Raspberry Pi Clash Transparent Proxy (TProxy)

I. Notes In this article, the intranet CIDR is 192.168.0.0/16, that is, all address segment rules and configurations are processed for the current intranet CIDR; clash fake-ip’s CIDR is 198.18.0.0/16, please do not write it wrongly as 192, it is 198. II. Installing Clash The transparent proxy method used in this article does not depend on TUN, so it does not matter if it is an enhanced version, please try

Four Ways to Implement Timed Tasks in PostgreSQL

Database timed tasks can be used to implement regular backups, statistics collection, data aggregation, data cleaning and optimization, etc. PostgreSQL does not provide built-in task scheduling features similar to Oracle, MySQL and Microsoft SQL Sever, so this article introduces you to 4 ways to implement timed tasks in PostgreSQL database. OS Timed Tasks Linux timed tasks (crontab) or Windows Task Scheduler provides us with a traditional way to implement timed

After 8 years, Chrome gets a new logo

Google has recently released the latest version of Chrome Canary, in which Chrome has a “brand new” logo, which is the fourth version of Chrome’s logo since its birth in 2008. Although this is a “new” logo for Chrome in 8 years, you can see that the changes are not too drastic. Even at first glance, you can hardly tell what has changed. So let’s take a look at some of the design details and see what’s different between the new version and the old one.

MariaDB to go public in a shell, already valued at $672 million

MariaDB, an open source database company said, plans to become a public company with the help of Angel Pond Inc. Based in Helsinki, Finland, MariaDB originally emerged as an offshoot of MySQL. This was because the founders of the MySQL project had concerns about its independence after Sun Microsystems acquired MySQL in 2008. MariaDB’s CTO was Michael Widenius, one of the founders of MySQL, and MariaDB was named after Widenius’ youngest daughter.

2022 Technology Trends: C++, Go, Rust Shine, Cybersecurity of Concern

O’Reilly, an online learning platform, has released a new Technology Trends for 2022 report. Based on data generated by the platform from January to September 2021 and compared to the same period in 2020, the report provides a look at trends in the technology industry, with O’Reilly’s user base encompassing millions of developers from more than 100 countries worldwide. The report is based on four specific types of data: search queries, questions posed to the AI engine O’Reilly Answers, resource usage by title, and resource usage by topic.

AMD has developed a "PAN" feature that helps improve Linux performance

AMD open source engineers have come up with a new kernel feature called “PAN” (Process Adaptive autoNUMA), and early data shown by AMD suggests that PAN can help improve the performance of certain workloads on its latest server hardware to some extent. PAN is an adaptive algorithm for calculating AutoNUMA scan periods, as further explained by Bharata B Rao of AMD in the Request for Comments (RFC) Linux Kernel Patch Series:

Android 13 new features revealed: CPU acceleration to improve game loading speed

Developer Mishaal Rahaman broke the news on social media platforms that he found a series of code changes in AOSP that highlight that Google is trying to shorten the CPU frequency by boosting game load times. Specifically, they are developing a new API that will allow games to communicate their current state to the OS. If the game takes time to load, the OS will send a command; the CPU will then run at a higher frequency, thus reducing the game load time.

Common Distributed Protocols and Lgorithms

I will mainly list here the Consistent Hash algorithm, Gossip protocol, QuorumNWR algorithm, PBFT algorithm, PoW algorithm, ZAB protocol, and Paxos will be spoken separately. Consistent Hash Algorithm The Consistent Hash algorithm is designed to solve the migration cost of the Hash algorithm. Taking a 10-node cluster as an example, if you add nodes to the cluster, you need to migrate up to 90.91% of the data if you use

Deploy a Kubernetes cluster

Native Kubernetes Cluster Installation Tool Kubernetes clusters on the cloud, basically all cloud vendors support one-click deployment. The main focus here is on local deployment, or baremetal deployment. The approach presented in this article is suitable for development testing, and there may still be issues with security, stability, long-term availability, and other solutions. kubernetes is a component-based system with a lot of flexibility in the installation process, and many components

Kubernetes Microservices Best Practices

This article introduces a set of “Kubernetes configuration” that I have summarized as my personal “best practices” in the process of using Kubernetes. Most of the content has been tested in an online environment, but there are a few parts that have only been simulated in my head, so please refer to them with caution. A few notes before reading. This document is quite long and includes a lot of

Understanding of non-addressability in Golang

If you haven’t heard of Golang’s not addressable concept, it doesn’t matter, it literally means that you can’t get the address of a value. Let’s start with a simple example. 1 2 3 4 5 6 7 8 package main import "fmt" func main() { m := map[int]string{0: "hello"} fmt.Printf("%p", &m[0]) } m is of type map[int]string and contains only one key-value pair. Printing the address of the value of this key-value pair directly compiles with the error: cannot take the address of m[0] , and cannot get the address of the value in map.

pyroscope: an easy-to-use platform for continuous profiling

Developers often need to track performance bottlenecks in applications in production environments and try to identify the root cause of the bottlenecks. To do this, they typically gather this information through logs. Unfortunately, this approach can be time-consuming and does not provide sufficiently detailed information about the underlying problem. A modern and more advanced approach is to apply and use profiling techniques and tools that highlight the slowest application code and methods that consume most of the resources (such as CPU and memory).

Violation of redistribution SkyWalking, Volcano Engine responds and apologizes

In response to allegations that SkyWalking was redistributed in violation of the Apache 2.0 license, Volcano Engine responded by saying. The person in charge of Volcano Engine said that after receiving feedback from the community, Volcano Engine first investigated the matter and is adding SkyWalking’s copyright statement to the relevant product documentation and distribution SDK, and is contacting developers to apologize. Volcano Engine will strictly follow the open source community norms and conduct a comprehensive self-examination to avoid such problems from happening again.

"I Deleted Linux", Linus Releases Prank README Using GitHub Vulnerability

On January 25, Linus Torvalds submitted a prank README page to the Linux GitHub repository with a note called “delete linux because it sucks”. hey guys its me linus torvalds, author of the smash hit linux. yes its me you can look at the url of the repo and the thingy at the top of the files it proves its 100% me. i deleted linux because i hate it now i think it sucks.

Deno 2021 review: optimizing the core, Node.js compatibility, in preparation for Deno 2

The official Deno blog review gives an overview of the major events and important features added to the project in 2021. The blog mentions that Deno has released 44 versions in 2021 (11 minor updates and 33 patch updates), adding many important features, fixing numerous bugs, and optimizing performance. Deno Deploy In the summer of 2021, Deno Deploy released its first Beta version, a modern serverless cloud built from the ground up by the Deno team that allows users to very quickly deploy JavaScript, TypeScript, and WASM services to data centers around the world.

Android malware not only steals victims' money, but also restores phones to factory settings

The Android malware “Brata” has received a series of updates that, in addition to stealing money from the bank accounts of infected Android devices, allow it to activate a “termination” switch: performing a factory reset to clean up the infected device. “Brata” was first mentioned in a post by security firm Kaspersky, and the malware is mainly It was first mentioned in a [post] by security firm Kaspersky (), where the malware was mainly spread through Google Play, but also through third-party app markets, infected push notifications on websites, or messages delivered through tools such as WhatsApp or SMS.

Google announces abandonment of FLoC, launch of alternative Topics API

FLoC (Federated Learning of Cohorts) is a controversial project launched by Google last year, which replaces the original cookies-based ad tracking by dividing users into different user groups in order to protect users’ privacy while displaying ads. But FLoC has been met with industry resistance since its announcement, with EFF arguing that the project has failed to deliver on Google’s claims of privacy protection. Vivaldi and Brave, browsers that use Chromium, have said they will disable the feature, and GitHub and WordPress will also disable FLoC on their sites.

Vulnerability over 12 years old, affecting all major Linux distributions

A research team at cybersecurity firm Qualys has discovered a memory corruption vulnerability, “PwnKit,” in polkit’s pkexec that makes all major Linux distributions vulnerable to local elevation of authority (LPE) attacks. According to the introduction, Polkit (formerly known as PolicyKit) is a component used to control system-wide privileges in Unix-like operating systems, providing a mechanism for unprivileged processes to communicate with privileged processes. pkexec is a SUID-root program that is installed on every major Linux distribution by default.

Fortune 500 company wrongly finds cURL author to fix lo4j vulnerability

cURL author Daniel Stenberg recently posted a tweet on Twitter, spilling the beans on a recent “funny thing” he encountered “. It started last Friday when Daniel Stenberg received an email from a Fortune 500 company (the screenshot obscures the company name, which will be replaced by XXXX below), in which the person said. At the bottom of the email, the Fortune 500 company listed a series of questions for Daniel Stenberg to answer, including.

Rebuild the ISO image using overlay2 or bind

I was in charge of the PaaS container cloud platform for private deployment related work, so I often deal with some container images, and have some research on container images, and have written many blog articles before. Since I got a new job, I started to be responsible for “hyper-converged products” cluster deployment related work, so I will also come into contact with a lot of mirrors, but this mirror