current location:Home > Technical Articles > Operation and Maintenance > Safety

  • How to solve Ulimit faults
    How to solve Ulimit faults
    I encountered a very interesting problem recently. There is a group of HAProxy that has frequent problems. Log in to the server and check the CPU, memory, network, and IO. It was eventually discovered that there were more than 60,000 connections in the TIME_WAIT state on the machine. The TIME_WAIT state generally appears on proxy machines such as HAProxy and Nginx, mainly due to frequent active shutdowns. By modifying the reuse and recycling parameters, the problem can be solved relatively quickly. The statistics of network status can be calculated using the following command. netstat-ant|awk'/^tcp/{++S[$NF]}END{for(ainS
    Safety 1660 2023-05-16 15:39:09
  • What are the encryption algorithms commonly used on the web?
    What are the encryption algorithms commonly used on the web?
    Encryption algorithms can be divided into: reversible encryption and irreversible encryption, and reversible encryption can be divided into: symmetric encryption and asymmetric encryption. 1. Irreversible Encryption Common irreversible encryption algorithms include MD5, HMAC, SHA1, SHA-224, SHA-256, SHA-384, and SHA-512, among which SHA-224, SHA-256, SHA-384, and SHA-512 We can collectively call it the SHA2 encryption algorithm. The SHA encryption algorithm is more secure than MD5, and the SHA2 encryption algorithm is higher than SHA1. The number after SHA represents the length of the encrypted string. SHA1 will generate a 160-bit information digest by default. The most irreversible encryption algorithm
    Safety 1944 2023-05-16 14:43:12
  • What is the mastering procedure for 28BYJ-48 stepper motor?
    What is the mastering procedure for 28BYJ-48 stepper motor?
    Although we have completed the program of using interrupts to control the rotation of the motor, in fact this program still has little practical value. We can't power it on and off every time we want it to rotate, right? Also, it must be able to not only rotate forward but also reverse, that is to say, it must not only be able to rotate around, but it must also be able to rotate back. Okay, let's make an example program. Combined with the key program in Chapter 8, we design a functional program like this: press the numeric keys 1 to 9 to control the motor to rotate 1 to 9 circles; use the up and down keys to change the rotation direction. , press the up key to rotate forward for 1 to 9 turns, and the down key to rotate in the reverse direction for 1 to 9 turns; the left key is fixed to rotate forward 90 degrees, and the right key is fixed to reverse 90 degrees; the Esc key terminates the transition. After this procedure, we can also further obtain
    Safety 968 2023-05-16 14:37:06
  • How to analyze BGP concepts
    How to analyze BGP concepts
    Safety 772 2023-05-16 14:16:06
  • How to use JavaScript to implement screenshot function
    How to use JavaScript to implement screenshot function
    1. The media type of the Blob must be "image/svg+xml" 2. A svg element is required 3. Insert a foreignObject element into the svg element 4. Put HTML that conforms to the specification into the foreignObject element and convert the dom to canvas. That's it. Simple, just a few steps above. The following is a simple demo given in the document: Documentvarcanvas=document.getElementById('canvas');varctx=canvas.getContext(&am
    Safety 2003 2023-05-16 14:07:06
  • How to implement switch WIFI configuration
    How to implement switch WIFI configuration
    A relatively simple WiFi configuration I did recently was responsible for a firewall, a core switch, and a PoE switch. Neither AC nor AP are our responsibility. Let’s talk about the configuration of the firewall first: I won’t talk about the conventional deployment. G1/0/0 of the firewall is connected to the operator, set to the untrust zone, and configure the public IP address provided by the operator, 1.1.1.1G1/0/ 1 Connect to the core switch and set it to the trust zone. Configure the interconnection address security policy with the core switch: rulenametrustTOuntrustsource-zonetrustdestination-zoneuntrustsource-addres
    Safety 1869 2023-05-16 13:58:06
  • How to conduct mobile app security assessment and detection technology analysis
    How to conduct mobile app security assessment and detection technology analysis
    Due to the increasingly developed network technology today, there are also many hidden dangers in the security of Android APPs, which require our constant attention to improve their security. Based on the security of system programs, system data, basic services, and application vulnerabilities, people continue to improve and form a more secure, stable, and complete mobile APP monitoring system to ensure the security of mobile APPs. It will serve as the primary line of defense for "malicious harm", that is, the first line of defense. This will also increase researchers' consideration of APP security assessment when developing mobile APPs, and help mobile APPs develop better and safer. The key points of protection for the new version of mobile app level protection evaluation are based on the latest level protection mobile Internet security extension standards.
    Safety 1486 2023-05-16 13:52:06
  • How to analyze Google Chrome remote code execution 0Day vulnerability notification
    How to analyze Google Chrome remote code execution 0Day vulnerability notification
    1. Overview On April 13, 2021, Antiy CERT discovered that foreign security researchers released a PoC of a remote code execution 0Day vulnerability in the Google Chrome browser. Attackers can use the vulnerability to construct a specially crafted page, and users accessing the page will cause remote code execution. The vulnerability affects the latest official version of Chrome (89.0.4389.114) and all earlier versions. Antiy CERT followed up and found out that due to the high usage rate of Google Chrome browser in China, this vulnerability has the risk of being exploited by malicious code and spread widely, and the threat level is high. At the same time, Antiy's CERT test found that some other domestic browsers using the Google Chrome kernel are also affected. Currently as
    Safety 935 2023-05-16 12:37:06
  • How to analyze DataSet objects and use them
    How to analyze DataSet objects and use them
    The concept of DataSet object: DataSet object can be regarded as a (Catch), which can retain the data found in the database, and can even temporarily store the entire database. DataSet is the representation of data in memory. DataSet object and data The connection to the source occurs very briefly. We disconnect from the data source immediately after obtaining the data. The connection will not be established until the data is modified or the data in the data source needs to be manipulated. The DataSet object contains a set of DataTable objects and DataRelation objects. DataTable object and use The DataTable object is one of the important objects of DataSet and represents a relational number in memory.
    Safety 1207 2023-05-16 11:55:06
  • What are the dangers of secondary release of C language source code?
    What are the dangers of secondary release of C language source code?
    1. Secondary release. A simple understanding of secondary release is that the memory pointed to by the same pointer is released twice. For C language source code, performing two free() operations on the same pointer may lead to a secondary release. Chapter 3.1 of this article The defect code is a description of such a situation. In the C++ language, improper shallow copy operation is one of the common causes of secondary release. For example: calling the assignment operator or copy constructor once will cause the data members of the two objects to point to the same dynamic memory. At this time, the reference counting mechanism becomes very important. When the reference counting is improper and an object goes out of scope, the destructor will release the memory shared by the two objects. The corresponding data member in another object will point to the memory address that has been released, and when this object
    Safety 2166 2023-05-16 11:37:11
  • Process analysis from entering the URL to the final browser rendering of the page content
    Process analysis from entering the URL to the final browser rendering of the page content
    Prepare: When you enter a URL (such as www.coder.com) in the browser and hit Enter, the first thing the browser needs to do is to obtain the IP address of coder.com. The specific method is to send a UDP packet to DNS server, the DNS server will return the IP of coder.com. At this time, the browser will usually cache the IP address, so that the next visit will be faster. For example, in Chrome, you can view it through chrome://net-internals/#dns. With the server's IP, the browser can initiate an HTTP request, but the HTTPRequest/Response must be in the "virtual" TCP
    Safety 1575 2023-05-16 11:28:12
  • What are the weblogic attack techniques?
    What are the weblogic attack techniques?
    Introduction: Weblogic servers are characterized by large and complex architectures, which are generally difficult for blue teams to defend and are mostly deployed on the external network. Moreover, weblogic's attack cost is relatively low. As long as there is a vulnerability, you can generally directly obtain the root permissions of the target server. During offensive and defensive exercises, it was focused on by all major attacking teams and defenders. Of course, there are more or less problems with various exploit programs currently available on the Internet, including my own tools. So recently, at the request of a friend, I sorted out some attack methods and "perfect" uses. The red team can use it to improve their own tools, and the blue team can use it to write traceability reports. 1. Detect whether there are vulnerabilities in weblogic. Among the information currently published on the Internet, there is no better way to determine whether weblogic has vulnerabilities.
    Safety 1812 2023-05-16 11:16:06
  • How to understand grub password
    How to understand grub password
    The grub password is divided into: whole area password (you need to enter the grub global password to modify the grub label after setting) and menu password (you need to enter the grub menu password to boot the system after setting). If you forget the grub global password, you can enter the rescue mode (rescue, similar to winPE). Reset the grub password. In addition to plain text, the grub password can also use encrypted cipher text. grub encryption tools include: grub-md5-crypt and grub-crypt grub-md5-crypt: MD5 encrypt the password and output grub-crypt: If possible, select the encryption method --md5, --sha-256, --sha-512 ( Default) Edit text
    Safety 1591 2023-05-16 10:13:05
  • What details need to be paid attention to in web testing?
    What details need to be paid attention to in web testing?
    1. Page display part (1) First, pay attention to whether the page can be displayed completely, including whether different browsers can display it completely. In actual tests, it is often found that some pages or pop-up windows on the page cannot be fully displayed (2) Whether the animation effect or font effect can be displayed correctly (3) Whether there are default prompts for some form items, input boxes, input fields, and drop-down boxes on the page, and whether some prompts and some do not prompt (4) There are multiple items in the data list Whether the data is displayed in pages, and whether the page jumps normally after the paging operation. 2. Page resolution: Does the page layout display normally in the resolution mode of 640x400, 600x800 or 1024x768? Is the font too small to be browsed? Or is it too large? ?
    Safety 1497 2023-05-16 09:55:05
  • What is the difference between raid0 and raid1 in windows
    What is the difference between raid0 and raid1 in windows
    The difference between raid0 and raid1 1. Concept 1. RAID0: RAUD0 is the simultaneous writing and reading of multi-disk data groups. 2. RAID1: RAID1 means simultaneous writing and reading of data on multiple disks. 2. Security 1. RAID0: No data backup function and poor security. 2. RAID1: The disks back up each other and have high security. 3. Performance 1. The theoretical read and write speed of RAID0 is X times that of a single disk, where X refers to the number of disks added to the same array. At the same time, the capacity is also X times that of a single disk. 2. The read and write speed of RAID1 is the same as that of a single disk, and the capacity is that of a single disk. Detailed introduction to raid0: RAID0 continuously splits data in units of bits or bytes, reads/writes on multiple disks in parallel, and has high data
    Safety 3040 2023-05-16 09:07:13

Tool Recommendations

jQuery enterprise message form contact code

jQuery enterprise message form contact code is a simple and practical enterprise message form and contact us introduction page code.
form button
2024-02-29

HTML5 MP3 music box playback effects

HTML5 MP3 music box playback special effect is an mp3 music player based on HTML5 css3 to create cute music box emoticons and click the switch button.

HTML5 cool particle animation navigation menu special effects

HTML5 cool particle animation navigation menu special effect is a special effect that changes color when the navigation menu is hovered by the mouse.
Menu navigation
2024-02-29

jQuery visual form drag and drop editing code

jQuery visual form drag and drop editing code is a visual form based on jQuery and bootstrap framework.
form button
2024-02-29

Organic fruit and vegetable supplier web template Bootstrap5

An organic fruit and vegetable supplier web template-Bootstrap5
Bootstrap template
2023-02-03

Bootstrap3 multifunctional data information background management responsive web page template-Novus

Bootstrap3 multifunctional data information background management responsive web page template-Novus
backend template
2023-02-02

Real estate resource service platform web page template Bootstrap5

Real estate resource service platform web page template Bootstrap5
Bootstrap template
2023-02-02

Simple resume information web template Bootstrap4

Simple resume information web template Bootstrap4
Bootstrap template
2023-02-02

Cute summer elements vector material (EPS PNG)

This is a cute summer element vector material, including the sun, sun hat, coconut tree, bikini, airplane, watermelon, ice cream, ice cream, cold drink, swimming ring, flip-flops, pineapple, conch, shell, starfish, crab, Lemons, sunscreen, sunglasses, etc., the materials are provided in EPS and PNG formats, including JPG previews.
PNG material
2024-05-09

Four red 2023 graduation badges vector material (AI EPS PNG)

This is a red 2023 graduation badge vector material, four in total, available in AI, EPS and PNG formats, including JPG preview.
PNG material
2024-02-29

Singing bird and cart filled with flowers design spring banner vector material (AI EPS)

This is a spring banner vector material designed with singing birds and a cart full of flowers. It is available in AI and EPS formats, including JPG preview.
banner picture
2024-02-29

Golden graduation cap vector material (EPS PNG)

This is a golden graduation cap vector material, available in EPS and PNG formats, including JPG preview.
PNG material
2024-02-27

Home Decor Cleaning and Repair Service Company Website Template

Home Decoration Cleaning and Maintenance Service Company Website Template is a website template download suitable for promotional websites that provide home decoration, cleaning, maintenance and other service organizations. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-05-09

Fresh color personal resume guide page template

Fresh color matching personal job application resume guide page template is a personal job search resume work display guide page web template download suitable for fresh color matching style. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-29

Designer Creative Job Resume Web Template

Designer Creative Job Resume Web Template is a downloadable web template for personal job resume display suitable for various designer positions. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28

Modern engineering construction company website template

The modern engineering and construction company website template is a downloadable website template suitable for promotion of the engineering and construction service industry. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28