Tag:White List

  • Application of bitcoin in data security (1)

    Time:2021-5-10

    Have you ever come across a scenario in which the company needs to configure an internal service and expose a public network interface for debugging. At the same time, in order to ensure security, token verification is set for this interface. Only members of the group know the token. Obviously, there is a security risk […]

  • Deep comparison between emui and MIUI background processing

    Time:2021-5-3

    Android’s background mechanism is not only an advantage of Android, but also a feature with serious fragmentation. As a developer of three apps that rely on Android’s background services, I write this article to compare the background processing logic of emui and MIUI, the two most common Android systems EMUI 10.0.0, Android 10 MIUI 12.0.6, […]

  • Thinkpapi service update IP white list

    Time:2021-4-17

    ThinkAPIunifiedAPIInterface service is a set of interface calling services and services encapsulated by official joint partnersSDK, designed to helpThinkPHPdeveloperMore convenient and lower costCall all kinds of official and third party servicesAPIInterfaces and services, so as to better build the developer ecology. This timeThinkAPIThe service updates are as follows: Add IP white list function In view […]

  • Nginx configuration common parameters, see this article is enough

    Time:2021-4-1

    Recently, I’m learning nginx as a note. If you have any mistakes, please point them out or exchange them in depth. Related articles: Nginx load balancing Nginx adds Lua module Using consumer + nginx upsync to realize dynamic load Nginx proxy cache Nginx embedded variables Main module #Configure users or groups. The default is nobody […]

  • How to enhance the interceptor of grpc

    Time:2021-3-24

    Grpc interceptor as AOP programming tool, I believe you must have experienced when using grpc. Here, we mainly talk about the shortcomings of normal use It can only be used for global, and can’t flexibly intercept each or a class of methods. If you only do some business independent operations (record the request log and […]

  • How to design a powerful API interface

    Time:2021-3-23

    In daily development, there are always various interfaces. Front and back end data transmission interface, third-party business platform interface. The front-end and back-end data transmission interfaces of a platform usually communicate in the Intranet environment and use the security framework, so the security can be well protected. This article focuses on how to design the […]

  • Django 1.8 official document translation: 13-12 verifier

    Time:2021-2-23

    Validator Write verifier A verifier is a callable object that takes a value and throws it when some rules are not metValidationErrorAbnormal. Validators help to reuse validation logic between different types of fields. For example, this validator only allows even numbers: from django.core.exceptions import ValidationError def validate_even(value): if value % 2 != 0: raise ValidationError(‘%s […]

  • Network CSP and nonce

    Time:2021-1-2

    White list Browsers can’t distinguish the source of JS. Some JS comes from the application itself, while others may come from malicious injection. Because browsers cannot distinguish the source of JS, it may be exploited by XSS attacks. What is XSS? For example, in a blog site, publish an article containing malicious script<script>Tag, which will […]

  • GitHub desktop solved the problem of submitting the update. The error is 0x80092013

    Time:2020-12-22

    The first week back to work, write code in the company, and then want to submit an updateresult schannel: next InitialzeSecurityContext failed: Unknown error (0x80092013) Whether it’s update or pull, it won’t workThen there’s the long search for solutions In GitHub desktop’s issue, we found some cluesissue #2187However, his solution is to turn off the […]

  • How to access Phoenix data by spark on maxcompute

    Time:2020-11-15

    Introduction:How to use spark on maxcompute to connect to Phonix and write the data of HBase to the corresponding table of maxcompute. There are no corresponding cases at present, in order to meet the needs of users. This paper mainly explains how to use spark to connect Phonix to access HBase data and then write […]

  • Error handling based on react Redux

    Time:2020-10-23

    This paper is divided into three parts Classification of error Explain in detail how to use Redux to deal with errors in a unified way step by step Collection of error information The technology stack used in this case includes:React,Redux,TypeScript,Axios,Lodash。 Classification of error HTTP request error HTTP request errors can be classified into the following […]