Web_programming
https://instagram-engineering.com/sharding-ids-at-instagram-1cf5a71e5a5c
#WeChat
از روش زیر برای ایجاد
#sequence
استفاده می کند
https://translate.google.com/translate?hl=&sl=auto&tl=en&u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzI4NDMyNTU2Mw%3D%3D%26mid%3D2247483679%26idx%3D1%26sn%3D584dbd80aa08fa1188627ad725680928%26mpshare%3D1%26scene%3D1%26srcid%3D1208L9z4yXKLW60rPph2ZmMn%23rd
از روش زیر برای ایجاد
#sequence
استفاده می کند
https://translate.google.com/translate?hl=&sl=auto&tl=en&u=https%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzI4NDMyNTU2Mw%3D%3D%26mid%3D2247483679%26idx%3D1%26sn%3D584dbd80aa08fa1188627ad725680928%26mpshare%3D1%26scene%3D1%26srcid%3D1208L9z4yXKLW60rPph2ZmMn%23rd
چرا تولید sequence مهم است؟
۱- بهبود کارایی برخی از queryها
۲- partitioning و sharding
۱- بهبود کارایی برخی از queryها
۲- partitioning و sharding
چگونه تعداد خطوط یک پروژه در یک پوشه را شمارش کنیم
find . -name '*.js' | xargs wc -l
به جای پسوند js میتوانید زبان پروژه خود را قرار دهید (go-java-,...)
#line_of_code #calc_line #loc
find . -name '*.js' | xargs wc -l
به جای پسوند js میتوانید زبان پروژه خود را قرار دهید (go-java-,...)
#line_of_code #calc_line #loc
Web_programming
https://blog.klauspost.com/fast-stream-deduplication-in-go/ #stream #deduplication
توجه کنید که deduplication میتواند سخت افزاری و یا مانند بالا نرم افزاری پیاده سازی شود
حملاتی که به عنوان یک توسعه دهنده وب باید با آنها آشنا باشید
known attacks
— Known-Plaintext Attacks
— Chosen-Plaintext Attacks
— Chosen-Ciphertext Attacks
— Replay attacks
— Man-in-the-middle attacks
— hash-collision attacks
— Length extension attacks
known attacks
— Known-Plaintext Attacks
— Chosen-Plaintext Attacks
— Chosen-Ciphertext Attacks
— Replay attacks
— Man-in-the-middle attacks
— hash-collision attacks
— Length extension attacks
the known-plaintext attack (KPA) is an attack model for cryptanalysis where the attacker has samples of both the plaintext, and its encrypted version (ciphertext).
By definition, a chosen-plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker has the capability to choose arbitrary plaintexts to be encrypted and obtain the corresponding ciphertexts.
By definition, a chosen-ciphertext attack (CCA) is an attack model for cryptanalysis in which the cryptanalyst gathers information, at least in part, by choosing a ciphertext and obtaining its decryption under an unknown key. In the attack, an adversary has a chance to enter one or more known ciphertexts into the system and obtain the resulting plaintexts. From these pieces of information the adversary can attempt to recover the hidden secret key used for decryption.
By definition, length extension attacks are a type of attack when certain types of hashes are misused as message authentication codes, allowing for inclusion of extra information.
A replay attack (also known as playback attack) is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and re-transmits it, possibly as part of a masquerade attack by IP packet substitution. This is one of the lower tier versions of a "Man-in-the-middle attack".