- 12 Sep 2022 »
Dive into CRIU (1) - Setup And Dump A Process
First, What is CRIU?
If you are wondering how to do time and space travel inside a Linux containers, then I guess this blog is something you might be interested in.
Checkpoint-Restore in Userspace...
- 04 Jul 2020 »
Passive Activity Classification of Smart Homes
through Wireless Packet Sniffing
This post is to sum up my capstone project for the last semester of my postgraduate. Due to the COV-19 pandemic, I have to study remotely the whole semester, which might also be the possible reason...
- 07 Jun 2020 »
After running rm -rf /* on my Ubuntu Machine
How it happened
A few days ago, I was working on the code of my project assignment. In short, this project is to capture traffic traces of smart IoT devices by passively monitoring, which would ...
- 03 Jan 2020 »
Truffle Private Ethereum
Few days ago, I conducted research on Truffle private Ethereum, here I want to record some of my findings. Truffle packs a private virtual Ethereum for development purposes.
In this study, I focus...
- 18 Dec 2019 »
On Becoming A Barista
Breaking news, I just got my barista certificate yesterday! It is very easy (but not cheap) to get such one though, I have been dreaming about this for a long time.
Yes, I am a coffee nerd. To sta...
- 17 Dec 2019 »
Fungible and Non-Fungible Tokens
Difference between fungible and non-fungible tokens
Nowadays fungible tokens in the blockchain are most used as cryptocurrencies, it is believed that the blockchain economy is actually built on fu...
- 10 Dec 2019 »
Comparison Between Quorum & Hyperledger
This is just something I did for my intern, it’s probably not error-free, I have searched through the Internet for some exact answers though, it seems that there are still ongoing topics remained. ...
- 07 Dec 2019 »
A Simple Record of SSH Brute Force
This just happened two days ago, when I decided to log in my server to see if everything is okay after a very busy month. Since I set up this server just for my subject project, the configuration o...
- 05 Nov 2019 »
Tor Network: Malicious Exit Relay and DNS Resolution
Introduction
In the past few weeks, I have been working on a subject project. In this project, we attempt to monitor and analysis Tor exit relays by detecting the malicious exit relays and looking ...
- 22 Sep 2019 »
Brief Overview on Measurement of Blockchain
Why It Matters
It is not doubted that Blockchain technologies are taking the world by storm. Some of the most remarkable public blockchains, such like Bitcoin and Ethereum, the former establishes ...
- 12 Sep 2019 »
About Concurrency In Python
Why
Emm…I was heading to talk about this little topic(you sure it is a little topic??) few weeks ago, but you know, procrastination. Actually I happened to write an assignment in Python for scann...
- 03 Sep 2019 »
Paper Review - Examining How the Great Firewall Discovers Hidden Circumvention Servers
Examining How the Great Firewall Discovers Hidden Circumvention Servers
Roya Ensafi , David Fifield , Philipp Winter , Nick Feamster , Nicholas Weaver , Vern Paxson, Examining How the Great Firewa...
- 03 Sep 2019 »
Paper Review - Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
Apostolaki Maria, Zohar Aviv, and Vanbever Laurent. “Hijacking Bitcoin: Routing Attacks on Cryptocurrencies”. In: Proceedings of the 2017 IEE...
- 12 May 2019 »
Bad Blood Review: Fake It Till You Make It
This week I have read a very compelling book which I even stayed up for reading it, it’s called Bad Blood: Secrets and Lies in a Silicon Valley Startup by John Carreyrou, this book tells about the...
- 04 May 2019 »
The Innovators by Walter Isaacson review - Why 1984 won't be like 1984
This is an epic with lucid, thrilling and amusing history of the digital age, from Walter Isaacson , a writer who only writes for innovative genius. This is a story that how computers developed fro...
- 21 Apr 2019 »
Emacs Use(1)
Why
The very first reason definately is RMS, inspired by this book Free as in Freedom
. And I am totally moved by RMS, this man might be the only thorough idealist in the world. Thanks to his stu...
- 31 Jan 2019 »
Ethereum Study Note(1) introduction
Why start this series
Glad to finally accomplish my undergraduate thesis of Ethereum topic this year, I spent almost the last 8 months on this project and really studied everything about blockchain...
- 09 Oct 2018 »
Softmax classifier implementation
Introduction
In this post, we are going to build a Softmax classifier to classify fashion MNIST dataset.
Multinomial Logistic Regression
Why
Considering that we are expected to predict a catego...
- 18 Sep 2018 »
Build A Simple Inverted Index Program
Introduction
I’ve benn learning searching algorithms these days and I am introduced some interesting applications based on them, one is to look up index given a set of files. This is also called i...
- 16 Sep 2018 »
About SVM
Introduction
I’ve been studying a course unit called Adcanced Signal Processing with deep learning this semester. Actually, it’s not my first time to learn about SVM, I have built up some basic und...
- 01 Sep 2018 »
This Week I Learnt(1)
Why
I am being quite lazy again to write my blogs these days. Though I know for most time I am just writing them for myself(few persons would read my blog, haha), it’s like to get myself a better...
- 08 Aug 2018 »
Slow and Fast Pointer in LinkedList
Slow pointer and fast pointer are simply the names given to two pointer variables.
Slow Pointer
Travels the linked list one node at a time
Fast Pointer
Travels the linked list two nodes at a time....
- 04 Aug 2018 »
Observer Effect
Observe him.
Get to know everything about him.
And be sure of nothing about him.
Stalk him,
Attract him,
Support him,
Judge him,
Challenge everything he believes in,
Sacrifice everything for what...
- 17 Jul 2018 »
Feynman Algorithm
Write down the problem.
Think real hard.
Write down the solution.
Ok.
- 15 Jul 2018 »
Dijkstra's Algorithm
What is it for?
To find the shortest paths between nodes in graph.
Use cases
Road Network
Package routing
Social network analysis
Game Development
More……
Algorithm in Python
First, se...
- 14 Jul 2018 »
What is IoTA and Why we need it
IoTA
Why is IoTA
With bitcoin becoming booming in the past six year, Blockchain as Bitcoin’s underlying core technology has attracted the attentions from the world and proved its amazing real-world...
- 13 Jul 2018 »
Notes for Software Quality Engineering
Software Quality Engineering
What is software quality?
the process to guarantee that a software product does the right things, but also to guarantee that the product does things right.
Software...
- 11 Jul 2018 »
Notes for IoT
IoT Critical Infrastructure
Fundamental
What is IoT?
A world wide network of uniquely addressable interconnected objects, based on the same communication standard
IoT Key Components
s...
- 29 Jun 2018 »
Notes for the introduction of AI
AI Introduction
What is AI
Problem solving and search
Game playing
Why in AI
Can be represented as search problems easily
What Characteristics
Deterministic VS chance
Perfect VS imperf...
- 13 May 2018 »
How to build Go implementation of Ethereum locally
This post would show how I build go-ethereum on my Win10 computer, and if you are interested in build, develop, debug, submit a bug report or pull request or contribute code to go-ethereum, you ca...
- 14 Apr 2018 »
How To Run Raspberry Pi 3B with MATLAB.
What you need to prepare
Software
MATLAB 2016B or higher version
Simulink 2016B or higher version
Hardware
A Host PC
Raspberry Pi 3B
USB cable
Ethernet cable
What you need to kn...
- 01 Aug 2017 »
Launches Site
Well. Finally got around to putting this old website together. Neat thing about it - powered by Jekyll and I can use Markdown to author my posts. It actually is a lot easier than I thought it was g...