After the disclosure of the CSDN password leak last year, many experts jumped out to discuss the programmer of his home, and it was still […]
Read moreAuthor: admin
Storm: The most fired streaming framework
Birth Before the STORM open source in 2011, due to Hadoop’s flaming, the entire industry discussed big data chattering. Hadoop’s high throughput, massive data processing […]
Read moreWebsite password storage program comparison
In order to be responsible for the user, when the user password is inverse algorithm, we should consider how to encrypt the user password. So […]
Read moreHow to solve the network packet loss rate
Network loss is the phenomenon that we are lost in the channel due to various reasons for interrogation with PING. Ping uses the ICMP return […]
Read moreFirewall, DCD and TCP Keep Alive
In an article “Oracle and Firewall”, I mentioned before I wrote that the network firewall cuts off long-term TCP connections, which can be set inside […]
Read moreDomain DNS related terms
Domain DNS related terms, Chinese and English control Registrant (registered person) ………………… .. Get entities using Internet resource rights. Typically, some form of revocable authorization […]
Read moreThe five high-availability system failure recovery principles you should know in “Mars Rescue”
“Mars Rescue” is a closest film that is widespread. Telling to the mission of human landing Mars, astronaut Mark Wateni has experienced a bad storm, […]
Read moreSecurity issues for client software with browser as core
The browser has the development fast and can use the various features of the browser (such as JS script, flash plugin, etc.), so more and […]
Read moreTeach you CSRF protection
CSRF (Cross-Site Request Forgecy): Speeding for fake is a common network attack. What is CSRF and how to defend? CSRF principle The CSRF attack process […]
Read more