By convention, type parameter names are single, uppercase letters. This stands in sharp contrast to the variable naming conventions that you already know about, and with good reason: Without this convention, it would be difficult to tell the difference between a type variable and an ordinary class or interface name.
The most commonly used type parameter names are:
- E – Element (used extensively by the Java Collections Framework)
- K – Key
- N – Number
- T – Type
- V – Value
- S,U,V etc. – 2nd, 3rd, 4th types
You’ll see these names used throughout the Java SE API and the rest of this lesson.
Source: Generic Types (The Java™ Tutorials > Learning the Java Language > Generics (Updated))
For excessively paranoid client authentication.
Using self-signed certificate.
Create a Certificate Authority root (which represents this server)
Organization & Common Name: Some human identifier for this server CA.
openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
Design patterns are formalized best practices that the programmer can use to solve common problems when designing an application or system. Design patterns can speed up the development process by providing tested, proven development paradigms. Reusing design patterns helps to prevent subtle issues that can cause major problems, and it also improves code readability for coders and architects who are familiar with the patterns.
Source: iluwatar/java-design-patterns: Design patterns implemented in Java
Deeplearning4j is the first commercial-grade, open-source, distributed deep-learning library written for Java and Scala. Integrated with Hadoop and Spark, DL4J is designed to be used in business environments, rather than as a research tool. Skymind is its commercial support arm.Deeplearning4j aims to be cutting-edge plug and play, more convention than configuration, which allows for fast prototyping for non-researchers. DL4J is customizable at scale. Released under the Apache 2.0 license, all derivatives of DL4J belong to their authors.By following the instructions on our Quick Start page, you can run your first examples of trained neural nets in minutes.
Source: Deeplearning4j: Open-source, distributed deep learning for the JVM
In my experience, when wuauserv starts eating memory, the best thing to do is to wait until it finishes installing the updates and then reboot.
If you can’t or aren’t willing to reboot now, you can always reset wuauserv with the following BAT script (right click & run as administrator):
net stop wuauserv
net stop bits
rd /s /q %windir%\softwaredistribution
net start bits
net start wuauserv
Hope it helps.
Source: svchost.exe high memory usage – wuauserv
Syrian ISPs are using sophisticated technologies to monitor and filter traffic. These boxes are DPI (Deep Packet Inspection) and what they do is sniff out every little packet flowing through them to find specific patterns and then they provide their administrator with the option to block traffic that matches these patterns. These boxes are very sophisticated and they don’t just filter traffic by src, dst or port, they filter traffic by the content the packets carry.
Continue reading Bypassing censorship by using obfsproxy and openVPN , SSH Tunnel | Container of Scribbles
OpenSSH to OpenSSL
OpenSSH private keys are directly understable by OpenSSL. You can test for example:
openssl rsa -in ~/.ssh/id_rsa -text
openssl dsa -in ~/.ssh/id_dsa -text
So, you can directly use it to create a certification request:
openssl req -new -key ~/.ssh/id_dsa -out myid.csr
You can also use your ssh key to create a sef-signed certificate:
openssl x509 -req -days 3650 -in myid.csr -signkey ~/.ssh/id_rsa -out myid.crt
Notice I have not found how to manipulate ssh public key with OpenSSL
Continue reading Convert keys between GnuPG, OpenSsh and OpenSSL – Sysmic.org
16% N (nitrogen)
16% P2O5 (fosfat)
16% K2O (kalium oksida)
1.5% MgO (magnesium oksida)
5% CaO (kalsium oksida)