a quick reference to Linux od command
Yesterday my colleague reported a software issue to me. I checked the application logic, but couldn’t find any clue. However, because the software hasn’t been […]
Read More →Yesterday my colleague reported a software issue to me. I checked the application logic, but couldn’t find any clue. However, because the software hasn’t been […]
Read More →Java VM uses a generational garbage collector, which relies on the below two observations: Most allocated objects will become unreachable quickly There are few references […]
Read More →In Oracle, the ‘select’ statement must have a ‘from’ clause. However, some queries don’t require any table. They just perform some operation or calculation based […]
Read More →maven supports parent-child relationship, where the configuration of the parent project is inherited by the child project. This relationship is specified using the <parent> element […]
Read More →Symmetric Key Cryptography is used to transfer a message securely between two endpoints using a shared secret key. The message is encrypted using a shared […]
Read More →In an interview, one may be asked how an security connection is established between two endpoints using TLS protocol. He may answer the below steps: […]
Read More →These days I read a few articles about Transport Layer Security (TLS) protocol. I found two articles that are good enough to dive into the […]
Read More →Today I tried to run foxit reader installer in my Ubuntu Linux as root account. I got the below error message: QXcbConnection: Could not connect […]
Read More →After using ubuntu Linux in my xiaomi laptop for months, I find the password prompt really annoying when I try to switch to root account […]
Read More →To disable a test in junit5, using @Disabled annotation in the class or method definition. For example, @Disabled class SortTest { @Test void sortAscTest() { […]
Read More →