current location:Home > Technical Articles > Operation and Maintenance > Safety

  • What is the relationship between threads and processes
    What is the relationship between threads and processes
    Relationship: 1. A process can have multiple threads, but there is at least one thread; and a thread can only be active within the address space of one process. 2. Resources are allocated to processes, and all threads of the same process share all resources of the process. 3. The CPU is allocated to threads, that is, the threads are actually running on the processor. 4. Threads need to cooperate and synchronize during execution. Threads in different processes must use message communication to achieve synchronization. Process is the basic unit of resource allocation. Thread is the basic unit of CPU scheduling and dispatch. Thread is part of the process. A thread can only belong to one process. A process can have multiple threads, but at least one thread is independent of each process. code and data space (program context), switching between programs is expensive, and threads
    Safety 1146 2023-05-22 22:35:13
  • How to understand LDAP injection
    How to understand LDAP injection
    1. LDAP injection LDAP (Light Directory Access Portocol) is a lightweight directory access protocol based on the X.500 standard. It provides services and protocols for accessing directory databases. It is often used to form directory services with directory databases. The directory is a professional distributed database optimized for query, browsing and search. It organizes data in a tree structure, similar to the file directory in Linux/Unix systems. Data that is not modified frequently, such as public certificates, security keys, and company physical device information, is suitable for storage in the directory. LDAP can be understood as a search protocol, which is similar to SQL and has query syntax, but also has the risk of injection attacks. LDAP injection refers to the client
    Safety 3063 2023-05-22 21:47:13
  • How to analyze intranet, public network and NAT
    How to analyze intranet, public network and NAT
    When we build a weak current monitoring system, we cannot avoid dealing with IP addresses. For example, after cameras, NVRs, servers and other devices are installed, they need to be assigned IPs. Do you know this IP address? Today we will Let’s talk about what are intranet, public network and NAT address translation? 1. Definition of intranet, public network and NAT. Intranet is also called local area network. In terms of scope, intranet is a small part of the network, which generally refers to a specific environment. form a network, such as a network where multiple computers in a family are interconnected, or a large LAN in a school or company. The IPs of the intranet are generally 192.168.1.100, 192.168.0.100, 172.16.1.100&hellip
    Safety 1949 2023-05-22 16:40:50
  • How to perform reverse analysis of SpyNote5.0 Client_APK
    How to perform reverse analysis of SpyNote5.0 Client_APK
    1. What is SpyNote5.0? SpyNote is a tool used to create Android malicious programs. Its functions are eye-catching, including reading contacts, recording, command execution, application management, keylogging, GPS positioning, and more. These functions serve as a link between the previous and the following for the study of Android-side malicious programs. We can have a preliminary understanding of its use through a series of articles, "SpyNote V5.0 graphical tool remote management Android mobile phone tutorial", "Be careful, the Android Trojan tool SpyNote is free!" Remote monitoring is so simple", "Beware, Android remote control (spynote) has been upgraded..." and so on. 2. Prepare tools for SpyNote
    Safety 1304 2023-05-22 16:18:30
  • How to analyze CLDAP protocol Reflection DDoS
    How to analyze CLDAP protocol Reflection DDoS
    Foreword In the first half of 2018, thanks to Memcache’s reflection amplification factor of nearly 50,000, the peak traffic of DDoS has reached an unprecedented new height of 1.7Tbps, which also makes MemcacheReDDoS the backbone of current DDoS. Compared with MemcacheReDDoS, although CLDAPReDDoS exposed by Akamai in 2016 is not as efficient as the former, its 56~70 times amplification factor is still a leader in the DDoS family, so it should also attract attention. 1. CLDAP protocol flaws: Lightweight Directory Access Protocol (LDAP) is defined in RFC2251 (LDAPv3). Since LDAP is based on T
    Safety 1648 2023-05-22 13:13:33
  • How to parse Apache vulnerability recurrence
    How to parse Apache vulnerability recurrence
    Apache parsing vulnerability Vulnerability principle The rule of Apache parsing files is to judge the parsing from right to left. If the suffix is ​​unrecognized file parsing, it will judge from the left. For example, the two suffixes of test.php.owf.rar ".owf" and ".rar" are not recognized and parsed by apache, and apache will parse wooyun.php.owf.rar into php. The vulnerability is in the form of www.xxxx.xxx.com/test.php.xxx Other configuration issues lead to the vulnerability (1) If there is such a line in Apache's conf to configure AddHandlerphp5-script.php, then as long as the file name contains .p
    Safety 1150 2023-05-22 12:10:13
  • Example Analysis of SDN Software-Defined Networking
    Example Analysis of SDN Software-Defined Networking
    SDN software-defined network 1: Dilemmas faced by today's networks The current network is dominated by the TCP/IP protocol, ranging from local area networks to the Internet. The network has changed our lives, but today's network is not a perfect network, and there are various problems. . 1: The TCP/IP protocol system is not static, but as network development problems arise, the existing protocol system has to be patched, making the entire protocol system very bloated. 2: A variety of control protocols are used. Network devices are not only responsible for data forwarding, but also responsible for generating and maintaining control-level forwarding entries. This makes the underlying network control protocol very complex, and the network equipment becomes very complex, making it difficult to deploy uniformly. At the same time, the cost is increased. 3: There is another disadvantage:
    Safety 1081 2023-05-22 11:58:57
  • How to understand Wireshark filtering rules and filtering options
    How to understand Wireshark filtering rules and filtering options
    ip.addr==192.168.6.1 Filter out the packets containing 192.168.6.1 ip.src==192.168.43.137 Filter out the packets with the source IP address 192.168.43.137 ip.dst==192.168 .43.137  Filter out the packets with the destination IP address 192.168.43.137 tcp.port==80  Filter out the 80 port number containing tcp  tcp.src==80  Filter out the 80 port number of the source tcp  tcp.dstport==80 Filter out the 80 port number of the target tcpeth.addr==68:17:
    Safety 1681 2023-05-22 11:19:05
  • What is the method of reverse engineering in Android?
    What is the method of reverse engineering in Android?
    1. Weapon get novice, if you want to use this weapon, you must first open up the meridians. 1.1 Meridians (Environment) 1.Root, mobile phone root, there is no Android without root. Only by opening up the root meridian can we proceed with subsequent operations. 2. Xposed framework installation. If you want to use Xposed as a weapon, you must first be able to pick it up before you can use it. 1.2 weapons xposedBridgeApi-82.jar.jar. This is our weapon, Xiaobai, come on, I will show you the basic use of this weapon. 2. Weapon Demonstration We use Xposed weapons to intercept packageName and then output it. In fact, this weapon can only exert its maximum capabilities when paired with internal strength.
    Safety 1564 2023-05-22 09:55:28
  • How to perform encryption and decryption in OpenSSL basics
    How to perform encryption and decryption in OpenSSL basics
    Speaking of OpenSSL, the first thing to mention is SSL. When we use the Internet every day, I am afraid that no one wants to be monitored by others on the Internet. Therefore, a protocol is needed to protect our network communications. The SSL protocol was developed based on this working background. It can prevent the communication between the user and the server application from being eavesdropped by attackers, and always authenticate the server and optionally authenticate the user. SSL protocols are usually built on top of the reliable Transport Layer Protocol (TCP). The advantage of the SSL protocol is that it is independent of application layer protocols. High-level application layer protocols (such as HTTP, FTP, TELNET, etc.) can be transparently built on the SSL protocol. SSL protocol in application
    Safety 3277 2023-05-22 09:20:06
  • The ttl value of ping briefly determines the operating system categories.
    The ttl value of ping briefly determines the operating system categories.
    The type of some operating systems can often be roughly judged by the ttl value of ping. Here is a summary: The TTL field value of the ICMP echo response of UNIX and UNIX-like operating systems is 255. CompaqTru645.0 The TTL field value of the ICMP echo response is 64. The TTL field value of the ICMP echo response of the Microsoft Windows NT/2K operating system is 128. The TTL field value of the ICMP echo response of the Microsoft Windows 95 operating system is 32. Of course, these ttl values ​​can also be changed. Windows series systems can modify the following key values ​​in the registry. Implementation: [HKEY_LOCAL_MACHINE\system\Curren
    Safety 2435 2023-05-22 09:04:05
  • Can routing be used to defend against ARP spoofing, suppress broadcast storms, and defend against intranet viruses?
    Can routing be used to defend against ARP spoofing, suppress broadcast storms, and defend against intranet viruses?
    The routes mentioned here are those above one thousand yuan, and we won’t talk about those below one thousand yuan. Nowadays, many enterprise routers say they have such a function, but such a function requires a prerequisite, that is, the computer must be directly connected to the router. If it is separated by a switch, these functions will be useless to the computer. Problems such as broadcast storms and ARP spoofing in the LAN are very common problems. They are not big problems, but they are very annoying. It is not difficult to solve broadcast storms, ARP spoofing or network loops. The difficulty lies in how to detect these problems. Recommend the "Buddha Nature" plug-in for our system. The reason why we say "Buddha nature" is because this detection function is based on Internet behavior management and the core of network monitoring data analysis, and only Internet behavior management can do it. It should have been placed in
    Safety 1709 2023-05-22 08:52:33
  • What are the scripting methods for Linux?
    What are the scripting methods for Linux?
    The first line of the code1#!/bin/sh script looks like a comment, but it is not. It specifies which SHELL will be used to execute the next script. The bash, zsh, etc. we usually use are a superset of sh. This script uses sh as the execution shell, which has better portability. code2setenforce02>dev/nullechoSELINUX=disabled>/etc/sysconfig/selinux2>/dev/nullsetenforce is the Linux selinux firewall configuration command, execute setenforce
    Safety 4269 2023-05-22 08:11:59
  • How to solve the pitfalls of using ParallelStream
    How to solve the pitfalls of using ParallelStream
    For example, the following code snippet makes people read it like reading poetry. But if used incorrectly, it can be fatal. ListtransactionsIds=widgets.stream().filter(b->b.getColor()==RED).sorted((x,y)->x.getWeight()-y.getWeight()).mapToInt(Widget:: getWeight).sum(); This code has a key function, which is stream. Through it, an ordinary list can be converted into a stream, and then it can be processed using a pipeline-like method.
    Safety 1916 2023-05-21 21:08:21
  • What are the three authentication mode configurations of H3C switch telnet service?
    What are the three authentication mode configurations of H3C switch telnet service?
    The following takes an H3C switch as an example to introduce the three authentication methods of telnet service. Configuration steps for None authentication mode: [H3C] telnetserverenable//Enable Telnet service [H3C] user-interfacevty04//Allow remote users 0-4, a total of 5 accounts at the same time Log in [H3C-line-vty0-4] authentication-modenone//Authentication mode is none, no authentication is required [H3C-line-vty0-4] user-rolelevel-3//Set login user permissions Password authentication mode configuration steps: [ H3C]telne
    Safety 3863 2023-05-21 19:40:13

Tool Recommendations

jQuery enterprise message form contact code

jQuery enterprise message form contact code is a simple and practical enterprise message form and contact us introduction page code.
form button
2024-02-29

HTML5 MP3 music box playback effects

HTML5 MP3 music box playback special effect is an mp3 music player based on HTML5 css3 to create cute music box emoticons and click the switch button.

HTML5 cool particle animation navigation menu special effects

HTML5 cool particle animation navigation menu special effect is a special effect that changes color when the navigation menu is hovered by the mouse.
Menu navigation
2024-02-29

jQuery visual form drag and drop editing code

jQuery visual form drag and drop editing code is a visual form based on jQuery and bootstrap framework.
form button
2024-02-29

Organic fruit and vegetable supplier web template Bootstrap5

An organic fruit and vegetable supplier web template-Bootstrap5
Bootstrap template
2023-02-03

Bootstrap3 multifunctional data information background management responsive web page template-Novus

Bootstrap3 multifunctional data information background management responsive web page template-Novus
backend template
2023-02-02

Real estate resource service platform web page template Bootstrap5

Real estate resource service platform web page template Bootstrap5
Bootstrap template
2023-02-02

Simple resume information web template Bootstrap4

Simple resume information web template Bootstrap4
Bootstrap template
2023-02-02

Cute summer elements vector material (EPS PNG)

This is a cute summer element vector material, including the sun, sun hat, coconut tree, bikini, airplane, watermelon, ice cream, ice cream, cold drink, swimming ring, flip-flops, pineapple, conch, shell, starfish, crab, Lemons, sunscreen, sunglasses, etc., the materials are provided in EPS and PNG formats, including JPG previews.
PNG material
2024-05-09

Four red 2023 graduation badges vector material (AI EPS PNG)

This is a red 2023 graduation badge vector material, four in total, available in AI, EPS and PNG formats, including JPG preview.
PNG material
2024-02-29

Singing bird and cart filled with flowers design spring banner vector material (AI EPS)

This is a spring banner vector material designed with singing birds and a cart full of flowers. It is available in AI and EPS formats, including JPG preview.
banner picture
2024-02-29

Golden graduation cap vector material (EPS PNG)

This is a golden graduation cap vector material, available in EPS and PNG formats, including JPG preview.
PNG material
2024-02-27

Home Decor Cleaning and Repair Service Company Website Template

Home Decoration Cleaning and Maintenance Service Company Website Template is a website template download suitable for promotional websites that provide home decoration, cleaning, maintenance and other service organizations. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-05-09

Fresh color personal resume guide page template

Fresh color matching personal job application resume guide page template is a personal job search resume work display guide page web template download suitable for fresh color matching style. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-29

Designer Creative Job Resume Web Template

Designer Creative Job Resume Web Template is a downloadable web template for personal job resume display suitable for various designer positions. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28

Modern engineering construction company website template

The modern engineering and construction company website template is a downloadable website template suitable for promotion of the engineering and construction service industry. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28