Category Archives: Others

Signing commits using GPG in Git

Git is cryptographically secure, but it’s not foolproof. If you’re taking work from others on the internet and want to verify that commits are actually from a trusted source, Git has a few ways to sign and verify work using GPG. Introduction to GPG First of all, if you want to sign anything you need to get GPG configured and your personal key installed. If you don’t have a key installed, you can generate one with gpg --gen-key. Once you have a private key to sign with, you can configure Git to use it for signing things by setting the user.signingkey config setting. Now Git will use your key by default to sign tags and commits if you want. Add…

Continue Reading

Building and Installing HHVM on CentOS 7

What's HHVM? HHVM is an open-source virtual machine designed for executing programs written in Hackand PHP. HHVM uses a just-in-time (JIT) compilation approach to achieve superior performance while maintaining the flexibility that PHP developers are accustomed to. To date, HHVM (and its predecessor HPHPc before it) has realized over a 9x increase in web request throughput and over a 5x reduction in memory consumption for Facebook compared with the PHP 5.2 engine + APC. HHVM runs much of the world’s existing PHP. Developers and hosts are adopting HHVM. We are aware of minor incompatibilities (please open issues when you find them), but we can run the top 20 Github PHP frameworks out of the box. The HHVM team, along with many wonderful community members, has made…

Continue Reading

How to Crack Sublime Text 2 in Ubuntu (Linux)

In this tutorial, I'll tell you how to crack Sublime Text in Linux or Mac. Warning: DO NOT make commercial use of anything. If you believe something on this site has infringed your intellectual property rights, please contact us. What's Sublime Text Sublime Text is a cross-platform text and source code editor, with a Python application programming interface (API). Sublime Text is proprietary software. Its functionality is extendable with plugins. Most of the extending packages have free-software licenses and are community-built and maintained. Sublime Text lacks graphical setting dialogues and is entirely configured by editing text files. How to Get Sublime Text You can get the Sublime Text from http://www.sublimetext.com/.I recommend you to download Sublime Text 2, because Sublime Text…

Continue Reading

Build Tengine, MariaDB and PHP on Ubuntu 14.04

Introduction Nginx is one of the most popular web servers in the world and is responsible for hosting some of the largest and highest-traffic sites on the internet. Tengine is a branch of Nginx which is created by Alibaba Inc. MariaDB is a database server developed by some of the original authors of MySQL, offers drop-in replacement functionality. Prerequisites Before you begin this guide, you should have a regular, non-root user with sudo privileges configured on your server. We will build all components from the source code. Of course, it's OK for you to install them using apt-get command. All steps have been tested on Ubuntu 14.04. Install Tengine Install Required Packages Download and Compile the Source Code Set File…

Continue Reading

Install OS X Yosemite using Clover

Clover is a new and exciting open source EFI bootloader. Developed over the past 3 years by a group of developers at Project OS X led by Slice, Clover aims to solve problems inherent in existing OS X installation methods and legacy bootloaders: Boots troublesome desktop and laptop BIOS/UEFI Uses native OS X installation media Ability to patch DSDT/kernel/kexts at boot time Creates OS X Recovery partition No boot0 error with 4K Advanced Format drives Solves multi-boot issues with Linux and Windows 7/8 Solves traditional bootloader NVRAM issues related to iMessage/FaceTime Clover has a completely different system of configuration with a decidedly steep learning curve. It can be confusing for those who have only ever used the more traditional Chameleon or…

Continue Reading

Consistent Hash Ring

Consistent hashing is a special kind of hashing such that when a hash table is resized and consistent hashing is used, only K/n keys need to be remapped on average, where K is the number of keys, and n is the number of slots. In contrast, in most traditional hash tables, a change in the number of array slots causes nearly all keys to be remapped. Consistent hashing achieves the same goals as Rendezvous hashing (also called HRW Hashing). The two techniques use different algorithms, and were devised independently and contemporaneously. Problem on Distributed Cache The need for consistent hashing arose from limitations experienced while running collections of caching machines - web caches, for example. If you have a collection…

Continue Reading
Contact Us
  • SenseTime Research, Shenzhen Bay Eco-Technology Park
  • cshzxie [at] gmail [dot] com