Quantcast
Channel: CodeSection,代码区,数据库(综合) - CodeSec
Browsing all 6262 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Web 版 redis-cli 折腾记

缘起 最近整了个 Go 版redis-cli, 完了之后给同事分享了下。TL 问能否整个 web 版的 redis-cli, 即在网页上命令行式地操作 redis。 回想起有个工具叫 gotty , 能让命令行工具运行在网页上。 网页和后端通过 websocket 的方式实时通信,效果能媲美原生终端操作,非常赞。 至于 gotty 的实现原理,有时间我会单写一篇,这里不展开了。 折腾过程 如果是用...

View Article


Recent MongoDB ransom attacks

Many of you have likely heard that an estimated 27,000 MongoDB databases have had their data removed and held at ransom by hackers . We have received many questions about the news and wanted to...

View Article


Overcast and Docker: test your apps as if you are releasing them to production

I am sure everyone would agree that rare application architecture these days could survive without relying on some kind of data stores (either relational or NoSQL ones), or/and messaging middleware,...

View Article

Image may be NSFW.
Clik here to view.

Starting Flume agents by using the Ambari web interface

The following directions detail the manual installation of software into IBM Open Platform for Apache Hadoop. These directions, and any binaries that may be provided as part of this article (either...

View Article

Strata + Hadoop World is March 13 16, 2017 in San Jose, CA

Strata + Hadoop World 2017 (happening March 13 16 in San Jose) has its strongest program ever. You'll find Business Case Studies and Data-driven Business Management. Sessions on essential topics like...

View Article


Hadoop Weekly Issue #199

08 January 2017 This week's edition is relatively short, but contains some great posts on Hadoop+S3, Hadoop+python, first-class asynchronous processing with Samza, and two new tools for Kafka and...

View Article

Image may be NSFW.
Clik here to view.

MongoDB Attacks Jump From Hundreds to 28,000 In Just Days

Security researchers report a massive uptick in the number of MongoDB databases hijacked and held for ransom. On Monday, researcher Niall Merrigan reported 28,000 misconfigured MongoDB were attacked by...

View Article

Image may be NSFW.
Clik here to view.

27,000 MongoDB servers have their data wiped, receive ransom demand for its...

What's happened? Tens of thousands of unprotected MongoDB databases have been taken hostage by hackers, who have wiped data from company servers and are demanding a ransom be paid for the safe return...

View Article


Image may be NSFW.
Clik here to view.

MongoDB PIT Backups: Part 2

This blog post is the second in a series covering MongoDB PIT backups. You can find the first parthere. ShardingMakes Everything Fun(ner) The first blog post in this series looked at MongoDB backups...

View Article


Image may be NSFW.
Clik here to view.

MongoDB学习(二)常用操作

(尊重劳动成果,转载请注明出处: http://blog.csdn.net/qq_25827845/article/details/54235567 冷血之心的博客) MongoDB常用操作如下: (1)创建数据库,使用命令 use 数据库名称 ,如:usemydb1 use 命令后跟的数据库名,如果存在就进入此数据库,如果不存在就创建,所以这种创建方式又叫隐式创建 注意:使用命令use...

View Article

Image may be NSFW.
Clik here to view.

nosql学习笔记一

nosql已经风风火火发展了好几年了,是时候花大力气学习一下了。今天特意做个笔记。 1,nosql的使用场景。数据快速增长,同时有结构化和非结构化数据,适合云计算,分布式部署,数据快速扩展,适合快速查询等等。 2,nosql的种类和各自用途。一般有4类。 a,文档型。mongodb大家都听的比较多,它就是文档型的nosql数据库,最近都比较流行,使用的比较多。 b,key-value型.redis等...

View Article

Implementing a Scheduler Lock

I was really surprised that there is no Spring-friendly solution that prevents concurrent execution of scheduled Springtasks when deployed to acluster. Since I was not able to find one, I had to...

View Article

剖析twemproxy前言

又是喜闻乐见的新坑,前面的mysql协议,当我在解读go-mysql包的时候,会重新讲到,至于Leetcode的更新会与go语言同步。关于这个redis的新坑,目前打算通过剖析twemproxy源码来间接介绍redis的协议,实现手段等等。下面先介绍一下我们的主角――twemproxy。...

View Article


hadoop-metrics2源码分析

hadoop-metrics2 其实是 hadoop-common 工具包中的一个小模块,它设计了一个完整的metrics使用方案,工作中正好用到了,这里从代码层面分析下其设计思路,并不会贴大段大段的代码 代码分析 hadoop-metrics2 的整个流程都被封装到了 MetricsSystem...

View Article

MongoDB Attack Shows Off Cyber Extortionists' New Tricks

Ransomware operators are diversifying their cyber-extortion toolkit and expanding their range of targets. A cluster of attacks against MongoDB servers that has affected more than half of...

View Article


Image may be NSFW.
Clik here to view.

使用SQL Server连接服务器访问DB2 Server

首先,需要安装Microsoft OLE DB Provider for...

View Article

Image may be NSFW.
Clik here to view.

SQL注入详解(扫盲篇)

SQL注入是比较常见的网络攻击方式之一,它不是利用操作系统的BUG来实现攻击,而是针对程序员编程时的疏忽,通过SQL语句,实现无帐号登录,甚至篡改数据库。下面这篇文中就SQL注入进行一个深入的介绍,感兴趣的朋友们一起来看看吧。SQL注入攻击的总体思路     1.寻找到SQL注入的位置     2.判断服务器类型和后台数据库类型     3.针对不通的服务器和数据库特点进行SQL注入攻击关于 SQL...

View Article


Mybatis查询延迟加载详解及实例

Mybatis查询延迟加载详解及实例1.1     启用延迟加载       Mybatis的延迟加载是针对嵌套查询而言的,是指在进行查询的时候先只查询最外层的SQL,对于内层SQL将在需要使用的时候才查询出来。Mybatis的延迟加载默认是关闭的,即默认是一次就将所有的嵌套SQL一并查了将对象所有的信息都查询出来。开启延迟加载有两种方式。...

View Article

Image may be NSFW.
Clik here to view.

Compose Notes: New alerts for Redis

In early 2016, we introduced the ability to view the Redis slow log in the Compose console . For 2017, we thought we'd make it a little more noticeable. The Redis slow log records any commands which...

View Article

Image may be NSFW.
Clik here to view.

Issue 98: The latest Web operations, scaling, and performance news

How Stack Overflow Plans to Survive The Next DNS Attack Covers things like choosing between and benchmarking different DNS providers and deliberately breaking DNS to measure impact. Mark Henderson How...

View Article
Browsing all 6262 articles
Browse latest View live