Notes Bitcoin Reasoning for making bitcoin Anonymous Decentralized money system No trust in the government money system How does this work in a no trust environment?
Use asymmetric encryption scheme like public/private key pairs.
Double spend problem Double spend (make a transaction and then unrecord it and then spend that money again)
How do you solve this? Similar to the consensus problem where everyone must agree on transactions. We canβt use consensus algos like Paxos or RAFT because its not a closed membership situation(no global view of number of servers.)
...
Notes Types of locks -
Write lock Read lock Predicate lock - Lock where multiple rows are locked for reads(WHERE clause) All of these locks are long locks(Meaning all are acquired first and then all are released)(2 Phase locking) If we wanna improve performance(and decrease isolation levels), we can reduce long locks to short locks.
Types of anomalies - Phantom Reads is we do a search condition (using WHERE clause) and then Read1, Write1 and Read2. Read1 =/= Read2. Fuzzy Reads is Read1, Write1 and Read2. Read1 =/= Read2. Dirty Reads is where we can read an uncommitted value of a transaction. Read Skew is where Tx 1 has a write(x) and then read(y) and Tx 2 has a write(y) and then read(x) causing the system to be non-serializable. Write Skew is where Tx 1 has a read(x) and then write(y) and Tx 2 has a read(y) and then write(x) causing the system to be non-serializable.
...
How To Set Correct SSH Directory Permissions in Linux Set Correct SSH Directory Permissions in Linux If you ever encounter errors while trying to SSH into a server, you can set correct ssh directory permissions on the .ssh directory using the chmod command.
# chmod u+rwx,go-rwx ~/.ssh OR # chmod 0700 ~/.ssh If ssh complains of wrong permissions on any of the above files, you can set the correct permissions for any of the files like this:
...