Tag:White List

  • Application of bitcoin in data security (1)


    Have you ever come across a scenario in which the company needs to configure an internal service and expose a public network interface for debugging. At the same time, in order to ensure security, token verification is set for this interface. Only members of the group know the token. Obviously, there is a security risk […]

  • Deep comparison between emui and MIUI background processing


    Android’s background mechanism is not only an advantage of Android, but also a feature with serious fragmentation. As a developer of three apps that rely on Android’s background services, I write this article to compare the background processing logic of emui and MIUI, the two most common Android systems EMUI 10.0.0, Android 10 MIUI 12.0.6, […]

  • Thinkpapi service update IP white list


    ThinkAPIunifiedAPIInterface service is a set of interface calling services and services encapsulated by official joint partnersSDK, designed to helpThinkPHPdeveloperMore convenient and lower costCall all kinds of official and third party servicesAPIInterfaces and services, so as to better build the developer ecology. This timeThinkAPIThe service updates are as follows: Add IP white list function In view […]

  • Nginx configuration common parameters, see this article is enough


    Recently, I’m learning nginx as a note. If you have any mistakes, please point them out or exchange them in depth. Related articles: Nginx load balancing Nginx adds Lua module Using consumer + nginx upsync to realize dynamic load Nginx proxy cache Nginx embedded variables Main module #Configure users or groups. The default is nobody […]

  • How to enhance the interceptor of grpc


    Grpc interceptor as AOP programming tool, I believe you must have experienced when using grpc. Here, we mainly talk about the shortcomings of normal use It can only be used for global, and can’t flexibly intercept each or a class of methods. If you only do some business independent operations (record the request log and […]

  • How to design a powerful API interface


    In daily development, there are always various interfaces. Front and back end data transmission interface, third-party business platform interface. The front-end and back-end data transmission interfaces of a platform usually communicate in the Intranet environment and use the security framework, so the security can be well protected. This article focuses on how to design the […]

  • Django 1.8 official document translation: 13-12 verifier


    Validator Write verifier A verifier is a callable object that takes a value and throws it when some rules are not metValidationErrorAbnormal. Validators help to reuse validation logic between different types of fields. For example, this validator only allows even numbers: from django.core.exceptions import ValidationError def validate_even(value): if value % 2 != 0: raise ValidationError(‘%s […]

  • Network CSP and nonce


    White list Browsers can’t distinguish the source of JS. Some JS comes from the application itself, while others may come from malicious injection. Because browsers cannot distinguish the source of JS, it may be exploited by XSS attacks. What is XSS? For example, in a blog site, publish an article containing malicious script<script>Tag, which will […]

  • GitHub desktop solved the problem of submitting the update. The error is 0x80092013


    The first week back to work, write code in the company, and then want to submit an updateresult schannel: next InitialzeSecurityContext failed: Unknown error (0x80092013) Whether it’s update or pull, it won’t workThen there’s the long search for solutions In GitHub desktop’s issue, we found some cluesissue #2187However, his solution is to turn off the […]

  • How to access Phoenix data by spark on maxcompute


    Introduction:How to use spark on maxcompute to connect to Phonix and write the data of HBase to the corresponding table of maxcompute. There are no corresponding cases at present, in order to meet the needs of users. This paper mainly explains how to use spark to connect Phonix to access HBase data and then write […]

  • Error handling based on react Redux


    This paper is divided into three parts Classification of error Explain in detail how to use Redux to deal with errors in a unified way step by step Collection of error information The technology stack used in this case includes:React,Redux,TypeScript,Axios,Lodash。 Classification of error HTTP request error HTTP request errors can be classified into the following […]