current location:Home > Technical Articles > Operation and Maintenance > Safety
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- How to configure Apache
- Apache's configuration is configured by the httpd.conf file, so the following configuration instructions are modified in the httpd.conf file. Main site configuration (basic configuration) (1) Basic configuration: ServerRoot "/mnt/software/apache2" #The location where your apache software is installed. If no absolute path is specified for other specified directories, the directories are relative to this directory. PidFilelogs/httpd.pid#The process number file location of the first httpd process (the parent process of all other processes). Listen80#The port number that the server listens to. ServerNamewww.cl
- Safety 961 2023-05-12 11:13:19
-
- What is the basic topology used by Ethernet?
- The topology of Ethernet is "bus type"; the topology used by Ethernet is basically bus type. The bus topology uses a single cable trunk as a public transmission medium, and all computers in the network are directly connected to each other through corresponding hardware interfaces and cables. Shared bus; the bus topology needs to ensure that there are no conflicts when data is eventually sent. What is the topology of Ethernet? The topology of Ethernet is "bus type". The topology used by Ethernet is basically a bus type. The bus topology uses a single cable trunk as a public transmission medium, and all computers in the network are directly connected to the shared bus through corresponding hardware interfaces and cables; the bus topology needs to ensure that when data is finally sent There is no conflict. Ethernet is the most common type of computer network in the real world. There are two types of Ethernet:
- Safety 2281 2023-05-12 10:52:12
-
- How to compare crawlergo, rad, burpsuite and awvs crawlers
- Preface I have been writing code recently, which involves web crawling links. I came across this article on Baidu: superSpider. Suddenly I was curious about the capabilities of common crawler tools and crawler modules in scanners, so I came to test it. The main test is a blind crawler handwritten by myself, as well as crawlergo, rad, burpsuiteprov202012, and awvs2019. The handwritten benchmark crawler only grabs the href under the a tag and the src under the script tag; fromurllib.parseimporturlparse, urljoinfrombs4importBeautifulSoupimpor
- Safety 1487 2023-05-12 10:49:13
-
- How to use exp for SQL error injection
- 0x01 Preface Overview The editor discovered another Double data overflow in MySQL. When we get the functions in MySQL, the editor is more interested in the mathematical functions. They should also contain some data types to save values. So the editor ran to test to see which functions would cause overflow errors. Then the editor discovered that when a value greater than 709 is passed, the function exp() will cause an overflow error. mysql>selectexp(709);+-----------------------+|exp(709)|+---------- ------------+|8.218407461554972
- Safety 1772 2023-05-12 10:16:12
-
- What does it mean when dhcp is not enabled?
- Not enabling dhcp means that the computer has not been set to automatically obtain an IP address, causing Internet access errors. The solution is: 1. Press the key combination "win+r" to open the run window, enter "services.msc" and press Enter; 2. After bringing up the service window, find the "DHCPClient" service and double-click it to open it; 3. After opening the dhcp service, change its activation type to automatic and the service status to started, and then press OK to save the settings. What does it mean if dhcp is not enabled? This means that the computer is not set to automatically obtain an IP address, causing Internet access errors. DHCP (Dynamic Host Configuration Protocol) is a network protocol for local area networks. It refers to a range of IP addresses controlled by the server, which can be accessed when the client logs in to the server.
- Safety 6493 2023-05-12 10:16:05
-
- How to analyze and bypass reCAPTCHA verification during Tumblr user registration process
- Hello everyone, the writeup shared below was discovered by the author during the Tumblr user registration process, and Tumblr's "human-machine authentication" mechanism (reCAPTCHA) is flawed and can be easily bypassed. The security risk caused by this bypass is that malicious attackers can create a large number of fake social accounts and enumerate usernames and emails for the accounts, which indirectly leads to abnormal traffic in the Tumblr website application and even leaks of user information. I share my understanding and experience of vulnerability testing. On June 16 last year, during the hackathon competition held by HackerOne in London, the bounty paid for discovering vulnerabilities exceeded US$80,000. Vulnerability public testing is indeed an industry with a promising future. For public testing platforms, there are organizations that provide bounties
- Safety 2002 2023-05-12 10:04:11
-
- How to reproduce the RCE vulnerability of unauthorized access to the XXL-JOB API interface
- XXL-JOB Description XXL-JOB is a lightweight distributed task scheduling platform. Its core design goals are rapid development, easy learning, lightweight, and easy expansion. The source code is now open and connected to the online product lines of many companies, ready to use out of the box. 1. Vulnerability details The core issue of this vulnerability is GLUE mode. XXL-JOB supports multi-language and script tasks through "GLUE mode". The task features of this mode are as follows: ●Multi-language support: supports Java, Shell, Python, NodeJS, PHP, PowerShell... and other types. ●WebIDE: Tasks are maintained in the dispatch center in source code mode and support online development and maintenance through WebIDE. ●Dynamic effective: user online communication
- Safety 5257 2023-05-12 09:37:05
-
- How to perform security configuration to turn off detailed content display on iis error page
- For web security, prevent *** from obtaining useful information through web error page information, turn off the iis error page to display detailed content 1. Open the iis function view, open the error page, click Edit function, set the default to detailed error, select custom error
- Safety 1502 2023-05-12 09:28:13
-
- How to analyze double check locking in JAVA language
- 1. Double-check locking In program development, sometimes it is necessary to postpone some high-cost object initialization operations and only initialize them when these objects are used. In this case, double-check locking can be used to delay object initialization operations. Double-check locking is a software design pattern designed to reduce competition and synchronization overhead in concurrent systems. Based on the ordinary singleton pattern, it first determines whether the object has been initialized, and then decides whether to lock it. Although double-checked locking solves the error-prone and thread-unsafe problems of ordinary singleton patterns in multi-threaded environments, there are still some hidden dangers. The following takes the JAVA language source code as an example to analyze the causes and repair methods of double-check locking defects. 2. The dangers of double-check locking Double-check locking is
- Safety 1310 2023-05-12 08:55:17
-
- How to conduct web penetration skills analysis
- Currently, with the continuous development of information networks, people's awareness of information security is increasing day by day, and the security protection measures of information systems are also gradually improved. Firewalls are usually deployed at the Internet boundary of the server to isolate internal and external networks, and only the server ports required by the outside are exposed. Adopting this measure can greatly improve the security level of the information system. For external attackers, it is like closing all irrelevant channels, leaving only a necessary entrance. But in this state, there is still a type of security problem that cannot be avoided, and that is web vulnerabilities. The reason is that the user's input characters are not strictly filtered when the program is written, allowing hackers to carefully construct a malicious string to achieve their own goals. So, how can we find out whether there are such security issues?
- Safety 947 2023-05-12 08:34:14
-
- How to analyze APP testing and process
- In my current work, testing App will involve the following aspects: client, applet, h6 page, etc., which may seem different but are quite different. Click to add a picture description (up to 60 words) 1. Function module test: The most important thing about function module test is to examine the tester’s logical thinking ability and understanding of requirements, as well as some page interactivity, input and output considerations, etc., so The above three are common and there is not much difference. 2. Permission management: 1) Similarities: It is necessary to consider the situations where permissions are allowed and the situations where permissions are not allowed; it is necessary to test more pages without system permissions 2) Differences: When testing the App, it is necessary to consider whether the user can access mobile communications, photo albums, Camera, storage space and other permissions, what will happen when the permissions are turned off. Is the mini program
- Safety 1528 2023-05-12 08:07:05
-
- What are the 6 common reasons why apps crash?
- People hate app crashes, especially if they slow down or freeze for a few seconds. According to a survey by DimensionalResearch, 61% of users expect programs to launch within 4 seconds, and 49% expect input to respond within 2 seconds. If the app crashes, freezes or reports an error, 53% of users will uninstall the app. Whether your target is consumers or businesses, crash issues can turn them off completely. I spoke to some mobile developers and asked them what the most common crash issues they encountered were, and they came up with six common causes: 1. Memory Management Everyone I asked talked about memory management, Most apps will start many threads to occupy the system's memory. OpsC
- Safety 2697 2023-05-11 23:25:24
-
- Explanation of how to perform sql injection code
- The SQL query code for login verification of a certain website is: 1
- Safety 900 2023-05-11 23:19:15
-
- How ATS implements caching strategies to increase dynamic service throughput
- First, let’s take a look at the traffic diagram immediately after the policy adjustment: In order to improve the user experience, increase the cache amplification ratio, and avoid customer reports, we have taken great pains when doing the cache, separating large files from small files, and in small files. By separating dynamic content and static content, basically everything that can be stored has been saved. Only dynamic content has not been started. According to the previous strategy, dynamic content is directly proxied, with 1:1 entry and exit, but some bureaus just won’t stop. , if you have to reach a certain magnification ratio, if there is no folding, just use the knife in the dynamic content. Before going under the knife, I did an analysis first and did a lot of testing on the dynamic content that could be stored and the ATS caching strategy, which benefited a lot. The current caching strategy of ATS fully complies with the http protocol and adopts the most conservative caching method.
- Safety 1081 2023-05-11 23:16:10
-
- What is the workflow of website development?
- The first step is to conduct needs analysis. When a customer asks what kind of website they want to build, we must understand the customer's needs and conduct a needs analysis. Some people may ask: demand analysis, what is analyzed? For example: What type of website does the customer want to build? What is the style like? Are there any specific requirements? and server space requirements. The second step is to redefine the needs analysis of the website sketch, and plan the content section sketch of the website based on the user needs analysis. Commonly known as: website sketch. The third step is the art design stage, and then based on the website sketch, the artist will make a rendering. Just like building a house, you first draw the renderings and then start building the house. The same is true for the website. Step 4: In the program development stage, according to the page structure and design, the front-end and back-end can be developed at the same time.
- Safety 1762 2023-05-11 23:16:04