current location:Home > Technical Articles > Operation and Maintenance > Safety
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- What is the relationship between threads and processes
- Relationship: 1. A process can have multiple threads, but there is at least one thread; and a thread can only be active within the address space of one process. 2. Resources are allocated to processes, and all threads of the same process share all resources of the process. 3. The CPU is allocated to threads, that is, the threads are actually running on the processor. 4. Threads need to cooperate and synchronize during execution. Threads in different processes must use message communication to achieve synchronization. Process is the basic unit of resource allocation. Thread is the basic unit of CPU scheduling and dispatch. Thread is part of the process. A thread can only belong to one process. A process can have multiple threads, but at least one thread is independent of each process. code and data space (program context), switching between programs is expensive, and threads
- Safety 1146 2023-05-22 22:35:13
-
- How to understand LDAP injection
- 1. LDAP injection LDAP (Light Directory Access Portocol) is a lightweight directory access protocol based on the X.500 standard. It provides services and protocols for accessing directory databases. It is often used to form directory services with directory databases. The directory is a professional distributed database optimized for query, browsing and search. It organizes data in a tree structure, similar to the file directory in Linux/Unix systems. Data that is not modified frequently, such as public certificates, security keys, and company physical device information, is suitable for storage in the directory. LDAP can be understood as a search protocol, which is similar to SQL and has query syntax, but also has the risk of injection attacks. LDAP injection refers to the client
- Safety 3063 2023-05-22 21:47:13
-
- How to analyze intranet, public network and NAT
- When we build a weak current monitoring system, we cannot avoid dealing with IP addresses. For example, after cameras, NVRs, servers and other devices are installed, they need to be assigned IPs. Do you know this IP address? Today we will Let’s talk about what are intranet, public network and NAT address translation? 1. Definition of intranet, public network and NAT. Intranet is also called local area network. In terms of scope, intranet is a small part of the network, which generally refers to a specific environment. form a network, such as a network where multiple computers in a family are interconnected, or a large LAN in a school or company. The IPs of the intranet are generally 192.168.1.100, 192.168.0.100, 172.16.1.100&hellip
- Safety 1949 2023-05-22 16:40:50
-
- How to perform reverse analysis of SpyNote5.0 Client_APK
- 1. What is SpyNote5.0? SpyNote is a tool used to create Android malicious programs. Its functions are eye-catching, including reading contacts, recording, command execution, application management, keylogging, GPS positioning, and more. These functions serve as a link between the previous and the following for the study of Android-side malicious programs. We can have a preliminary understanding of its use through a series of articles, "SpyNote V5.0 graphical tool remote management Android mobile phone tutorial", "Be careful, the Android Trojan tool SpyNote is free!" Remote monitoring is so simple", "Beware, Android remote control (spynote) has been upgraded..." and so on. 2. Prepare tools for SpyNote
- Safety 1304 2023-05-22 16:18:30
-
- How to analyze CLDAP protocol Reflection DDoS
- Foreword In the first half of 2018, thanks to Memcache’s reflection amplification factor of nearly 50,000, the peak traffic of DDoS has reached an unprecedented new height of 1.7Tbps, which also makes MemcacheReDDoS the backbone of current DDoS. Compared with MemcacheReDDoS, although CLDAPReDDoS exposed by Akamai in 2016 is not as efficient as the former, its 56~70 times amplification factor is still a leader in the DDoS family, so it should also attract attention. 1. CLDAP protocol flaws: Lightweight Directory Access Protocol (LDAP) is defined in RFC2251 (LDAPv3). Since LDAP is based on T
- Safety 1648 2023-05-22 13:13:33
-
- How to parse Apache vulnerability recurrence
- Apache parsing vulnerability Vulnerability principle The rule of Apache parsing files is to judge the parsing from right to left. If the suffix is unrecognized file parsing, it will judge from the left. For example, the two suffixes of test.php.owf.rar ".owf" and ".rar" are not recognized and parsed by apache, and apache will parse wooyun.php.owf.rar into php. The vulnerability is in the form of www.xxxx.xxx.com/test.php.xxx Other configuration issues lead to the vulnerability (1) If there is such a line in Apache's conf to configure AddHandlerphp5-script.php, then as long as the file name contains .p
- Safety 1150 2023-05-22 12:10:13
-
- Example Analysis of SDN Software-Defined Networking
- SDN software-defined network 1: Dilemmas faced by today's networks The current network is dominated by the TCP/IP protocol, ranging from local area networks to the Internet. The network has changed our lives, but today's network is not a perfect network, and there are various problems. . 1: The TCP/IP protocol system is not static, but as network development problems arise, the existing protocol system has to be patched, making the entire protocol system very bloated. 2: A variety of control protocols are used. Network devices are not only responsible for data forwarding, but also responsible for generating and maintaining control-level forwarding entries. This makes the underlying network control protocol very complex, and the network equipment becomes very complex, making it difficult to deploy uniformly. At the same time, the cost is increased. 3: There is another disadvantage:
- Safety 1081 2023-05-22 11:58:57
-
- How to understand Wireshark filtering rules and filtering options
- ip.addr==192.168.6.1 Filter out the packets containing 192.168.6.1 ip.src==192.168.43.137 Filter out the packets with the source IP address 192.168.43.137 ip.dst==192.168 .43.137 Filter out the packets with the destination IP address 192.168.43.137 tcp.port==80 Filter out the 80 port number containing tcp tcp.src==80 Filter out the 80 port number of the source tcp tcp.dstport==80 Filter out the 80 port number of the target tcpeth.addr==68:17:
- Safety 1681 2023-05-22 11:19:05
-
- What is the method of reverse engineering in Android?
- 1. Weapon get novice, if you want to use this weapon, you must first open up the meridians. 1.1 Meridians (Environment) 1.Root, mobile phone root, there is no Android without root. Only by opening up the root meridian can we proceed with subsequent operations. 2. Xposed framework installation. If you want to use Xposed as a weapon, you must first be able to pick it up before you can use it. 1.2 weapons xposedBridgeApi-82.jar.jar. This is our weapon, Xiaobai, come on, I will show you the basic use of this weapon. 2. Weapon Demonstration We use Xposed weapons to intercept packageName and then output it. In fact, this weapon can only exert its maximum capabilities when paired with internal strength.
- Safety 1564 2023-05-22 09:55:28
-
- How to perform encryption and decryption in OpenSSL basics
- Speaking of OpenSSL, the first thing to mention is SSL. When we use the Internet every day, I am afraid that no one wants to be monitored by others on the Internet. Therefore, a protocol is needed to protect our network communications. The SSL protocol was developed based on this working background. It can prevent the communication between the user and the server application from being eavesdropped by attackers, and always authenticate the server and optionally authenticate the user. SSL protocols are usually built on top of the reliable Transport Layer Protocol (TCP). The advantage of the SSL protocol is that it is independent of application layer protocols. High-level application layer protocols (such as HTTP, FTP, TELNET, etc.) can be transparently built on the SSL protocol. SSL protocol in application
- Safety 3277 2023-05-22 09:20:06
-
- The ttl value of ping briefly determines the operating system categories.
- The type of some operating systems can often be roughly judged by the ttl value of ping. Here is a summary: The TTL field value of the ICMP echo response of UNIX and UNIX-like operating systems is 255. CompaqTru645.0 The TTL field value of the ICMP echo response is 64. The TTL field value of the ICMP echo response of the Microsoft Windows NT/2K operating system is 128. The TTL field value of the ICMP echo response of the Microsoft Windows 95 operating system is 32. Of course, these ttl values can also be changed. Windows series systems can modify the following key values in the registry. Implementation: [HKEY_LOCAL_MACHINE\system\Curren
- Safety 2435 2023-05-22 09:04:05
-
- Can routing be used to defend against ARP spoofing, suppress broadcast storms, and defend against intranet viruses?
- The routes mentioned here are those above one thousand yuan, and we won’t talk about those below one thousand yuan. Nowadays, many enterprise routers say they have such a function, but such a function requires a prerequisite, that is, the computer must be directly connected to the router. If it is separated by a switch, these functions will be useless to the computer. Problems such as broadcast storms and ARP spoofing in the LAN are very common problems. They are not big problems, but they are very annoying. It is not difficult to solve broadcast storms, ARP spoofing or network loops. The difficulty lies in how to detect these problems. Recommend the "Buddha Nature" plug-in for our system. The reason why we say "Buddha nature" is because this detection function is based on Internet behavior management and the core of network monitoring data analysis, and only Internet behavior management can do it. It should have been placed in
- Safety 1709 2023-05-22 08:52:33
-
- What are the scripting methods for Linux?
- The first line of the code1#!/bin/sh script looks like a comment, but it is not. It specifies which SHELL will be used to execute the next script. The bash, zsh, etc. we usually use are a superset of sh. This script uses sh as the execution shell, which has better portability. code2setenforce02>dev/nullechoSELINUX=disabled>/etc/sysconfig/selinux2>/dev/nullsetenforce is the Linux selinux firewall configuration command, execute setenforce
- Safety 4269 2023-05-22 08:11:59
-
- How to solve the pitfalls of using ParallelStream
- For example, the following code snippet makes people read it like reading poetry. But if used incorrectly, it can be fatal. ListtransactionsIds=widgets.stream().filter(b->b.getColor()==RED).sorted((x,y)->x.getWeight()-y.getWeight()).mapToInt(Widget:: getWeight).sum(); This code has a key function, which is stream. Through it, an ordinary list can be converted into a stream, and then it can be processed using a pipeline-like method.
- Safety 1916 2023-05-21 21:08:21
-
- What are the three authentication mode configurations of H3C switch telnet service?
- The following takes an H3C switch as an example to introduce the three authentication methods of telnet service. Configuration steps for None authentication mode: [H3C] telnetserverenable//Enable Telnet service [H3C] user-interfacevty04//Allow remote users 0-4, a total of 5 accounts at the same time Log in [H3C-line-vty0-4] authentication-modenone//Authentication mode is none, no authentication is required [H3C-line-vty0-4] user-rolelevel-3//Set login user permissions Password authentication mode configuration steps: [ H3C]telne
- Safety 3863 2023-05-21 19:40:13