How to Get the Last Requests to Apache2 Server?
Algorithms, Blockchain and Cloud
by ACMer
3d ago
The apache server logs the access requests in /var/log/apache2 so we can analyse this log file to find out the last few requests. The following parses the apache2 server logs, and print the requests line by line. It is based on the BASH commands: awk and tail. #!/bin/bash NUMBER_OF_REQUESTS=50 LOG_FILES_PREFIX=/var/log/apache2/access tail -n $NUMBER_OF_REQUESTS $LOG_FILES_PREFIX* | awk -F'"' ' # Ensure the IP address, request, and user agent fields are present $1 ~ /^+\.+\.+\.+/ && $2 ~ /^(GET|POST|HEAD|PUT|DELETE|OPTIONS|PATCH)/ && $6 != "" { split($1, part1, " ") ip = part1 s ..read more
Visit website
Two Windows Tips: Turn Off Delivery Optimization and Tweak Privacy Settings
Algorithms, Blockchain and Cloud
by ACMer
5d ago
The following two features when enabled are the performance killer on Windows. As we navigate the intricacies of our Windows operating systems, ensuring optimal performance and safeguarding our privacy are top priorities. One way to achieve this is by tweaking a few essential settings, particularly focusing on Delivery Optimization and various privacy settings. This blog will guide you through turning off Delivery Optimization and adjusting your privacy settings for a more secure and efficient Windows experience. What is Delivery Optimization? Delivery Optimization is a feature in Windows 10 a ..read more
Visit website
Teaching Kids Programming – Redistribute Items to Boxes (Knapsack Problem, Binary Search Algorithm)
Algorithms, Blockchain and Cloud
by ACMer
6d ago
Teaching Kids Programming: Videos on Data Structures and Algorithms Apple Redistribution into Boxes You are given an array apple of size n and an array capacity of size m. There are n packs where the ith pack contains apple apples. There are m boxes as well, and the ith box has a capacity of capacity apples. Return the minimum number of boxes you need to select to redistribute these n packs of apples into boxes. Note that, apples from the same pack can be distributed into different boxes. Example 1: Input: apple = , capacity = Output: 2 Explanation: Continue Reading » The post Teaching Kids Pr ..read more
Visit website
Beware of the Malicious Transactions on TRON Blockchain
Algorithms, Blockchain and Cloud
by ACMer
1w ago
I have seen such transactions of small amounts. This transaction is suspected to be an attack from an account with the same ending characters as that of the user’s account. Please be cautious of such scams. What are these? When you send assets from A to B, attackers may generate a similar address, C, which closely resembles B (in prefix and/or suffix), and then send you a small amount of assets. The Steem2TRX sent a swap to address B. And the transaction was monitored by attackers, who then decided to send a small transaction from a wallet C that looks Continue Reading » The post Beware of the ..read more
Visit website
The Experience of On-call (Paging) for Amazon Software Engineers
Algorithms, Blockchain and Cloud
by ACMer
3w ago
From 2020 to 2021, I worked as a Software Development Engineer (SDE) at Amazon (AWS = Amazon Web Services). Some say SDE stands for “Someone Does Everything,” and that’s quite accurate. Every SDE at Amazon is responsible for their code from design to testing and must also handle on-call duties periodically. Most Amazon teams consist of 6-8 engineers and a Software Development Manager (SDM), adhering to the “Two Pizza Team” principle. Each Software Engineer (SDE) typically takes an on-call shift every 6-7 weeks, covering a 24/7 schedule for an entire week. During this period, you’re responsible ..read more
Visit website
Introduction to Crypto Defi: Flexi Max (HTX)
Algorithms, Blockchain and Cloud
by ACMer
3w ago
HTX Crypto Exchange has a range of different DeFi Products (De-centralised Finance) and Flexi Max is one of the interest ones. TLDR; you can transfer your Crypto coins (e.g. USDT) and subscript to Flexi Maxi product. After subscription, you can withdraw your funds at any time, however, different rates apply, if you hold your funds longer than 365 days, there is no fees. Compared to Flexible Defis where you can withdraw the funds anytime without any penality, the Flexi Maxi offers a higher interest rates. Compared to Fixed Defis, where you cannot withdraw (redemption) before the mature, Flexi M ..read more
Visit website
Teaching Kids Programming – Introduction to SQL Join Queries (Inner, Left, Right, Full and Cross Joins)
Algorithms, Blockchain and Cloud
by ACMer
1M ago
Teaching Kids Programming: Videos on Data Structures and Algorithms Previously: Teaching Kids Programming – Introduction to SQL and the SELECT We can visualize the Different Types of Joins using the Venn Diagrams, for example, the Inner Joins can be seen as finding the common intersecting parts of two tables: In SQL, joins are used to combine rows from two or more tables based on a related column between them. There are several types of joins. Each type of join serves a different purpose and is used based on the specific requirements of the query. Let’s consider two tables: employees and Conti ..read more
Visit website
The “defer” keyword in GoLang
Algorithms, Blockchain and Cloud
by ACMer
1M ago
In GoLang, the defer keyword is used to ensure that a function call is performed later in a program’s execution, typically for purposes of cleanup. Deferred function calls are executed in last-in-first-out order just before the surrounding function returns. This makes defer especially useful for releasing resources, such as closing a file or unlocking a mutex, which ensures that the cleanup code is run no matter how the function exits. A function being called “defer” is like the “async” but postponed and without the await. It is one of the Asynchronous Programming. Here is a detailed explanati ..read more
Visit website
Best Security Practices for Holding Cryptocurrencies on Exchanges
Algorithms, Blockchain and Cloud
by ACMer
1M ago
Previously, I was scammed about 1355 USDT because I clicked a phishing link that I shouldn’t have. A lesson learned: The Major Security Flaws of Wirex (WirexApp) Exchange In the world of cryptocurrencies, security is paramount. While the decentralized nature of blockchain offers robust protection against many types of fraud, the exchanges where you buy, sell, and hold your digital assets can be vulnerable to hacks and other security breaches. Here’s a comprehensive guide to ensuring your crypto assets remain secure on exchanges. Recently, there were two major incidents where users account have ..read more
Visit website
Review: Keychron K8 Wireless Mechanical Keyboard for Software Engineers
Algorithms, Blockchain and Cloud
by ACMer
1M ago
Use: ZHIHUA for additional 5% discount when you purchase a Keychron keyboard here. I have been in love with the keychron keyboards for years. And recently I have purchased another Keychron keyboard: Keychron K8 Wireless Mechanical Keyboard (US ANSI Layout) × 1 I also have a C2 Keychron Full Keyboard – which happens to have an additional number small keypad compared to K8. In the ever-evolving world of technology, a good keyboard can make a significant difference in productivity and comfort, especially for software engineers who spend countless hours typing. The Keychron K8 Wireless Mechanical ..read more
Visit website

Follow Algorithms, Blockchain and Cloud on FeedSpot

Continue with Google
Continue with Apple
OR