自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(45)
  • 资源 (15)
  • 收藏
  • 关注

转载 git flow

http://danielkummer.github.io/git-flow-cheatsheet/index.zh_CN.html

2016-09-27 18:08:29 348

转载 nginx学习

http://www.ha97.com/5194.htmlhttp://wiki.nginx.org/Modules

2015-01-12 23:57:28 564

转载 ubuntu 更新时间

查看时间服务器的时间:# rdate time-b.nist.gov设置时间和时间服务器同步:# rdate -s time-b.nist.gov有什么不明白的, 请 # man rdate下面附送系列时间服务器的列表, 有的不一定可以使用哈time.nist.govtime-b.nist.gov216.118.116.105rdate.darkorb.net202

2015-01-12 15:56:02 611

原创 万万没想到之Java编码的问题

解决方案以及分析参阅: http://www.360doc.com/content/13/0830/14/1073512_310953718.shtml

2014-08-15 21:05:53 1037

原创 第一个开源项目的contribute

我的第一个奉献给了cucumber项目,用途是在html中增加了嵌入式wen'ben'we

2014-07-24 22:24:16 683

原创 配置Octopress

参考:http://janrone.sinaapp.com/topic/4/%E6%80%8E%E4%B9%88%E6%90%AD%E5%BB%BA-octopress-%E5%9C%A8-github注意rake setup_github_pages //配置github项目地址 接下来会提示输入urlEnter the read/write url for your rep

2014-07-24 22:21:15 637

原创 git config配置

[user]name = Bing Weiemail = [email protected][core]autocrlf = inputexcludesfile = c:/Users/biwei/.gitignorefilesignorecase = falsesafecrlf = warn[gui]recentrepo = c:/workspac

2014-04-04 10:49:16 726 1

转载 充分使用多核CPU对大文件进行压缩

Linux下的实现http://www.wumii.com/topbar/wD2JzORN[英文原文:Use multiple CPU Cores with your Linux commands ]Windows下可以使用7z实现http://superuser.com/questions/142021/7-zip-compression-on-multi-cor

2013-10-31 09:42:37 1536

原创 面向接口编程不错的解释

http://baike.baidu.com/view/2493204.htm选择Java接口还是抽象类很多人有过这样的疑问:为什么有的地方必须使用接口而不是抽象类,而在另一些地方,又必须使用抽象类而不是接口呢?或者说,在考虑Java类的一般化问题时,很多人会在接口和抽象类之间犹豫不决,甚至随便选择一种。实际上接口和抽象类的选择不是随心所欲的。要理解接口和抽象类

2013-10-31 09:41:41 592

原创 面试问题的选择

背景信息了解,同时询问有疑惑的地方以及深入挖掘简历中不存在的内容1.      Talk about your last job? What’syour responsibility 2.      How did you perform mobiletest? How about Android?(only list but not mentioned in cv)Not autom

2013-10-30 08:39:39 557

转载 Testing mind map

http://www.ministryoftesting.com/resources/mindmaps/

2013-09-30 20:30:45 628

原创 C指针学习笔记

1. 普通指针int *p2. 数组指针:指向一维数组的指针int (*p)[4]当使用二维数组时,例如int a[3][4]={1,2,3,4,5,6,7,8,9,10,11,12}int *p = a, 则*(p+11) 为12int (*p)[4] = a, 则 *(p+1) 指向a[1][0]的首地址, *(*(p+1)+1)表示a[1][1]当需要二维数组

2013-09-22 19:56:44 562

原创 基于App developer的开发

有个古老的故事讲的是在美国大淘金的时代,一个脑子比较灵光的哥们没有随众人去淘金,而是做起了这些淘金者的生意:卖裤子,这些裤子结实耐磨,然后赚的盆满钵满。相似的,如今Android App developer众多的情况下,这也是一个很大的市场,我们同样可以做他们的生意:提供优质的边缘化服务,让他们集中精力从事他们的核心开发。目前看到最多的就是市场:这是一个很大的东西,百家竞争

2013-09-18 15:40:32 754

转载 使用Robotium & UIAutomator构建基于twitter的测试

需翻墙] 原文地址:http://testdroid.com/testdroid/4737/using-twitter-app-as-an-example-how-to-build-robust-and-reliable-automated-testsUsing Twitter App as an Example: How to Build Robust and Reliabl

2013-09-18 15:05:20 2856

转载 Android自动化程测试框架之Robotium VS. UIAutomator

需翻墙] 原文地址:http://testdroid.com/testdroid/4684/the-pros-and-cons-of-different-android-testing-methods该作者更多文章: http://testdroid.com/author/ville-veikko-helppibitbar-comThe Pros and Cons of Dif

2013-09-18 15:00:06 2670

转载 配置Ruby & ROR

1. 从http://rubyinstaller.org/downloads/下载ruby, 我们使用1.9作为例子2. 同时,下载对应的devkit,这里是DevKit-tdm-32-4.5.2-20111229-1559-sfx.exeRuby 1.8.6 to 1.9.3: tdm-32-4.5.2Ruby 2.0.0: mingw64-32-4.7.2

2013-09-09 14:38:01 1180

转载 [Ruby] 将hex转换成unicode

遇到如下字符串,需要转换成human readable的格式:raw = "两个确认金额框中都必须有数字。例如,如果存款为\xA5 0.03 CNY,您应该输入03。如果存款为\xA5 0.30 CNY,您应该输入30。"方法如下raw_split = raw.split("\\x")text = raw_split[0] + raw_split[1..-1]{ |x| [

2013-08-02 11:32:33 1720

原创 Android自动化测试代码覆盖率统计

折腾了小半天,最后其实很简单使用Android自带的ApiDemos作为例子测试环境:windows1. 进入到ApiDemos目录下cd \samples\android-15\ApiDemos2. 更新build.xmlandroid update project -p ./ --target android-15cd testsandroid upda

2013-07-24 13:58:17 1129

原创 sed使用心得

原始文件内容ABCeeeBluefinAsserts.verifyTrue(true, "25899");BluefinAsserts.verifyTrue(true, "258xY399b");BluefinAsserts.verifyTrue(isFound, "verify xxx");BluefinAsserts.assertTrue(isFound, "V

2013-07-19 12:25:49 702

转载 反编译APK系列之dx的使用

在中,有分析java虚拟机和Davik的差异用到dx来转换.class到.dex,以及dexdump的使用生成Hello.java, 如果有包名com.example,记得加上,实际编译如下:1. 进入到src目录javac com\example\Hello.java2. 拷贝 com及其子目录到dx的目录下,不然会出现无法找到文件的错误,看下面的链接http:/

2013-07-17 18:02:06 1018

转载 从 git rebase squash 恢复

引自:http://www.burtonini.com/wordpress/2012/07/19/recovering-from-a-bad-git-rebase/经测试可用,但是要注意,在选择SHA1值的时候需要用checkout之前的那个比如$ git reflog ... 9f46daa HEAD@{142}: rebase -i (finish): returnin

2013-07-17 15:24:59 1870

原创 Git的进一步研究

1. git blame 熟悉之后,可以试着用git gui blame, 不过命令行参数有些不一样git gui blame [--line=] pathE.g $git gui blame --line=44 src\Test.java2. git reset 熟悉之后,学些使用git cleangit reflog3. git format-patch

2013-06-14 19:19:37 1219

转载 JNI问题

http://www.cnblogs.com/cdiamond/archive/2012/10/31/2747611.html

2013-06-12 21:13:51 520

原创 Git 创建Patch

假设目前我们拥有一个master分支,现在已经在该分支上创建了新的commits,出于某种原因,我们需要把我们新的commits提取出来,并发送给某个需要它的人。下面是实现方法。1.首先查看你的历史记录,确认你需要提取多少个commits,目前我们仅用最新的一个来做演示$ git log --pretty=oneline -14f80ce0bbaa8c8eb9b410fef47c

2013-05-02 11:03:58 1300

原创 Git 恢复单个文件的历史

有时候我们会在一个commit中包含多个文件的修改。但是当只需要恢复其中一个文件的历史的时候,revert就不是那么好用了。以下步骤可以帮你实现这个目的:假设目前repo中有两个文件README 和b.txt现在修改两个文件,同时附加一行内容,均为a。现在我只想恢复b.txt的内容到没有添加a的状态。步骤如下:1. $ git log --pretty=on

2013-04-27 11:02:36 2109

原创 使用Selenium实现图片上传

环境:windows xp, firefox 11.0, selenium 2.0假设我们有一个如下所示的上传按钮可以使用如下代码实现上传Element btn = driver.findElement(By.id('upload'));btn.click();btn.sendKeys([your_img_path])// click 上传或者确认按钮

2013-03-13 16:37:27 905

转载 Android中asset文件夹和raw文件夹区别

http://www.cnblogs.com/leizhenzi/archive/2011/10/18/2216428.html*res/raw和assets的相同点:1.两者目录下的文件在打包后会原封不动的保存在apk包中,不会被编译成二进制。*res/raw和assets的不同点:1.res/raw中的文件会被映射到R.java文件中,访问的

2013-01-21 20:26:26 353

转载 添加Android源码到Eclipse中

参考:http://www.mkyong.com/android/attach-android-source-code-to-eclipse-ide/解决方案参考官方文档 Android source code article,我们需要使用“repo” 下载并且编译全部源码来获得 “android.jar“. 如果你觉得这活工作量太大,你可以使用一款Eclips

2013-01-21 16:53:06 532

原创 [Android] Handler的使用

1. Handler放置在MainThread(UI)线程中示例代码public class MainActivity extends Activity { private final static int CHANGE = 1; private static TextView textView; private static Handler handler = new

2013-01-14 20:59:14 379

原创 在msysgit中使用p4merge(windows版)

1.安装P4merge http://www.perforce.com/perforce/products/merge.html将安装路径加入到PATH变量中2. 打开.gitcofig文件,添加如下内容[diff] tool = p4merge[difftool "p4merge"] external = "p4merge $LOCAL $REMOTE"

2013-01-09 14:22:57 1158

原创 使用adb输入中文字符

由于目前adb shell input 不支持unicode字符输入,因此绕个小弯路实现中文输入链接:https://github.com/bingwei/inputchineseviaadb安装apk文件(可以从pyscript下找到)运行python pyscript/testScript.py试验最终输入的字符将被保存到粘贴板里。原理:使用unic

2012-11-20 17:27:52 10175 3

原创 Ubuntu12.04搭建git server

主要参考http://www.mmncs.com/2011/07/how-to-install-and-setup-a-git-repository-server-using-gitolite-on-linux-ubuntu-11-04-server-and-client/登录服务端,所有操作均可在服务器上完成1. 创建git用户[email protected]$sudo addus

2012-10-25 17:35:19 1213

原创 常用命令整理

1. 搜索包含特定内容的文件find ./ -name "*.py" -exec grep -inH "test" {} \;-i 忽略大小写-n 显示行号-H 显示文件名2. 安装Python包当遇到cannot find vcvarsall.bat的错误时python setup.py build --compiler=mingw32python s

2012-07-03 11:24:30 506

原创 使用ant运行Monkeyrunner测试

注:本文在windows 7下实现,linux用户请自行参考相关路径自行修改1. 了解monkeyrunner运行机制2. 配置build.xml用到的路径------------------------------------------------ANDROID_HOME = "your android sdk path"JAVA_EXT_DIRS

2012-05-30 12:04:37 1721

原创 部署ubuntu + Nginx + uWSGI + web.py

环境:ubuntu10.10(x64), python2.6需要安装:apt-get install build-essential psmisc python2.6-dev libxml2 libxml2-dev python-setuptoolsapt-get install libpcre3-dev build-essential libssl-dev pytho

2012-03-29 18:51:33 2419

原创 做douban客户端时遇到的问题

问题1. 豆瓣认证把oauth包加载上总是报错:Error generating final archive:Found duplicate file for APK:net/oauth/consumer.properties.sample解决办法:把oatuh-1.3.jar包中有两个net/oauth/consumer.properties.sample.删除一个con

2012-03-01 15:34:14 1178

转载 Java 基础题

只对了3道。fthttp://www.indiabix.com/java-programming/language-fundamentals/

2012-02-20 11:34:42 438

原创 手机自动化测试所遇到的问题

文章会继续更新目前只针对Android平台的手机的自动化测试所遇到的情况进行讨论正题1. 测试数据与测试脚本分离,测试数据要便于后期维护。能够读取外部文件,将文件的数据当作变量进行使用。比如添加联系人,1000个联系人的信息存放在外部文件内,需要读取,然后使用脚本依次生成如果支持数据库则更好2. 所用测试工具需要适用于特定平台。例如用于测试iOS的自

2012-02-17 14:15:43 996

原创 百度面试题

看到http://topic.csdn.net/u/20100530/18/5c86b483-7d4c-4335-9ab8-ef8b5a5788a2.html一道百度的题,给定如下的n*n的数字矩阵,每行从左到右是严格递增, 每列的数据也是严格递增1 2 33 5 64 8 9现在要求设计一个算法, 给定一个数k 判断出k是否在这个矩阵中。 描述算法并且给出时间复杂度(

2012-02-17 13:24:45 596

原创 Selenium 更强的查找元素的方法

package demo.skillport;import java.io.File;import java.util.List;import junit.framework.Assert;import org.apache.commons.io.FileUtils;import org.openqa.selenium.By;import org.openqa.selenium.

2011-10-21 10:51:47 1756

探索性测试时间之路

探索性测试的文档,介绍了理论,以及方法和相关工具。可以作为入门读物对探索性测试建立初步的印象。 探索性测试的文档,介绍了理论,以及方法和相关工具。可以作为入门读物对探索性测试建立初步的印象。

2017-09-14

Deep Learning with Keras(书签版)

Deep Learning with Keras 清晰,书签版

2017-06-28

[源码] Android sms备份至Gmail

将sms备份至Gmail 源码 高级选项可进行备份定制

2011-10-24

Android ADT 14.0.0

最新ADT,帮助大家升级到Android4.0

2011-10-19

Unlocking Android 2009

You’ve heard about Android. You’ve read about Android. Now it is time to Unlock Android. Android is the software platform from Google and the Open Handset Alliance that has the potential to revolutionize the global cell phone market. This chapter introduces Android – what it is, and importantly, what it is not. After reading this chapter you will have an understanding of how Android is constructed, how it compares with other offerings in the market, Android’s foundational technologies, and a preview of Android application architecture. The chapter concludes with a simple Android application to get things started quickly. This introductory chapter answers some of the basic questions about what Android is and where it fits. While there are code examples in this chapter, they are not very in-depth – just enough to get a taste for Android application development and to convey the key concepts introduced. Aside from some context-setting discussion in the introductory chapter, this book is about unlocking Android’s capabilities and will hopefully inspire you to join the effort to unlock the latent potential in the cell phone of the very near future.

2010-05-02

professional_android_application_development 第一版

android开发进阶 This book is for anyone interested in creating applications for the Android mobile phone platform. It includes information that will be valuable, whether you’re an experienced mobile developer or making your fi rst foray, via Android, into writing mobile applications. It will help if readers have used mobile phones (particularly phones running Android), but it’s not nec- essary, nor is prior experience in mobile phone development. It’s expected that you’ll have some experi- ence in software development and be familiar with basic development practices. While knowledge of Java is helpful, it’s not a necessity. Chapters 1 and 2 introduce mobile development and contain instructions to get you started in Android. Beyond that, there’s no requirement to read the chapters in order, although a good understanding of the core components described in Chapters 3 through 6 is important before you venture into the remaining chapters. Chapters 7 through 11 cover a variety of optional and advanced functionality and can be read in whatever order interest or need dictates.

2010-03-23

McGraw.Hill - Hacking.Linux.exposed

内含阅读器 很详细的内容 物有所值 Today's world of computing and networking is filled with security- related threats. Although it is always wise to be skeptical about statis- tics, reasonable evidence exists that over 300 million people worldwide now use the Internet. Although most Internet users are scrupulous when they access the Internet, a small percentage is not. Unfortunately, this small percentage has made an extremely disproportionate impact. Unscrupulous users have opened Pandora's box, causing privacy violations, disruption and denial of service, modification of data and systems, and even extortion and hoaxes. Perhaps most tragically, they have undermined many users' enjoyment and confidence as they engage in computing activity.

2010-01-07

McGraw.Hill - Hacking.Exposed.Windows.3rd.Edition.Dec.2007

Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign data of unknown or uncertain integrity. When you click search links, download applications, or configure Internet-facing servers, every line of code through which the data flows is potentially subject to a storm of probing for vulnerable configuration, flawed programming logic, and buggy implementation—even within the confines of a corporate network. Your data and computing resources are worth money in the Web 2.0 economy, and where there’s money, there are people who want to steal it. As the Web has evolved, we’ve also seen the criminals evolve. Ten years ago, the threat was an e-mail-borne macro virus that deleted your data. Five years ago, it was automatically propagating worms that used buffer overflows to enlist computers into distributed denial of service attack networks. Three years ago, the prevalent threat became malware that spreads to your computer when you visit infected websites and that subsequently delivers popup ads and upsells you rogue anti-malware. More recently, malware uses all these propagation techniques to spread into a stealthy distributed network of general-purpose “bots” that serve up your data, perform denial of service, or spew spam. The future is one of targeted malware that is deliberately low-volume and customized for classes of users, specific corporations, or even a single individual. We’ve also seen computer security evolve. Antivirus is everywhere, from the routers on the edge to servers, clients, and soon, mobile devices. Firewalls are equally ubiquitous and lock down unused entry and exit pathways. Operating systems and applications are written with security in mind and are hardened with defense-in-depth measures such as no-execute and address layout randomization. Users can’t access corporate networks without passing health assessments. One thing is clear: there’s no declaration of victory possible in this battle. It’s a constant struggle where winning means keeping the criminals at bay another day. And there’s also no clear cut strategy for success. Security in practice requires risk assessment, and successful risk assessment requires a deep understanding of both the threats and the defensive technologies.

2010-01-07

Hacking: The Art of Exploitation, 2nd Edition 2008

Overview Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. ...

2010-01-07

Professional Rootkits 2007

Providing step-by-step instructions and examples required to produce full-featured, robust rootkits, this book walks you through all of the capabilities of rootkits, the technology they use, and the detection methods to impede their distribution.

2010-01-07

Metasploit

Overview: Why Is Metasploit Here? Metasploit came about primarily to provide a framework for penetration testers to develop exploits.The typical life cycle of a vulnerability and its exploitation is as follows: 1. Discovery A security researcher or the vendor discovers a critical security vulner- ability in the software. 2. Disclosure The security researcher either adheres to a responsible disclosure policy and informs the vendor, or discloses it on a public mailing list. Either way, the vendor needs to come up with a patch for the vulnerability. 3. Analysis The researcher or others across the world begin analyzing the vulnera- bility to determine its exploitability. Can it be exploited? Remotely? Would the exploitation result in remote code execution, or would it simply crash the remote service? What is the length of the exploit code that can be injected? This phase also involves debugging the vulnerable application as malicious input is injected to the vulnerable piece of code. 4. Exploit Development Once the answers to the key questions are determined, the process of developing the exploit begins.This has usually been considered a bit of a black art, requiring an in-depth understanding of the processor’s registers, assembly code, offsets, and payloads.

2010-01-07

Rootkits: Subverting the Windows Kernel

Rootkits will be of interest to any Windows security researcher or security programmer

2010-01-07

Hacker Disassembling Uncovered

This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.

2010-01-07

Hacker Linux Uncovered

Detailed and thorough, this guide demonstrates how to install Linux for the highest security and best performance, how to scan the network and encrypt the traffic, and how to monitor and log the system to detect security problems.

2010-01-07

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除