current location:Home > Technical Articles > Operation and Maintenance > Safety
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- LocalSend: Free file transfer tool, supports all platforms
- Overview LocalSend is a LAN-based file transfer tool that supports Windows, macOS, Android, iPhone and Linux operating systems. This tool helps users transfer files quickly and securely within the same local area network. LocalSend provides a variety of powerful transmission functions to meet the needs of different users. In addition, the software also supports multiple formats, multi-language environments, shortcut keys and other functions, which can greatly improve users' work efficiency. In this article, we will introduce the various functions of LocalSend in detail. Main function file transfer: LocalSend can quickly transfer files within the same LAN. Users only need to select the files to be transferred, set the transfer target, and start
- Safety 2106 2023-06-08 16:28:12
-
- ZTE new pivot system offline installation ceph 16.2.10
- About ZTE New Pivot System ZTE New Pivot Operating System is based on the Linux stable kernel and is divided into embedded operating system (NewStartCGEL), server operating system (NewStartCGSL), and desktop operating system (NewStartNSDL). After nearly 10 years of accumulation and development by a professional R&D team , the product has the outstanding advantages of security reinforcement, independent controllability, and easy-to-use management. At present, ZTE's new pivot operating system has been put into use in major domestic and foreign telecom operators, state-owned large and medium-sized enterprises and e-government solutions, serving the bottom layer of switching networks, core networks, backbone networks, smart cities, video surveillance and other systems. The above is reproduced from someone. Background Against the background of national digital transformation and localization substitution, especially
- Safety 1351 2023-06-08 15:33:47
-
- What is observability? Everything a beginner needs to know
- The term observability originates from the engineering field and has become increasingly popular in the software development field in recent years. Simply put, observability is the ability to understand the internal state of a system based on external outputs. IBM defines observability as: Generally, observability refers to the degree to which the internal state or condition of a complex system can be understood based on knowledge of its external output. The more observable the system is, the faster and more accurate the process of locating the root cause of a performance issue can be without the need for additional testing or coding. In cloud computing, observability also refers to software tools and practices that aggregate, correlate, and analyze data from distributed application systems and the infrastructure that supports their operation in order to more effectively monitor, troubleshoot, and debug application systems. , thereby achieving customer experience optimization and service level agreement
- Safety 3420 2023-06-08 14:42:09
-
- Operation and maintenance: Have you used any of the commonly used command line clients for Windows?
- For IT operation and maintenance personnel, dealing with commands is essential. Having a useful CMD command line tool is very necessary to improve efficiency. Today I will share with you a commonly used command line client for Windows. I hope It can be helpful to everyone! 1. PowerShell PowerShell is a command line tool that comes with Windows system, with more powerful functions and richer script support. Official documentation: https://docs.microsoft.com/en-us/powershell/. Here are some example commands for you. You can study more interesting commands by yourself. Example of command function Set date and time Set-Da
- Safety 2684 2023-06-08 14:19:26
-
- Google's case study on building static code analysis tools
- Software bugs cost developers and software companies a lot of time and money. In 2014, for example, a ("gotofail") bug in the widely used SSL protocol implementation caused invalid SSL certificates to be accepted, and another bug related to date formatting caused widespread service outages on Twitter. Such errors can often be detected by static analysis. In fact, they can be quickly identified during the reading of code or documentation, and the final reality is that the situation still occurs in the production environment. Previous work has well reported experiences in applying bug detection tools to software development. But while there are so many success stories among developers using static analysis tools, there are still reasons why engineers are not always willing to use static analysis tools.
- Safety 1479 2023-06-05 22:22:59
-
- What are the network devices that Zabbix 3.0 monitors?
- Introduction to SNMP 1 Overview of SNMP SNMP has developed to become the most widely used network management protocol. The currently applied versions mainly include SNMPv1, SNMPv2c and SNMPv3. The main differences between the versions are in the definition of information, the operation of communication protocols and the security mechanism. At the same time, two extensions of SNMP applications, remote network monitoring RMON (Remote Network Monitoring) and RMON2, have also appeared. From the perspective of the physical layer, using SNMP to manage the network should include: network management station (NMS), agent (Agent), and proxy server (proxy). NMS can generate commands and receive notification information. There must be at least one in the network management
- Safety 2311 2023-06-04 08:44:50
-
- What are the benefits of deploying an SSL certificate?
- 1. Definition of SSL certificate An SSL certificate is a server digital certificate that complies with the SSL Secure Socket Layer protocol. The SSL security protocol was originally designed and developed by Netscape Communication Company of the United States. Its full name is: Secure Sockets Layer Protocol (SecureSocketsLayer). It specifies the provision of data between application protocols (such as HTTP, Telnet, FTP) and TCP/IP. The security layered mechanism is a security protocol implemented on the Transport Communication Protocol (TCP/IP). It uses public key technology to provide data encryption, server authentication, message integrity and reliability for TCP/IP connections. Selected client authentication. Since this protocol is well
- Safety 1560 2023-06-03 18:54:27
-
- How to install and use Fiddler
- Introduction to Fiddler ① Fiddler is a powerful packet capture tool. Its principle is to work in the form of a web proxy server. The proxy address used is: 127.0.0.1, port The default is 8888, we can also modify it through settings. ②Proxy is to set up a barrier between the client and the server. After the client sends the request data first, the proxy server will intercept the data packet, and the proxy server will intercept the data packet. The proxy server then pretends to be a client and sends data to the server; similarly, the server will return the response data, and the proxy server will also intercept the data and return it to the client. ③Fiddler can capture support
- Safety 1710 2023-06-03 18:18:37
-
- Solution to USG address mapping problem
- The USG6000 series firewall I use, the situation overview: 1. The internal network address business of accessing the server from the internal network address is normal 2. The public network address business mapped by the external network access server is normal 3. The solution to the exception of the public network address business of the internal network address access server : 1. Whether the firewall server mapping policy is written properly. Do not join the security domain. 2. UNtrust in the security policy -> trust whether to allow access to the server address 3. In the NAT policy, source NAT adds trust to the trust zone to allow normal access to the server address. I failed in the third item, so it caused the intranet The public network address mapped by the address access server is abnormal. Attached is a picture
- Safety 1476 2023-06-03 17:31:04
-
- How to use Masscan, Nmap, and ELK to collect intranet assets
- Install install masscan#yuminstallgitgccmakelibpcap-devel#gitclonehttps://github.com/robertdavidgraham/masscan#cdmasscan#make#cpbin/masscan/bininstall the latest nmap7.8wgethttps://nmap.org/dist/nmap-7.80-1.x86_64 .rpmrpm-ivhnmap-7.80-1.x86_64.rpm install es and kibanadockerrun -d --namees-
- Safety 1254 2023-06-03 15:43:36
-
- What is file sharing in Windows 2008?
- Work task implementation 1. Create users and user groups in "Work Order 2" (only two users can be created for information, sales and financial user groups); (1) Create user groups and users in batches, and add users to user groups (2) Save the desktop, change the extension to .bat, and run (3) Successfully created 2. Create a shared folder named "share" on the C drive, and create a folder with the group name in the folder. , create a folder named after its own name in each folder; (1) Create a shared folder named "share" on the C drive, right-click and properties Advanced Sharing (2) Create a folder named after the group name ( 3) Create a folder with the employee’s name in each folder 3. Ensure that employees in each department are on another computer
- Safety 2123 2023-06-03 15:39:42
-
- What is the Turla organization?
- Turla Organization Overview Turla, also known as Snake, Uroburos, Waterbug, WhiteBear. After being disclosed by GData in 2014, Kaspersky, Symantec, and ESET continued to track and analyze the organization. The malicious files used by the group were compiled as far back as 2011. Through comparison of codes and functions, it can be traced back to 2006 that a malicious file named Agent.BTZ was detected to be associated with this organization. Therefore, it can be inferred that the organization has begun to carry out attacks as early as 2006. The Turla organization uses rootkit technology to monitor computers and complete data theft. This method works on Windows
- Safety 1808 2023-06-03 13:44:29
-
- How to analyze reflected XSS
- 1 Test environment introduction The test environment is the DVWA module in the OWASP environment 2 Test description XSS is also called CSS (CrossSiteScript), a cross-site scripting attack. It refers to a malicious attacker inserting malicious HTML code into a Web page. When a user browses the page, the HTML code embedded in the Web will be executed, thereby achieving the special purpose of maliciously attacking the user, such as obtaining the user's cookie. Navigate to malicious websites, carry attacks and more. This vulnerability could be exploited by an attacker to hijack the session of an authenticated user. After hijacking an authenticated session, the virus originator has all the permissions of that authorized user. 3. Test step: Enter the javascript script code in the input box: al
- Safety 1485 2023-06-03 12:09:12
-
- How to implement MPLS and LDP label distribution
- Experimental requirements: 1. Purpose-based LDP session 2. Control label notification through LDP 3. MPLSLDP inbound label bundling filtering Topology environment description: 1. All interconnection IPs are as shown in the figure 2. The Loopback0 port address of all devices is X.X.X.X/ 32, :mplslabelrange100199mplslabelprotocolldpmplsldprouter-idLoopback
- Safety 1661 2023-06-03 11:32:54
-
- How to use Performance to monitor front-end performance
- Performance.nowPerformance is an API that is indispensable for front-end performance monitoring. It is best to use it after the page is fully loaded, because many values must be obtained after the page is fully loaded. The simplest way is to read various data in the window.onload event. The performance.now() method returns a DOMHighResTimeStamp accurate to milliseconds. According to MDN: This timestamp is not actually highly accurate. In order to reduce security threats like Specter, various browsers round off the value of this type to varying degrees. (Firefox starting with Firefox59
- Safety 1218 2023-06-03 09:02:32