Android streaming media development! How to design the overall architecture for Android project development? Have got an offer

origin

Shenzhen Tencent Computer System Co., Ltd. was established in November 1998. It is one of the largest Internet integrated service providers in China and one of the Internet companies that serve the most users in China.

Tencent's business is diversified and covers a wide range: social networking, communications, and entertainment are in full bloom. Among them, Tencent QQ is almost everyone's youth, all kinds of bubbles, dress up, is the happiness of youth.

My obsession with Tencent starts with a cracked version of QQ. I got a cracked QQ software by chance at that time from a friend. Even if I don’t have a membership, I can use various themes and bubbles when opening a VIP. So, when I was young and fashionable, I became interested in all kinds of cracked software. And decided to learn to crack software when he grows up.

What is HTTPS?

HTTPS (Hypertext Transfer Protocol based on Secure Socket Layer or HTTP over SSL) is a Web protocol developed by Netscape.

You can also say: HTTPS = HTTP + SSL

HTTPS uses the secure socket layer as a sub-layer on the basis of the HTTP application layer.

Why is HTTPS needed?

Hypertext Transfer Protocol (HTTP) is a protocol used to transmit and receive information over the Internet. HTTP uses a request/response process, so information can be transferred quickly, easily, and accurately between servers. When you visit a Web page, you are using the HTTP protocol, but HTTP is insecure and can easily eavesdrop on the data transmission between you and the Web server. In many cases, sensitive information is transmitted between the client and the server, and unauthorized access needs to be prevented. In order to meet this requirement, Netscape introduced HTTPS, the HTTP protocol based on the Secure Socket Layer.

Similarities between HTTP and HTTPS

In most cases, HTTP and HTTPS are the same, because they both use the same basic protocol, as the HTTP or HTTPS client-browser, set up a connection to the designated port of the Web server. When the server receives a request, it will return a status code and a message. This response may be the request information or an error message indicating a certain error. The system uses the uniform resource locator URI pattern, so resources can be uniquely specified. The only difference between HTTPS and HTTP is the description of a protocol header (https), and everything else is the same.

The difference between HTTP and HTTPS

  1. The HTTP URL starts with http://, and the HTTPS URL starts with https://
  2. HTTP is not secure, but HTTPS is secure
  3. The HTTP standard port is 80, and the HTTPS standard port is 443
  4. In the OSI network model, HTTP works at the application layer, while HTTPS works at the transport layer
  5. HTTP does not need to be encrypted, while HTTPS encrypts the transmitted data
  6. HTTP does not require a certificate, while HTTPS requires an authentication certificate

How does HTTPS work?

When using HTTPS connection, the server requires a public key and a signed certificate.

When using https connection, the server responds to the initial connection and provides the encryption method it supports. In response, the client chooses a connection method, and the client and server exchange certificates to verify each other's identity. After completion, transfer the encrypted information while making sure to use the same key, and then close the connection. In order to provide https connection support, the server must have a public key certificate that contains key information certified by a certificate authority. Most certificates are authorized by a third-party organization to ensure that the certificate is safe.

In other words, HTTPS is the same as HTTP, but with the addition of SSL.

HTTP includes the following actions:

  1. The browser opens a TCP connection
  2. The browser sends an HTTP request to the server
  3. The server sends an HTTP response message to the browser
  4. TCP connection closed

SSL includes the following actions:

  1. Verify server side
  2. Allow the client and server to choose the encryption algorithm and password to ensure that both parties support
  3. Verify client (optional)
  4. Use public key encryption technology to generate shared encrypted data
  5. Create an encrypted SSL connection
  6. Pass the HTTP request based on the SSL connection

When should I use HTTPS?

Bank websites, payment gateways, shopping websites, login pages, emails, and some corporate websites should use HTTPS, such as:

  • PayPal
  • Google AdSense

If a website requires you to fill in your credit card information, first you have to check whether the web page uses https encrypted connection, if not, then please do not enter any sensitive information such as credit card number.

At last

The preferred method of introducting resumes is fast and efficient! Then you can look at it on the hook, boss, Maimai, and street. It is stated on the resume that if you are familiar with any technology, you must be familiar with it, otherwise it will not be very embarrassing to be asked! What project you have done, even if the project volume is not large, you must be familiar with the realization principle! If you are not responsible for the part, you can also see how your colleague achieves it. What would you do if you do it for you? What has been done and what will be the breadth issue depends on the content of the project. But what has been done and what state has been reached is a matter of depth, which has to do with personal learning ability and problem-solving attitude. Large companies look at depth, small companies look at breadth. You will be able to interview for large companies, and will you use what they interview for small companies, that is, job matching.

The interview process must be polite! Even if you feel that the interviewer does not respect you and often interrupts your explanation, or you feel that he is inferior to you and the questions asked lack professionalism, you must also respect him. Who told him to choose you now and wait for you to get the offer Then you choose him.

In addition, it must be slow to describe the problem! Don't talk about it all at once. It seems that you are calm and confident, and you still have time to react to your ideas on how to say better next. Nowadays, there are too many developments that rely on IDEs, so there will be a drawback. When we explain in an interview, it is easy to not know how to read a certain method. This is a flaw... So we must deal with common key class names, method names, and key Read the words accurately, and some interviewers will be impatient and say, "Which one are you talking about?" At this time, we will easily get confused. Correct pronunciation + calm description + nice voice is definitely a plus!

The most important thing is mentality! Mentality! Mentality! Say important things three times! The interview time is very short, and it is still relatively unrealistic for the other party to find out your foundation in a short time. Therefore, sometimes it is also a time to look at the eye. This is still an era of looking at the face.

I hope everyone can find a job that suits them and satisfies them!
If you need the PDF version, you can pick it up on GitHub!

Advanced learning video

Attached: We collected 20 sets of real Android interview questions for first- and second-tier Internet companies  (including BAT, Xiaomi, Huawei, Meituan, Didi) and my own Android review notes (including Android basic knowledge points and Android extensions). Knowledge points, Android source code analysis, summary of design patterns, Gradle knowledge points, summary of common algorithm questions.)

Extended knowledge points, Android source code analysis, summary of design patterns, Gradle knowledge points, summary of common algorithm questions. )

[External link image is being transferred...(img-Aw1OJI6T-1614434463424)]

Guess you like

Origin blog.csdn.net/fanzhang_vip0723/article/details/114194950