Getting Started with PyLoRa: A Python Library for LoRaWAN Communication

MarkDown # Getting Started with PyLoRa: Play with LoRaWAN Communication using Python Hello everyone! Today we will explore a very practical Python library – PyLoRa. This library allows us to easily implement communication functions for LoRaWAN devices using Python, making it particularly suitable for Internet of Things (IoT) development. Even if you are a beginner … Read more

Discussion on Information Security Awareness During Cybersecurity Week: Wi-Fi Security

Discussion on Information Security Awareness During Cybersecurity Week Wi-Fi Security 01 Phishing Wi-Fi Risk Analysis In public places such as restaurants, shopping malls, train stations, and airports, free Wi-Fi hotspots are often deployed. However, attackers may create deceptive Wi-Fi hotspots. Once connected to these malicious hotspots, users may face risks such as information leakage and … Read more

Cultivating Young Makers | The Unmanned Lunar Loading and Unloading System by Haidian Students

New users can click the “blue text” above to follow us “Cultivating Young Makers” is an educational practice aimed at fostering innovation, practical skills, and social responsibility. In recent years, this initiative has focused on the needs of students for innovation and creativity, encouraging young people to actively identify problems in their daily lives, engage … Read more

Bilateral Rehabilitation System Using Bilateral or Unilateral Assistive Robots Developed by Kagawa University Research Team

To treat hemiplegic patients with unilateral paralysis, a bilateral rehabilitation system using bilateral or unilateral assistive robots has been developed. However, the challenge of promoting coordination between bilateral limbs with flexible robot assistance remains to be addressed.The research team at Kagawa University has published a paper titled An EMG‑Based Biomimetic Variable Stiffness Modulation Strategy for … Read more

Detailed Analysis of Buildroot and Yocto Package Dependency Build Mechanisms: Who is Smarter? Who is More Efficient?

In the process of building embedded Linux systems, the “capability to handle package dependencies” is one of the core indicators of the maturity of a build system. Today, we will focus on a detailed topic — how Buildroot and Yocto handle package dependencies? What are their respective advantages and disadvantages? This not only concerns build … Read more

Several Methods to Force Overwrite with the cp Command in Linux Without Prompting

In Linux, the cp command by default prompts for confirmation before overwriting (due to the system alias alias cp=’cp -i’). Here are several methods to force overwrite without prompting: 1. Bypass the alias using a backslash \cp -rf source_file destination_file The backslash \ ignores the alias and directly calls the native cp command, where -rf … Read more

Understanding the Differences Between Linux Commands ‘su’ and ‘sudo’

Understanding the Differences Between Linux Commands ‘su’ and ‘sudo’ Previously, I was confused about the two commands su and sudo. Recently, I specifically searched for information on this topic and finally clarified the relationship and usage of both commands. This article aims to systematically summarize the findings. 1 Preparation Since this blog involves user switching, … Read more

Practical Guide to Network Parameter Tuning in High-Concurrency Linux Scenarios

Practical Guide to Network Parameter Tuning in High-Concurrency Linux Scenarios Table of Contents • Practical Guide to Network Parameter Tuning in High-Concurrency Linux Scenarios • • Introduction • 1. Background: When Concurrent Connections Encounter Performance Bottlenecks • • 1.1 Case Environment • 1.2 Initial Parameter Analysis • 2. In-Depth Diagnosis: Connection Status and Kernel Parameters … Read more

Accessing Local Files Perfectly with WeChat on Linux

Due to personal preference, I have been using Fedora as my desktop system. Although I am not fond of WeChat, it is unavoidable in my work. Currently, the Flatpak version of WeChat for Linux is significantly better than the previous web version. However, I have found that when using it, the Flatpak version does not … Read more

Discussing the Linux Signal Mechanism in .NET Dumps

1. Background 1. Storytelling When a <span>.NET application</span> crashes on Linux, we can configure some references to obtain the corresponding core file. After obtaining the core file, we can open it with windbg, and often see a message like this: <span>Signal SIGABRT code SI_USER (Sent by kill, sigsend, raise)</span>, as shown below: (1.1d): Signal SIGABRT … Read more