One of the usage guides for Erlang Rebar: introductory articleFull-Text Catalogs:Https://github.com/rebar/rebar/wikiThe text of this chapter:https://github.com/rebar/rebar/wiki/Getting-startedRebar is a feature-rich Erlang build tool. For ERLANG/OTP Project compilation, testing, dependency management, package release, etc.Rebar is a self-contained script that you can easily embed into your project. 1 Compiling rebar $ git clone git://github.com/reb
Erlang Rebar Use Guide IV: Dependency ManagementFull-Text Catalogs:Https://github.com/rebar/rebar/wikiThis chapter Links:Https://github.com/rebar/rebar/wiki/Dependency-management1 Rebar Dependency DefinitionsRebar obtains and constructs projects that conform to the Otp/rebar specification. If the project contains sub-projects, rebar will automatically build them recursively.The dependencies of the project are defined in Project_dir/rebar.config, in th
The YubiKey NEOThe YubiKey line of hardware One-time-password (OTP) generators have been on the market for a few years now-in 2010,We looked at the earlier generation of devices if support for them came to Fedora.But since this time, several updates to both the hardware and the software side of YubiKey products had been rolled out,Offering users some additional choices for affordable security tokens.For those unfamiliar with the product line in questi
Communication and garbage collec-Tion happens in each architecture, and extensively discuss the tradeo? S that are involved. In an implementation set-Ting (the Erlang/OTP system) where the rest of the runtime system is unchanged, we present a detailed experimentalComparison between these ubuntures using both synthetic programs and large extends cial products as benchmarks.Note: To sum up one sentence, this article is: what essentially happens when a
The author's blog address: http://blog.sina.com.cn/samzhen1977By Sam (zhufeng)Sam_code@hotmail.com
1. When Bluetooth USBWhen the USB interface is inserted into the dongle, the probe program in Driver/Bluetooth/hci_usb.c is called. PROBE will callHci_register_dev () --> tasklet_init ( hdev-> rx_task,Hci_rx_task, (unsigned long) hdev );Connect hci_rx_task () to rx_task-> func.
2. When Bluetooth USB dongle
the imitation stage, with no core competitiveness and few mature products. The pure shell tools are mainly themida, asprotect and vmprotect, the shell is bound to a Dongle mainly with axprotector of De guoweibu. How can I play Software Encryption in three minutes?
Take step axprotector as an example to learn about the encryption technology and rich functions contained in the latest shell. axprotector is a comprehensive shell tool, supports native e
Author: Zhuang Xiaoli (liigo)
Date: 2011-4-8
Original: http://blog.csdn.net/liigo/archive/2011/04/08/6310677.aspx
Please indicate the source of conversion: http://blog.csdn.net/liigo
Jdprotect looks like the software was not updated for a long time a few years ago. This document does not recommend software, but introduces its usage. Liigo does not evaluate the quality and effect of the software, because I do not know much about it.
Jdprotect is essentially a shelling software, which is similar
Special statement: The software is not mobile phone positioning. Beware of being deceived. Official website: www.cellmap.cnFunction Description:1, Cellmap for PC offline stand-alone query system, is the Cellmap for PC online client upgrade version.2, the offline version has all the features of the online version.3, the offline version can be used without Internet connection.4. The offline version has no limit on the number of uses.5, the offline version of the data coverage is 95%, the data volu
[essay] Old Xie and Google's a positive "confrontation"
One, nonsenseSay Smart TV, domestic LCD TV manufacturers do lead the trend of the times. From a global perspective, after the Google I/O conference a few years ago, there was also a wave of smart TV. The application of Google's Android open system in smart TVs is also beginning to emerge. The development of Google and MediaTek in the direction of smart TV will again push the development of Android Smart TV to another level.
Lao Xi
Old a technology encryption dog replication technology (China) Co., Ltd. "Http://www.old-a.com" is a professional engaged in encryption Dog (LOCK) replication technology products independent development and sales of related work, professional for users to provide encryption Dog (LOCK) replication, software cracking, registration machine development extraction, dog-free patch production , program shelling, software encryption technology and other reverse engineering services company. 13 years of
Original address: http://www.cnblogs.com/wujy/p/3275855.html
We usually in the work will often encounter some of the DLL has been compiled, and more trouble is no source code can be modified, only for the DLL files to be modified to get the results we want; This article will demonstrate an example of how to accomplish a simple change, and we will use the following tools.
1: Anti-compilation Tool ILSpy.exe: is a very good anti-compilation software, and is free of charge;
2: Microsoft's Tool Ildas
Are you still worried about having a safe dog and not adding users? Please refer to the following link for more information ~ In three steps, how can I use guest to obtain the logon permission when the latest server security dog 4.0.05221 account is fully protected ~ The server security dog cannot add users when the account is fully protected. However, it does not restrict the permission to view and modify passwords. This is undeniable, even if you cannot change the password, you can also read t
or VNC through the channel, or access all other common activities from the command line.
In this way, my work session is started. Then, I download and reference the ssh client, quickly install and start them, then, use the SSL-protected password to verify a sshd that is running in the server room.
Please note that I am still vulnerable to attacks from tampered hosts. A fully modified desktop machine or a vigilant "sp" can log on to the SSL database before hitting the key information.This situat
implemented by default.
There is a rebar. config. sample file under the rebar installation path. Studying this file can find many tips for using rebar. For example, the rebar. config code
{Pre_hooks, [{clean, "./prepare_package_files.sh "},
{Compile, "escript generate_headers"}]}.
This is obviously a front hook used to control the rebar sub-command, that is, the prepare_package_files.sh script is executed before the rebar clean sub-command is executed, and the escript generate_headers scrip
Reprinted: https://bitbucket.org/basho/rebar/wiki/Commands
Commands
Rebar provides support for the most commonly encountered DevelopmentActivities, include:
Compilation
Unit testing and coverage analysis
Static analysis (through dialyzerAnd xref).
Documentation generation
Dependency Management
In addition, it allows for OTP embedded system generation, takingAdvantage ofTemplate processing afforded by rebar and the reltool
Application.
The most
the advantages of short design and development cycles, low design and manufacturing costs, advanced development tools, no testing for standard products, stable quality, and real-time online inspection.7. What are the differences between OTP film and mask film?Otpmeans one time program, one-time ProgrammingMtpmeans multi time program, Multiple ProgrammingOTP (one timeprogram) is a memory type of MCU.MCU memory types can be divided into mask (mask) Rom
This chapter should workREL (4),Systools (3)AndScript (4).Release Concept
When one or more applications have been written, we may want to create a complete system composed of these applications and a subset of Erlang/OTP applications.
To achieve this goal, we create a release resource file that defines the applications to be included in the release.
The published resource file is used to generateStart scriptAndRelease package. The system sent and inst
security guard to verify other attributes of the user, it is the traditional password method. If the user needs to provide his/her work permit or key to access the security guard after the password is entered, this is to use all the user's creden for verification. Further, according to regulations, the user must also be a person recognized by the guard before the user can access the website. This is the identity authentication method of the user's biological characteristics. Therefore, all the
1. Create a project folder:mkdir MYAPPCD MyApp2. Download the rebar binary file to the folder of this project.git clone https://github.com/basho/rebar.git;3. Use the rebar template system to build the "skeleton" of our project.Rebar Creat-app Appid=myappAfter this command executes, a subfolder "src" is generated in the project file, which contains three files:Resource files for MYAPP.APP.SRC:OTP applicationsMyapp_app.erl: Application behaviour for an OTP
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.