Latest Articles

Penetration Testing Theory

Penetration Testing Theory1. Definition of Penetration TestingPenetration Test is a test in which personnel with information security knowledge and skills are entrusted to simulate the attack methods of malicious hackers. Usually we describe it as a method/activity that explores possible vulner ... More >>

Block Is Used for Communication between OC and C++

Block Is Used for Communication between OC and C++BackgroundIn iOS development, we often encounter the situation of mixing OC and C++, so how to communicate between then? This article will introduce how to use block for communication between oc and c++. Due to the different memory management style o ... More >>

Convolutional Neural Networks in Deep Learning

Convolutional Neural Networks in Deep LearningWhat is Convolutional Neural Network?Convolutional neural networks are a model of deep learning that mainly processes tasks such as images and videos. CNN has achieved great success in the field of computer vision, such as multi object tracking, object r ... More >>

Understanding Garbage Collection in Go

Understanding Garbage Collection in GoGarbage collection is a mechanism Go developers use to find memory space that is allocated recently but is no longer needed, hence the need to deallocate them to create a clean slate so that further allocation can be done on the same space or so that memory can ... More >>

MySQL Backups

MySQL Backups1. Why backup is necessary Disaster recovery: Hardware failures, unintentional bugs causing data damage, or servers and their data being inaccessible or unusable due to certain reasons (such as a computer room building burning down, malicious hacker attacks, or MySQL bugs). People chang ... More >>

The Use and Principle Analysis of Coroutines

The Use and Principle Analysis of Coroutines1st. Why Use CoroutinesWhether it’s the birth of a technology or a product, it often comes with demand, and coroutines are no exception. When asked why to use coroutines, the first thing to understand is, what is a coroutine? In summary, it is a lightweigh ... More >>

Analyzing Redis Bloom Filters and Their Applications in Detail

Analyzing Redis Bloom Filters and Their Applications in DetailWhat’s Bloom FilterA Bloom Filter is a clever probabilistic data structure proposed by Howard Bloom in 1970, designed to determine whether a certain element exists in a set. It can indicate with a certain probability whether something def ... More >>

Redis Master-Slave Replication Principle

1.IntroductionIn most cases, we use redis stand-alone service. In actual scenarios, single-node Redis is prone to risks. Since failover cannot be achieved, subsequent requests will be sent directly to the database. A large number of queries will cause the number of database connections to reach a pe ... More >>

Pnpm Principle

Pnpm PrincipleDo you need some operating system knowledge to understand how pnpm works 1.The nature of the documentIn the operating system, a file is actually a pointer, only instead of pointing to a memory address, it points to an external storage address (in this case, external storage can be a ha ... More >>

Building a Python API Testing Tool Platform

Building a Python API Testing Tool PlatformIntroduction:In today’s software development landscape, API testing has become an integral part of the testing process. It allows developers to ensure the functionality and reliability of their applications by testing the different endpoints and functionali ... More >>