Skip to content
It technology security

It technology security

Second generation CDN architecture and ordinary CDN architecture

Recently, there is no thing to write, introduce a thing of our company a few births, may be a new thing for many people. . […]

Read more

Message release subscription mechanism in ECS

March 3, 2022 admin

We found that the concept of ECS is born in the game area when practicing the ECS framework. The application of traditional human machine interaction […]

Read more
  • system architecture

Domain name random case results in the failure of the asynchronous DNS resolution of libevent2

March 2, 2022 admin

The Libevent built-in asynchronous DNS parser uses a Hacking means called DNS-0x20 Encoding to prevent DNS from being poisoned. But this practice is problematic, which […]

Read more
  • network system

HBase high concurrent read write performance optimization in PORA2 applications

March 2, 2022 admin

Taobao search personalized offline real-time analysis system PORA has been upgraded to PORA2, and PORA2 is developed based on YARN-based streaming framework iStream, while using […]

Read more
  • system architecture

Mobile image format research

March 2, 2022 admin

The picture is usually the most mobile terminal consumption and occupies important visual space. Reasonable picture formatting and optimization can save you bandwidth and enhance […]

Read more
  • system architecture

DNS tunnel

March 2, 2022 admin

Today, I saw such a one in Greader, and I realized free internet in DNS tunnel. My thoughts suddenly returned to New Zealand vacation last […]

Read more
  • network system

The internal mechanism of Tmall navigation reveals

March 1, 2022 admin

Online shopping has become our habits. When we want to buy the same item, you often go to the online shopping website to enter Query […]

Read more
  • system architecture

IT practitioners need to know security knowledge (1)

March 1, 2022 admin

Recently, CSDNs and other websites are taken off, and they are boiling. As a programmer, I think the strength of the software developer’s own safety […]

Read more
  • website security

Defense DDOS Script in Python

February 28, 2022 admin

This blind can say that the opening of the white can save, the reason why is DDOS, not because the mad dog is chased, but […]

Read more
  • website security

Safety problem

February 27, 2022 admin

Note: One breath is written in this article, and then the Internet is searched for the relevant news, and I found that the risks of […]

Read more
  • website security

Traffic control based on leaky bucket and token bucket algorithm

February 27, 2022 admin

Internet services Lai Survival is the basis of traffic, products and operations often through various ways for application, such as Taobao’s double eleven, how to […]

Read more
  • network system

Posts navigation

«Previous Posts 1 2 3 4 5 … 29 Next Posts»

Recent Posts

  • Second generation CDN architecture and ordinary CDN architecture
  • Cuckoo Filter: Design and Implementation
  • Agent service and overload protection
  • Thoughts on TCP Reliability, Talking about Application Layer Agreement Design
  • Website Optimize smaller static resources

Recent Comments

No comments to show.

Archives

  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021

Categories

  • network system
  • system architecture
  • website security