In general, the server and client servers should be in the same intranet, so the Crown Cash agent can not be called by the interface, just to ensure that the service side is not access to the external network. Of course, it can be simple, the use of the client call timestamp encryption, and the time stamp and ciphertext sent to the server, with the same encryption algorithm on the time stamp encryption, the ciphertext comparison to verify.
Knowing where to recycle the memory, we also need to know what kind of objects can be recycled, or need to be recycled, these objects we call dead objects. So what are the objects that are dead? We say that when an object does not have any references, it can be said that the object is dead.
So when did this object not have any references?
Some places say that you can use the reference counting algorithm to determine whether an object is still alive, the reference counting algorithm is to add a reference counter to the object, whenever a place to reference it to add 1, the reference is invalidated by 1, the value of the counter to 0 said that the object does not have any references, but there is a very serious problem , which is the problem of circular referencing.
It's all about change. It's not very convenient to find bulk replacements.