JIYIK CN >

Current Location:Home > Learning >

All

Binary Search Tree Deletion

Publish Date:2025/03/18 Author:JIYIK Category:ALGORITHM

In the article Binary Search Trees: Searching and Inserting , we discussed how to insert an element into a binary search tree and how to search for a value in a binary search tree. In this article, we will discuss how to delete a node from...

Full

In-order descendants in a binary search tree

Publish Date:2025/03/18 Author:JIYIK Category:ALGORITHM

The in-order descendant of a binary tree is the next node in the in-order traversal of the binary tree. So, for the last node in the tree, it is NULL . Since the in-order traversal of a binary search tree is a sorted array. The node with th...

Full

Convert a binary tree to a binary search tree

Publish Date:2025/03/18 Author:JIYIK Category:ALGORITHM

A binary tree is a non-linear data structure. It is called a binary tree because each node has at most two children. These children are called left and right children. It can also be interpreted as an undirected graph where the topmost node...

Full

How to use SFTP to transfer files to a remote server

Publish Date:2025/03/17 Author:JIYIK Category:NETWORK

In the article "How to use SFTP to interact with a remote server" , we introduced how to connect and interact with a server using SFTP. Now let's take a look at how to perform the main operation - file transfer - after the connection is est...

Full

How to use SFTP to interact with a remote server

Publish Date:2025/03/17 Author:JIYIK Category:NETWORK

FTP , or File Transfer Protocol, is a popular, unencrypted method of transferring files between two remote systems. As of 2022, it has been deprecated by most modern software due to its lack of security, and is mostly only used for legacy a...

Full

Deep understanding of Nginx's server block selection algorithm

Publish Date:2025/03/17 Author:JIYIK Category:NETWORK

Nginx is one of the most popular web servers in the world. It can successfully handle high loads with many concurrent client connections and can be used as a web server, mail server, or reverse proxy server. In this article, we will discuss...

Full

8 Ways to Fix NET::ERR_CERT_COMMON_NAME_INVALID Error

Publish Date:2025/03/17 Author:JIYIK Category:NETWORK

8 Ways to Fix NET::ERR_CERT_COMMON_NAME_INVALID Error

Loading websites over the Secure Hypertext Transfer Protocol (HTTPS) is critical to network security. However, if we do not install the Secure Sockets Layer (SSL) certificate correctly, we may encounter many errors such as NET::ERR_CERT_COM...

Full

How to avoid soft 404 in the website during SEO

Publish Date:2025/03/17 Author:JIYIK Category:NETWORK

How to avoid soft 404 in the website during SEO

This article shares an SEO problem, soft 404. A status code we often see on websites is 404. Whether we develop a website or not, this is a problem we have to face. What is a soft 404? Before talking about soft 404, we must first understand...

Full

9 Ways to Fix NET::ERR_CERT_AUTHORITY_INVALID Error

Publish Date:2025/03/17 Author:JIYIK Category:NETWORK

9 Ways to Fix NET::ERR_CERT_AUTHORITY_INVALID Error

Sometimes even after you have an SSL certificate installed on your website, your website’s users may encounter NET::ERR_CERT_AUTHORITY_INVALID an invalid certificate authority error. Despite the intimidating name, the invalid certificate...

Full

OAuth2.0 - Client Credentials Extension Knowledge Points

Publish Date:2025/03/17 Author:JIYIK Category:NETWORK

OAuth2.0 - Client Credentials Extension Knowledge Points

In this article, we will continue with the article on how OAuth2.0 issues access tokens and introduce several related knowledge points involving client credentials: Obtain end-user authorization Authorization Response Error Responses and Er...

Full

OAuth2.0 - How to issue access tokens

Publish Date:2025/03/17 Author:JIYIK Category:NETWORK

OAuth2.0 - How to issue access tokens

In the previous article, we introduced that OAuth2.0 is an authorization mechanism whose main purpose is to issue tokens between websites or applications that want to share resources. Before starting this article, we assume that you have un...

Full

OAuth2.0 - A comprehensive understanding of OAuth2.0

Publish Date:2025/03/17 Author:JIYIK Category:NETWORK

OAuth2.0 - A comprehensive understanding of OAuth2.0

When I first came into contact with OAuth2.0, I often confused it with SSO single sign-on. Later, due to work needs, I implemented a set of SSO in the project. Through my gradual understanding of SSO, I also distinguished it from OAuth2.0....

Full

Scan to Read All Tech Tutorials

Social Media
  • https://www.github.com/onmpw
  • qq:1244347461

Hottest

Tags

Scan the Code
Easier Access Tutorial