12 2021 档案
摘要:The Surprising Behavior of Trailing Spaces INF: How SQL Server Compares Strings with Trailing Spaces
阅读全文
摘要:When to use the different log levels There are different ways to log messages, in order of fatality: FATAL ERROR WARN INFO DEBUG TRACE How do I decide
阅读全文
摘要:How to prevent favicon.ico requests? 回答1 I will first say that having a favicon in a Web page is a good thing (normally). However it is not always des
阅读全文
摘要:一起理解 Virtual DOM 详解Vue中的虚拟DOM 前言 Vue.js 2.0引入Virtual DOM,比Vue.js 1.0的初始渲染速度提升了2-4倍,并大大降低了内存消耗。那么,什么是Virtual DOM?为什么需要Virtual DOM?它是通过什么方式去提升页面渲染效率的呢?这
阅读全文
摘要:虚拟 DOM 到底是什么? 是什么? 虚拟 DOM (Virtual DOM )这个概念相信大家都不陌生,从 React 到 Vue ,虚拟 DOM 为这两个框架都带来了跨平台的能力(React-Native 和 Weex)。因为很多人是在学习 React 的过程中接触到的虚拟 DOM ,所以为先入
阅读全文
摘要:Webpack 案例 —— vue-loader 原理分析 2021-03-08 图解 VueLoader : .vue 文件是如何被打包的 2021-01-04 Using vue-loader to create single-page applications 2021-09-15
阅读全文
摘要:Understanding the Folder Compare Display BeyondCompare The Folder Compare display uses color cues to highlight the differences between the two base fo
阅读全文
摘要:What's the difference between tilde(~) and caret(^) in package.json? 问题 After I upgraded to the latest stable node and npm, I tried npm install moment
阅读全文
摘要:How to Quickly Improve Your English Listening Skills Anywhere Think about your best friend. Do you both like the same things? Do you both think the sa
阅读全文
摘要:What is the difference between GET and POST encryption? 问题 What is the difference when encrypting GET and POST data? To be more specific: when https-S
阅读全文
摘要:Unable to import binding '...' from namespace '...' There's workaround that does not require you to add xsds by hand. Go to your service then instead
阅读全文
摘要:How to import the WSDL of a SOAP Web Service in Postman For a long time, working with SOAP in Postman was not natively supported and you had to create
阅读全文
摘要:jQuery - checkbox enable/disable 回答1 Change your markup slightly: $(function() { enable_cb(); $("#group1").click(enable_cb); }); function enable_cb()
阅读全文
摘要:Can HTML checkboxes be set to readonly? 回答2 READONLY doesn't work on checkboxes as it prevents you from editing a field's value, but with a checkbox y
阅读全文
摘要:Resolving view state message authentication code (MAC) errors 一个有趣的 ”Validation of viewstate MAC failed” 错误的发现和解决 原来这个服务器第一次回复时,对客户端的HTTP Header里面根本没有
阅读全文
摘要:https://aoeiv.net/ 查分 https://liquipedia.net/ageofempires/SteelSeries_Prime_Cup#Schedule 参赛选手 只有554个人 no总所在分组,在https://smash.gg/tournament/steelseries
阅读全文
摘要:https://zh.wikipedia.org/zh-cn/%E5%90%8C%E9%A4%98 同余(英语:Congruence modulo[1],符号:≡)在数学中是指数论中的一种等价关系[2]。当两个整数除以同一个正整数,若得相同余数,则二整数同余。同余是抽象代数中的同余关系的原型[3]。
阅读全文
摘要:What the Hell Happened This Week? - Week of 12/5/2021 The Daily Show with Trevor Noah Created on https://www.dvdvideosoft.com/free-youtube-subtitles-d
阅读全文
摘要:How to view the dependency tree of a given npm module? 回答1 回答2 回答3 This site allows you to view a packages tree as a node graph in 2D or 3D. http://np
阅读全文
摘要:Non-matching values for modulus and p*q in RSA encryption 回答 The problem is that reversing the arrays is not enough. Because they are unsigned they al
阅读全文
摘要:RSAParameters Struct Remarks The RSA class exposes an ExportParameters method that enables you to retrieve the raw RSA key in the form of an RSAParame
阅读全文
摘要:RSA Algorithm Example http://www.ruanyifeng.com/blog/2013/07/rsa_algorithm_part_two.html 阮一峰也举了例子进行推导 Choose p = 3 and q = 11 Compute n = p * q = 3 *
阅读全文
摘要:关于增值税发票综合服务平台等事项的公告 国家税务总局公告2020年第1号 二、纳税人通过增值税电子发票公共服务平台开具的增值税电子普通发票(票样见附件),属于税务机关监制的发票,采用电子签名代替发票专用章,其法律效力、基本用途、基本使用规定等与增值税普通发票相同。 增值税电子普通发票版式文件格式为O
阅读全文
摘要:Rebasing a Git merge commit 问题 评论 TL;DR: git rebase --preserve-merges origin/master – Ilia K. Mar 1 '12 at 7:38 Warning: starting with Git 2.18 (Q2 20
阅读全文
摘要:RSA Private Key Encryption RSA Introduction The RSA (Rivest, Shamir, Adleman) encryption algorithm uses two Keys: Private and Public. Scenario A Suppo
阅读全文
摘要:核心概念还是, 公钥加密的东西,可以使用私钥解密。 而反过来,私钥加密的东西,也可以用公钥进行解密。 通过hash函数处理文本,得到摘要digest。 然后把摘要digest用私钥进行加密,得到数字签名digital signature。这里加密的目的,是为了防止篡改。(因为如果不把摘要加密,直接发
阅读全文
摘要:Finished (Encrypted Handshake) The Finished message is complicated as it is a hash of all the messages exchanged previously along with a label (“clien
阅读全文
摘要:What if JWT is stolen? I am trying to implement stateless authentication with JWT for my RESTful APIs. AFAIK, JWT is basically an encrypted string pas
阅读全文
摘要:What's the difference between JWTs and Bearer Token? 问题 I'm learning something about Authorization like Basic, Digest, OAuth2.0, JWTs, and Bearer Toke
阅读全文
摘要:What is the default value for enum variable? It is whatever member of the enumeration represents the value 0. Specifically, from the documentation: Th
阅读全文
摘要:StoreName Enum AddressBook 1 The X.509 certificate store for other users. AuthRoot 2 The X.509 certificate store for third-party certificate authoriti
阅读全文
摘要:X509Certificate2.FriendlyName Gets or sets the associated alias for a certificate. Friendly names are properties in the X.509 certificate store that c
阅读全文
摘要:Create a .pfx/.p12 Certificate File Using OpenSSL In cryptography, the PKCS#12 or PFX format is a binary format often used to store all elements of th
阅读全文
摘要:How Certificate Chains Work Solution What is a Certificate Chain? A certificate chain is an ordered list of certificates, containing an SSL/TLS Certif
阅读全文
摘要:OpenSSL and s_client - why is a private key required from the client? 回答1 Certificates on their own are only public pieces of information. What links
阅读全文
摘要:.p12文件同时包含了证书,私钥,和证书链。安装.p12文件后,情况如下:有三个证书, Here is a simple way to identify where a certificate is a client certificate or not: https://techcommunity
阅读全文
摘要:Client Certificate Authentication (Part 1) Here is a screenshot describing the SSL/TLS Handshake: Client sends CLIENT HELLO as described in the above
阅读全文
摘要:https://datatracker.ietf.org/doc/html/rfc5246 7.3. Handshake Protocol Overview The TLS Handshake Protocol involves the following steps: - Exchange hel
阅读全文
摘要:wireshark抓包之后,过滤语法ip.src==13.230.10.3 or ip.dst==13.230.10.3 13.230.10.3是服务器的ip ip.src==13.230.10.3,用来查看服务器发给客户端的请求 ip.dst==13.230.10.3,用来查看客户端发给服务器的请
阅读全文
摘要:Difference Between Octet and Byte In computing, bit is the basic unit of information. Simply, a bit can be seen as a variable that can take only one o
阅读全文
摘要:Is PBKDF2-HMAC-SHA1 really broken? 回答1 Password hashes need first pre-image resistance and should not cause many collisions among typical passwords (p
阅读全文
摘要:Auto-width of ComboBox's content 回答1 You can't use it directly. Do a trick First iterate through all items of your combobox, check for the width of ev
阅读全文
摘要:Size limit of XML variable in SQL Server 2008 Yes it is the same as I read this. http://msdn.microsoft.com/en-us/library/ms187339.aspx You can store x
阅读全文
摘要:All about locking in SQL Server Locking is essential to successful SQL Server transactions processing and it is designed to allow SQL Server to work s
阅读全文
摘要:Difference between pem, crt, key files Those file names represent different parts of the key generation and verification process. Please note that the
阅读全文
摘要:Does RSA Private key always contain the Public key, or is it just .NET? 回答1 The private key always includes the public key. What you might really want
阅读全文
摘要:Extract public/private key from PKCS12 file for later use in SSH-PK-Authentication 回答1 You can use following commands to extract public/private key fr
阅读全文
摘要:What is PEM Format? Problem What is PEM Format? Solution PEM or Privacy Enhanced Mail is a Base64 encoded DER certificate. PEM certificates are freque
阅读全文
摘要:HttpWebRequest client authentication 回答1 You need to convert your private key and pem certificate into #pkcs12 form: openssl pkcs12 -inkey private.key
阅读全文
摘要:Converting PKCS#12 certificate into PEM using OpenSSL 回答1 Try: openssl pkcs12 -in path.p12 -out newfile.crt.pem -clcerts -nokeys openssl pkcs12 -in pa
阅读全文
摘要:Managing and Categorizing Cookies You can assign Unknown Cookies or update the category of cookies from the Categorizations screen. Many large organiz
阅读全文
摘要:https://community.cookiepro.com/s/article/UUID-730ad441-6c4d-7877-7f85-36f1e801e8ca Cookies themselves cannot be directly blocked; however, most cooki
阅读全文
摘要:OneTrust Cookie Auto-Blocking™ About Auto-Blocking OneTrust Cookie Auto-Blocking can be used to automatically block cookies from being set on site vis
阅读全文
摘要:The Auto Block, blocks my pictures on my website if you click on only necessary cookies, you will not see any pictures on the entire website! I tried
阅读全文
摘要:System.Xml.XmlException: There is no Unicode byte order mark. Cannot switch to Unicode. 传递给函数的路径是Load file C:\workspace\GitHub\ChuckLu\ChuckFork\FatAn
阅读全文
摘要:Use and utility of .p12 certificate/file The .p12 contains both the private and the public key, and also information about the owner (name, email addr
阅读全文
摘要:How is OAuth 2 different from OAuth 1? 回答1 Eran Hammer-Lahav has done an excellent job in explaining the majority of the differences in his article In
阅读全文
摘要:Why OAuth 1.0a? If you've done research on OAuth, you might notice OAuth 2.0 exists. Why is the canonical authorization scheme using an older version
阅读全文
摘要:SlowCheetah - Web.config Transformation Syntax now generalized for any XML configuration file 1.通过NuGet安装https://www.nuget.org/packages/Microsoft.Visu
阅读全文
App.Config Transformation for projects which are not Web Projects in Visual Studio? app.debug.config
摘要:App.Config Transformation for projects which are not Web Projects in Visual Studio? 回答1 I tried several solutions and here is the simplest I personall
阅读全文
摘要:What is the difference between encrypting and signing in asymmetric encryption? 回答1 When encrypting, you use their public key to write a message and t
阅读全文
摘要:2. C 4. A 6. B 9. C 12. 2e^2x dx 13. 1 15. 3/2 16. -2 18. (-√2,√2) 20. 1/2 22. e^x*cosx的二次导数 23. (1-cosx-x^2)/2(sinx)^2在x-->0时的极限 1-cosx=2(sin(x/2))^2
阅读全文
摘要:dotnet-transform-xdt Global tool for .NET Core 2.1 and later .NET Core 2.1 introduces the concept of global tools, meaning that you can install dotnet
阅读全文