<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>One of those days</title>
    <link>https://jiaklat.com/</link>
    <description>Recent content on One of those days</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <lastBuildDate>Tue, 30 May 2023 10:25:00 +0800</lastBuildDate><atom:link href="https://jiaklat.com/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Configuring Git Config</title>
      <link>https://jiaklat.com/blog/configuring-git-config/</link>
      <pubDate>Tue, 30 May 2023 10:25:00 +0800</pubDate>
      
      <guid>https://jiaklat.com/blog/configuring-git-config/</guid>
      <description>&lt;p&gt;Git can be configured more than just name and email.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Brief Recall of Private Public Key Rsa</title>
      <link>https://jiaklat.com/blog/brief-recall-of-private-public-key-rsa/</link>
      <pubDate>Sun, 20 Dec 2020 14:16:08 +0800</pubDate>
      
      <guid>https://jiaklat.com/blog/brief-recall-of-private-public-key-rsa/</guid>
      <description>&lt;p&gt;Is part of Public Key Infrastructure (PKI), a type of this is asymmetrical encryption. This is a mathematical trap-door function that enables secure encrypted communication within public-network, preventing eavesdropping.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Proxy and Reverse Proxy Terminology</title>
      <link>https://jiaklat.com/blog/proxy-and-reverse-proxy-terminology/</link>
      <pubDate>Mon, 06 Apr 2020 10:07:18 +0800</pubDate>
      
      <guid>https://jiaklat.com/blog/proxy-and-reverse-proxy-terminology/</guid>
      <description>&lt;p&gt;Proxy and Reverse-Proxy are just networking terminology. It helps to visualize
it as between client and server.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>The Differences Between SSH and VPN</title>
      <link>https://jiaklat.com/blog/the-differences-between-ssh-and-vpn/</link>
      <pubDate>Mon, 06 Apr 2020 09:58:05 +0800</pubDate>
      
      <guid>https://jiaklat.com/blog/the-differences-between-ssh-and-vpn/</guid>
      <description>&lt;p&gt;&lt;strong&gt;S&lt;/strong&gt;ecure &lt;strong&gt;SH&lt;/strong&gt;ell is an application implementation to securely communicate
and give commands to remote host. It work at &lt;em&gt;Application Layer&lt;/em&gt;.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>My Naive Thoughts of CRUD and Chat Systems</title>
      <link>https://jiaklat.com/blog/my-naive-thoughts-of-crud-and-chat-systems/</link>
      <pubDate>Fri, 16 Mar 2018 20:56:09 +0800</pubDate>
      
      <guid>https://jiaklat.com/blog/my-naive-thoughts-of-crud-and-chat-systems/</guid>
      <description>&lt;p&gt;Chatting in real-time invovled server-client communication. For example, PHP web is best for
&lt;strong&gt;C&lt;/strong&gt;reate-&lt;strong&gt;R&lt;/strong&gt;ead-&lt;strong&gt;U&lt;/strong&gt;pdate-&lt;strong&gt;D&lt;/strong&gt;elete operation,
but it is inefficient for chatting, as the client need to pool
against the server for new data periodically. This would not scale for the
server against the growth of user base.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>My Naive Thoughts Four Module of Hadoop</title>
      <link>https://jiaklat.com/blog/my-naive-thoughts-four-module-of-hadoop/</link>
      <pubDate>Thu, 15 Mar 2018 21:03:43 +0800</pubDate>
      
      <guid>https://jiaklat.com/blog/my-naive-thoughts-four-module-of-hadoop/</guid>
      <description>&lt;p&gt;Hadoop: A set of open source programs and procedures which anyone can use as the
&amp;ldquo;backbone&amp;rdquo; of their big data operations.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>About Me</title>
      <link>https://jiaklat.com/about/</link>
      <pubDate>Mon, 06 Feb 2017 20:30:00 +0800</pubDate>
      
      <guid>https://jiaklat.com/about/</guid>
      <description>&lt;p&gt;Every-day life developer experience and over 10 years in home-and-friend-IT-free support, for life :&amp;rsquo;).&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>How Linux handles file permission</title>
      <link>https://jiaklat.com/blog/how-linux-handles-file-permission/</link>
      <pubDate>Mon, 06 Feb 2017 20:30:00 +0800</pubDate>
      
      <guid>https://jiaklat.com/blog/how-linux-handles-file-permission/</guid>
      <description>&lt;p&gt;Linux (also known as GNU/Linux) is a clone of UNIX, the multi-user operating
system which can be accessed by many users simultaneously. Linux can also be
used in mainframes and servers without any modifications (and this attracts
attackers).&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>How to use useradd command</title>
      <link>https://jiaklat.com/blog/how-to-manage-users-in-linux/</link>
      <pubDate>Mon, 06 Feb 2017 20:30:00 +0800</pubDate>
      
      <guid>https://jiaklat.com/blog/how-to-manage-users-in-linux/</guid>
      <description>$ useradd -aG ricky </description>
    </item>
    
  </channel>
</rss>
