Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
node-memcache78
Advanced tools
- 十八年ERP开发经验 十年云开发经验 十五年股票期货投资经验 十年投资分析平台开发经验
- 18 years ERP development experience + 10 years cloud development experience +15 years stock futures investment experience + 10 years investment analysis platform development experience
- 技术不高 了解业务 擅长解决生产经营实际问题
- Good understanding of business and solid knowledge on Solving practical problems
- 逐步把多年开发优化 并且在一直稳定运行中的项目开源
- Step by Step Open Sources of steady running projects and consistently optimize them.
- 合作 商务 问题 讨论 欢迎联系email:657225485@qq.com qq群:323397913
- Welcome to contact my email : 657225485@qq.com or join QQ group : 323397913 for further discuss and cooperations
- 完整框架 开源改造中 未完成...
- The open source transformation of the total framework has not yet been completed.
框架特色 Frame features
- 稳定:运行数年 二台单核1G机器搞定数千并发
- Stable: running for several years on two 1 core CPU 1G memory machines with thousands of concurrency
- 开发快:几行代码搞定增删查改 线程池
- Fast development:with just a few lines code,you can add, delete, check and change the thread pool
- 效率高:有完善的低代码前后端框架 在框架下开发 1后端可轻松配合4前端以上
- High efficiency: Perfect low code front and back end framework developed under the framework 1 back end can easily match 4 front end above
- 易扩展:业务表与数据表对应 一个目录就是一套小功能 一个文件就是一个数据表
- Easy to expand: business table is corresponding with data table , a directory is a set of small functions , a file is a data table
- 适应强:同时运行在阿里云和腾迅云
- Strong adaptability: running on Ali cloud and Tecent cloud.
- 易调试:可设置追踪某几个用户或某表或某目录的所有调用
- Easy to debug: can be set up to trace a few users or a table or a directory of all calls
- 易学习:十行代码搞定 想装不会都难
- Easy to learn: ten lines of code can be done.
- 易运维:有完善的api调用计数和耗时统计 还有出错微信报警机制
- Easy operation and maintenance: perfect API call count and time consuming statistics, also alarm mechanism on wechat
- 更新快:主要运营中的项目 如有bug或新功能 必然及时更新
- Update quickly: as its main operation projects, will update in time If there is a new bug or new function
- 易重构:一个目录一个小系统 一个版本一个路径 新旧api可长期共存 边开车边换胎
- Easy to refactor: one directory --one system, one path --one version -- old and new APIs can coexist for a long time. you can Changing tires while driving.
- SAAS:同表不同权 完善权限控制 用户只能查询到自己或自己帐套的资料
- SAAS:Users with different rights in the same table can only query their own data or their own account sets.
安装 install
npm i node-memcache78
使用 use for testing, you can see ./test/test.js.
初始化 init
import MemCache78 from "node-memcache78";
let config={host:"127.0.0.1",port:11211}
let memcached78 = new MemCache78(config);
set get
let result =await memcached78.set("testitem", 1, 60);
result=await memcached78.get("testitem")
incr del
let result =await memcached78.incr("testitem");
result=await memcached78.del("testitem")
set get json
let result =await memcached78.tbset("testitemset", {test:1,test2:2},30)
result=await memcached78.tbget("testitemset" )
let test2=result["test2"]
框架简要说明
FAQs
node-memcache78
We found that node-memcache78 demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.