alone service. In actual scenarios, single-node Redis is prone to risks.
Since failover cannot be achieved, subsequent requests will be sent directly to the database. A large number of queries will cause the number of database connections to reach a pe
...
More >>
Pnpm Principle
Pnpm PrincipleDo you need some operating system knowledge to understand how pnpm works
1.The nature of the documentIn the operating system, a file is actually a pointer, only instead of pointing to a memory address, it points to an external storage address (in this case, external storage can be a ha
...
More >>
2024-02-26
Front End
/
pnpm
Building a Python API Testing Tool Platform
Building a Python API Testing Tool PlatformIntroduction:In today’s software development landscape, API testing has become an integral part of the testing process. It allows developers to ensure the functionality and reliability of their applications by testing the different endpoints and functionali
...
More >>
2024-02-17
Back End
/
Python