Tag:Brother Liang

  • Rethinking http3xx redirection mechanism


    Problem introduction When collecting data some time ago, we need to download the CDN log for analysis. The interface of log download is very complex, and there is no corresponding SDK. It only provides a shell script. Although it is convenient to use on Ubuntu, the redirection analysis in the script is very complex. So […]

  • Magic weapon recommendation: MAC Alfred workflow you must not miss


    In the last article, I introduced the chrome plug-in that I use frequently in my daily life. By the way, let’s introduce Alfred workflow, which is the most efficient workflow on Mac. Here’s a list of Alfred workflows I use most often: (almost every day) Different plug-ins may have different versions developed by different authors. […]

  • Indispensable program burying point


    Purpose of burial point For this modification of the data statistical analysis program buried point, just for the statistical data in some difficult to find errors, all let the program take the initiative to run out. However, as long as the statistics are actively thrown out, they are all buried points. Data burying point is […]

  • Three ways to solve your Ubuntu security problem


    This article mainly introduces the following three parts Installation and use of anti virus engine ClamAV Ubuntu UFW restricted access address Ubuntu user failed to connect and lock the specified time Installation and use of anti virus engine ClamAV brief introduction ClamAV is an open source anti-virus engine for detecting viruses, Trojans, malware and other […]

  • Master bitcoin in 21 days


    Recently, more and more people have come into contact with bitcoin. I have also added two groups. The group friends are standard K-line party and trend party. In short, many of them are chasing up and down. Find the time to enter from every mutation of the K line, and leave when it reaches the […]

  • Analysis of UNIX domain socket


    unix domain socket UNIX domain socket is developed on the socket architecture, which is used for inter process communication (IPC) of the same host. It does not need to go through the network protocol stack, package and unpack, calculate the check sum, maintain the serial number and reply, and just copies the application layer data […]

  • Python automation operation and maintenance


    Here are some common doubts about getting started with Python, which are listed below. 1. If you use Python 3.5.2, but the production environment of most companies is Linux, the default Python is 2.6.6, and you don’t have permission to change it. In this case, what’s a good way? Python2 generally has a third-party library, […]

  • Hold on, my colleagues who are still crawling in the code mountain


    “There are only two hard things in Computer Science: cache invalidation and naming things.” — Phil Karlton In the computer world, there are only two difficult things: cache invalidation and object naming. It’s not a joke. It’s easy to write code, but reading other people’s code will vary from person to person. Good engineers write […]

  • Using ab and wrk to benchmark Tencent CLS


    Use AB and wrk to stress test Tencent cloud log service CLS, and take AB and wrk as examples to illustrate ab AB, whose full name is Apache benchmark, is an official tool of Apache. This tool is used to test the performance of Apache server. Check the service capability of the server installed with […]

  • Python deconstruction and encapsulation


    Asking questions Let’s look at the following code first x = 1 y = 2 tmp = x x = y y = tmp print(x, y) The output of the code is: 2 1 Look at the following code: x = 1 y = 2 x, y = y, x print(x, y) The output of […]

  • Python parsing


    In Python, you can often see the form ofret = [x ** 2 for x in lst]This kind of assignment statement is not easy for people who transfer from C + + to Python to understand the use of this for loop. This is the new syntax invented by Python for simplicity. Python analytic expression […]

  • Python zipper method and open address method to achieve dictionary


    Python dictionary is the most flexible built-in data structure type in Python besides list. Lists are ordered combinations of objects,A dictionary is an unordered collection of objects. The difference between the two is that the elements in the dictionary are accessed by keys, not by offsets. Using subscript index in the list can quickly get […]