Q's Blog

Easy Steps to Secure Free Certificates with ACME.sh

1 minute read Published: 2022-07-18

This guide is dedicated to demonstrating how you can obtain free certificates essential for setting up HTTPS websites or configuring trojan proxies. By leveraging the efficiency of the acme.sh tool, you can quickly secure these certificates.

Step-by-Step Trojan Proxy Setup Guide

1 minute read Published: 2022-07-18

In this tutorial, I'll walk you through setting up a Trojan proxy, an effective tool for bypassing network censorship. Trojan-gfw is adept at disguising internet traffic as HTTPS, making it challenging for Internet Service Providers (ISPs) to detect your activities.

Essential Algorithms for Array Manipulation

1 minute read Published: 2022-07-12

Arrays, as foundational data structures in programming, exhibit two key characteristics: zero-based indexing and contiguous memory allocation. This guide explores essential algorithms for manipulating arrays, demonstrating efficient solutions to common problems.

Exploring Time Complexity in Recursive Algorithms

2 minute read Published: 2022-07-08

Recursive algorithms are a fascinating aspect of computer science, often leading to elegant solutions to complex problems. To better understand their time complexity, let's delve into a simple example question.

Docker Installation with Automatic Script

1 minute read Published: 2022-07-07

Docker revolutionizes the way we think about software deployment with its innovative platform-as-a-service (PaaS) model. Utilizing OS-level virtualization, Docker packages software in lightweight, efficient containers, offering a flexible and portable solution for software deployment.