“Amazon Cloud Technology Product Review” event call for papers|Building a streaming media server with “weak” image processing functions

Authorization statement: This article authorizes the official Amazon Cloud Technology article to forward and rewrite the rights, including but not limited to Amazon Cloud Technology official channels such as Developer Centre, Zhihu, self-media platforms, third-party developer media, etc. This article is based on the following software and hardware tools: +awsec2 + frp-0.52.3 + mediamtx-1.3.0 + […]

JVM source code analysis: processing details of soft, weak and virtual references

Table of Contents Write in front: Source code analysis: Java level: JVM level: Danger points of use: Summarize: Version Information: jdk version: jdk8u40 Garbage collector: Serial new/old Write in front: Different garbage collectors have different algorithms and different efficiencies. The default is ParallelScavenge new/old in JDK8. The author used Serial new/old when writing the article. […]

The use of C++ smart pointers: the use of shared_ptr, weak_ptr, unique_ptr, use case description.

Directory of series articles Contents of this chapter: (1) Introduction to shared_ptr, weak_ptr, unique_ptr (2) Memory leak caused by using share_ptr alone (3) Combined use of shared_ptr and weak_ptr Article directory Table of Contents of Series Articles Preface 1. Use of shared_ptr, weak_ptr, unique_ptr 1.1 shared_ptr 1.2 weak_ptr 1. Creation of weak_ptr pointer 2. Member […]

Weak password detection service implementation (multi-process, multi-thread, holy)

weak.py #!/usr/bin/env python # -*- coding: utf-8 -*- import global_par from global_par import * from weakcheck_tool import WEAK_CHECK import signal import os import errno import time import logging importsys import json import multiprocessing #pid import stomp from stomp import ConnectionListener import ConfigParser hand_count = 0 task_list = {} task_return_dic = {“type”:6, “status”:0, “task_id”:”0″, “tool”:”weak”, “data”:[ […]

Java–》4 kinds of references: strong and weak

Recommended links: Summary–》[Java] Summary–》[Mysql] Summary–》【Redis】 Summary–》[Kafka] Summary–》[Spring] Summary–》[SpringBoot] Summary–》[MyBatis, MyBatis-Plus] Summary–》[Linux] Summary–》[MongoDB] Summary–》[Elasticsearch] Java–》4 kinds of references: strong and weak 1. NormalReference = Strong = Normal = Default 2. SoftReference = soft 3. WeakReference = weak 4. PhantomReference = virtual 5. The difference between the four types of citations 1. Writing method 2. Recycling mechanism […]

[C Language] Debugging questionable function pointers and writing callback functions (Callback function parameters in the structure and false callback function __weak declaration)

[C Language] Debugging questionable function pointers and writing callback functions (Callback function parameters in the structure and false callback function __weak declaration) Article directory Debugging questionable function pointers function pointer function call Writing callback function callback function inside the structure fake callback function Appendix: Compressed strings, big and small endian format conversion Compressed string floating […]

Vue 3.3.6 released, it’s faster thanks to WeakMap

Performance improvements and type checking of additional properties of DOM nodes make the new Vue worth updating. The Vue team has really done a lot of work. In fact, they released two sub-versions on the same day. Vue 3.3.5 and 3.3.6 are both released on October 20, 2023. WeakMaps One of the improvements was the […]

C++ smart pointers [Part 2] (shared_ptr/weak_ptr/circular reference/delete)

Article directory 4. Smart pointer [shared_ptr] 4.1 Design concept member properties 4.2 Main interfaces copy construction 4.3 Reference counting thread safety issues Test thread safety Making classes thread-safe through locking protection of counted references Class instantiated objects require manual locking and protection when used. The introduction of “lock” Thread reference parameter passing problem 4.4 Overall […]

4.9.4-Testing_for_Weak_Encryption

Testing for Weak Encryption ID WSTG-CRYP-04 Summary Incorrect uses of encryption algorithms may result in sensitive data exposure, key leakage, broken authentication, insecure session, and spoofing attacks. There are some encryption or hash algorithms known to be weak and are not suggested for use such as MD5 and RC4. In addition to the right choices […]

[C++11] Use of smart pointers and simulation implementation (shared_ptr, unique_ptr, auto_ptr, weak_ptr)

Blog homepage: Homepage Series column: C + + Thank you everyone for your likesCollections?Comments Looking forward to making progress with everyone! Article directory 1. RAII concept 1. auto_ptr 1.Basic use 2. Simulation implementation 2. unique_ptr 1.Basic use 2. Simulation implementation 3. shared_ptr 1.Basic use 2. Reference counting implementation 3. Upgrade of destructor (for arrays) 4. […]