current location:Home > Technical Articles > Operation and Maintenance > Safety
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- Will Chrome block all types of non-HTTPS mixed content downloads?
- This article introduces the relevant content that the new version of Chrome will block the downloading of all types of non-HTTPS mixed content. It has certain reference value and I hope it can help everyone.
- Safety 2898 2020-11-26 16:03:38
-
- 27 recommended information security books
- This article shares information security-related books with everyone, which has certain reference value. I hope it can help everyone.
- Safety 4628 2020-09-17 17:47:26
-
- Introduction to Linux local privilege escalation vulnerability
- Website security tutorial: This article introduces you to the issues related to Linux local privilege escalation vulnerabilities. It has certain reference value and I hope it can help everyone.
- Safety 2211 2020-09-01 16:49:34
-
- What are the methods of port scanning?
- Web server security: Port scanning methods include: 1. nmap detection port; 2. masscan detection port; 3. socket detection port; 4. telnet detection port; 5. nc detection port.
- Safety 13529 2020-08-10 17:19:55
-
- What are the three ways of sql injection?
- There are three ways of sql injection: 1. Numeric injection; when the input parameter is an integer, there may be a numeric injection vulnerability. 2. Character injection; when the input parameter is a string, a character injection vulnerability may exist. 3. Other types (for example: search injection, cookie injection, POST injection, etc.).
- Safety 21382 2020-07-20 16:46:31
-
- What does pseudo-random number mean?
- Pseudo-random numbers are random number sequences calculated from the "[0,1]" uniform distribution using a deterministic algorithm. Pseudo-random numbers are not truly random numbers, but have statistical characteristics similar to random numbers, such as uniformity, independence, etc. Methods for generating pseudo-random numbers include: 1. Direct method, which is generated based on the physical meaning of the distribution function; 2. Reversal method; 3. Acceptance-rejection method.
- Safety 9059 2022-04-07 18:37:34
-
- What harm can be caused by file inclusion vulnerabilities?
- The possible harms caused by file containing vulnerabilities are: 1. The files of the web server are browsed by the outside world, resulting in information leakage; 2. The script is arbitrarily executed, resulting in the website being tampered with. File inclusion vulnerabilities are a common vulnerability affecting web applications that rely on scripts to run.
- Safety 11155 2020-06-29 09:51:01
-
- What are the methods of SQL injection defense?
- SQL injection defense methods include: 1. PreparedStatement; 2. Use regular expressions to filter incoming parameters; 3. String filtering. Among them, using a precompiled statement set is a simple and effective method because it has built-in ability to handle SQL injection.
- Safety 10361 2020-06-29 09:34:24
-
- What does sql injection mean?
- SQL injection means that the user can submit a database query code and obtain certain data that needs to be known based on the results returned by the program. SQL injection attacks are one of the common means used by hackers to attack databases. We can achieve effective protection through database security protection technology.
- Safety 8256 2020-06-29 09:20:26
-
- What are the CSRF defense methods?
- CSRF defense methods include: 1. Verify the HTTP Referer field; 2. Add token to the request address and verify it; 3. Customize attributes in the HTTP header and verify it. CSRF is an attack method that coerces users to perform unintended operations on the web application they are currently logged in to.
- Safety 22329 2020-06-29 09:08:44
-
- What does cross-site request forgery mean?
- Cross-site request forgery, often abbreviated as CSRF or XSRF, is an attack method that coerces users to perform unintentional operations on the web application they are currently logged in to. CSRF takes advantage of the website's trust in the user's web browser.
- Safety 5402 2020-06-28 17:05:14
-
- What are the xss defense measures?
- XSS defense measures: 1. Do not insert untrusted data in allowed locations; 2. Decode HTML before inserting untrusted data into HTML element content; 3. Decode attributes before inserting untrusted data into common HTML attributes; 4. URL decoding before inserting untrusted data into HTML URL attributes.
- Safety 10814 2020-06-28 16:57:35
-
- What are the three major types of cross-site scripting attacks?
- There are three major types of cross-site scripting attacks on XSS: 1. Persistent cross-site; 2. Non-persistent cross-site; 3. DOM cross-site. Persistent cross-site is the most direct type of hazard, and the cross-site code is stored on the server; non-persistent cross-site is a reflective cross-site scripting vulnerability, which is the most common type.
- Safety 13138 2020-06-28 16:48:56
-
- What is a cross-site scripting attack?
- Cross-site scripting attacks, also known as XSS, refer to exploiting website vulnerabilities to maliciously steal information from users. Cross-site scripting attacks are divided into three categories: 1. Persistent cross-site; 2. Non-persistent cross-site; 3. DOM cross-site. Among them, persistent cross-site is the most direct type of harm.
- Safety 6336 2020-06-28 16:34:59
-
- What is a CSRF attack? How to prevent it?
- CSRF attack refers to cross-site request forgery, which means that the attacker performs illegal operations as a legitimate user through site requests. Methods to prevent CSRF attacks: Perform token verification in HTTP requests. If there is no token in the request or the token content is incorrect, it will be considered a CSRF attack and the request will be rejected.
- Safety 4042 2020-06-19 17:31:00