Learn about key exchange algorithm ECDH

Links to the original text: https://www.jianshu.com/p/b26cd2bfdc28 Move on to other people's explanations: Let's take Alice and Bob as examples to describe the principle of Diffie-Hellman key exchange. 1. All participants involved in t ...

Posted on Fri, 16 Aug 2019 04:16:16 -0700 by madkris

kubernetes docking third party authentication

Offline installation package address for kubernetes Summary This article describes how to use a github account to associate your own kubernetes account.The following results have been achieved: Use github user email as a kubernetes user, such as fhtjob@hotmail.com Create a corresponding clusterrole binding to the fhtjob@hotmail.com user Create ...

Posted on Thu, 01 Aug 2019 18:31:17 -0700 by MichaelGallagher

mysql log system inventory

MySql log files include error log, slow query log, transaction log, binary log, etc. Mysql logs can be configured by command 1 show global variables like '%log%'; The results of implementation are as follows "back_log" "80" "binlog_cache_size" "32768" "binlog_checksum" "CRC32" "binlog_direct_non_transactional_updates" ...

Posted on Sun, 28 Jul 2019 05:40:09 -0700 by scuzzo84

tensorflow self-study in actual combat [2]

Denoising self-encoder based on tensorflow Autoencoder: An unsupervised learning algorithm, which is mainly used for data dimensionality reduction or feature extraction. In deep learning, autoencoder can provide the initial value of the weight matrix before training begins. Xaiver Glorot and Yoshua Be ...

Posted on Mon, 22 Jul 2019 01:43:15 -0700 by vumpler

Method and precautions for locating cities by using HTML5 geographic location

introduce This article will briefly describe how to locate the browser through the API provided by HTML5 and Baidu Map Open Platform. The effect is to show the provinces and cities where the users are located, that is, XXX province and XXX city. Ideas for Realization The longitude and latitude information of users is obtained by using API provi ...

Posted on Thu, 04 Jul 2019 13:58:30 -0700 by webmaster1

Common configuration of [Git] git config

It took 2 years for git, except that I finished reading it in a week at the time of introduction and basically mastered it. Git Course of Liao Xuefeng The above knowledge, in the next two years, in our little Team, my git ability is still top-notch, and I have never carefully looked at git-related tutorials. Recently, when I changed my job and ...

Posted on Mon, 01 Jul 2019 16:05:43 -0700 by div

Writing Network Server Based on Twisted

start This document explains how to use twisted to implement network protocol stack parsing and TCP service processing. The same code can be reused in SSL and Unix socket servers. ) protocol processing classes generally follow twisted.internet.protocol.Protocol Most protocol handlers inherit either from this class or from the corresponding su ...

Posted on Thu, 20 Jun 2019 13:50:33 -0700 by mrman23

resin server configuration

I. resin Profile Description <!-- - Resin 3.1 configuration file. - Resin 3.1 configuration file --> <resin xmlns="http://caucho.com/ns/resin" xmlns:resin="http://caucho.com/ns/resin/core"> <!-- adds all .jar files under the resin/lib directory --> <!-- Load resin/lib All below.jar file --> <cl ...

Posted on Mon, 17 Jun 2019 16:26:48 -0700 by akluch

thinkphp5+workerman set up the socket backstage of the WeChat applet to build their own chat room

1. Download and install tp5 This step is not detailed, it is relatively simple, look directly at the TP document 2. Integrate workermantp for tp5 through composer It's official. It provides workerman's integration method. Install it with composer one click. See tp's official github for details 3. Write apps, let workerman run in tp first ...

Posted on Sat, 08 Jun 2019 10:45:41 -0700 by PHPThorsten

Https Configuration under Various Web Servers

Preface Front-end needs to start the web server in many cases. In order to ensure the security of the data, encrypted transmission of the data is required by Https. Some web-view s only allow HTTPS to be accessed, so learning how to configure HTTPS is also an essential part of the big front-end.This sister will start with a brief introduction t ...

Posted on Tue, 04 Jun 2019 09:36:05 -0700 by Shawazi