Nell Jonas
Bio
Stories (31/0)
Java interface document evolution history: liberate your hands step by step
At the beginning, the front and rear ends are separated, and the back end has to inform the front end of the information of the interface to facilitate the front end to call. That's all the information you need to provide, just write it in word, so you have this interface document:
By Nell Jonas11 months ago in 01
[hacker skills] how to cover up the traces of operation on the Linux system?
Operation steps ? Step 1: view and manipulate timestamps? Most Linux systems contain tools that allow us to quickly view and modify timestamps, the most influential of which is "Touch", which allows us to create new files and update files. The last time the filegroup was "touched".
By Nell Jonas2 years ago in 01
The continuous high temperature interferes with the cell phone signal: the network speed has slowed down!
According to the forecast of the Central Meteorological Observatory, in the next 10 days (August 17-26), there will still be persistent high temperature weather in Sichuan Basin, Jianghan, Jianghan, Jiangnan and other places, with a cumulative high temperature of 7 to 10 days. The highest temperature in the above areas can reach 35 to 38 ℃, and the local temperature can exceed 40 ℃.
By Nell Jonas2 years ago in 01
Cyber Wars: the robot dog with a submachine gun was cracked by hackers and shut down remotely!
This is not, you fight with robots, of course, there are corresponding counter-measures. A blogger active on Twitter and GitHub has published a way to deal with the robot-hacking the robot dog remotely and shutting him down directly.
By Nell Jonas2 years ago in 01
GitLab disables Windows!
According to GitLab's website, GitLab has been open source for a decade since its inception, "from a group of coders with their own laptops to an organization that needs to protect not only their own corporate data, but also customer data." For the sake of security, GitLab believes that it is necessary to uniformly adjust the configuration of employees' computers.
By Nell Jonas2 years ago in 01
How on earth were the girls on the "pornographic website" secretly photographed?
Now the Internet era, has also changed the nature of secret photography, no longer for selfish desires, but through the continuous spread of various porn sites, and even sold at extremely low prices to gain benefits.
By Nell Jonas2 years ago in 01
Welfare! Always say that you can't dig a loophole, but you really can't dig it? Infiltration course is attached!
After learning in these confusion for a period of time, the question gradually becomes: ? The knowledge points are relatively scattered, how to connect them together?
By Nell Jonas2 years ago in 01