current location:Home > Technical Articles > Operation and Maintenance > Safety

  • What are the common techniques for MySQL database?
    What are the common techniques for MySQL database?
    1. How to choose the type of server? The meanings of each parameter in the MySQL server configuration window are as follows. [ServerConfigurationType] This option is used to set the type of server. Click the down button to the right of this option to see 3 options. The specific meanings of the three options are as follows: Development Machine: This option represents a typical personal desktop workstation. Assume that there are multiple desktop applications running on the machine. Configure the MySQL server to use minimal system resources. ServerMachine (server): This option represents the server. MySQL server can run together with other applications, such as FTP, ema
    Safety 971 2023-05-18 13:29:00
  • Example Analysis of Security Risks of SolarWinds Supply Chain APT Attack Incident
    Example Analysis of Security Risks of SolarWinds Supply Chain APT Attack Incident
    Background On December 13, the top U.S. security company FireEye (Chinese name: Huoyan) released a report stating that it had discovered a global intrusion activity and named the organization UNC2452. The APT organization invaded the SolarWinds company, implanted malicious code in the SolarWindsOrion commercial software update package, and distributed it. FireEye called it SUNBURST malware. The backdoor contains the ability to transfer files, execute files, analyze the system, reboot the machine, and disable system services for the purpose of lateral movement and data theft. SolarWindsOrionPlatform is a powerful, scalable infrastructure monitoring and management platform for
    Safety 1069 2023-05-18 12:52:27
  • Example analysis of vBulletin 5.x remote code execution vulnerability
    Example analysis of vBulletin 5.x remote code execution vulnerability
    Introduction to vBulletin components vBulletin is the global leader in forum and community publishing software. Its security, powerful management functions and speed, and its ability to serve more than 40,000 online communities are highly favored by customers. Many large forums have chosen vBulletin as their community. From the customer list displayed on the official website of vBulletin, we can know that the famous game production company EA, the famous game platform Steam, Japan's large multinational company Sony, and the United States NASA are all its customers. vBulletin is efficient, stable and safe. In China There are also many large customers, such as Hummingbird.com, 51 Group Buying, Ocean Tribe and other online forums with tens of thousands of people using vBull.
    Safety 1281 2023-05-18 11:46:45
  • Analysis of examples of Google fixing Chrome 0-day vulnerabilities under active attacks
    Analysis of examples of Google fixing Chrome 0-day vulnerabilities under active attacks
    Google released a Chrome update on the 25th to fix three security vulnerabilities, including a 0-day vulnerability that is being actively exploited. Details about these attacks and how the vulnerability was exploited against Chrome users have not been made public. The attacks were discovered on February 18 by Clement Lecigne, a member of Google's threat analysis team. The Google Threat Analysis Group is the department at Google that investigates and tracks groups of threat actors. Chrome version 80.0.3987.122 fixes the 0-day vulnerability. The update is available for Windows, Mac, and Linux users, but ChromeOS, iOS, and Android users
    Safety 878 2023-05-18 11:25:12
  • What is a simple and secure API authorization mechanism based on signature algorithm?
    What is a simple and secure API authorization mechanism based on signature algorithm?
    When I was working on an advertising system, I found that the advertising systems of most of the platforms I connected to used tokens to authorize interfaces, and this token remained unchanged and was provided by advertisers. It can be said that this is a streaking interface, but this kind of The interface does not have high security requirements, which can only prevent malicious calls and verify the identity of the channel. Last year, the author wrote about an API unified authorization platform that provides unified authorization management for internal service open interfaces and third-party system calls. Apart from facilitating management interface authorization, it has no other purpose, but it costs money to deploy. This is probably the most pointless project I've ever done. The API authorization mechanism introduced today may also be a more widely used API interface authorization mechanism. I remember that the author used to do the WeChat payment function.
    Safety 1439 2023-05-18 10:49:52
  • How idaPro analyzes app decryption lua script
    How idaPro analyzes app decryption lua script
    Through the previous idaPro debugging or hook, we can obtain the xxtea decryption key. For sign, we can directly open the original file: we can see the sign value: byds. Therefore, we can try to decrypt it with the xxtea decryption tool (which can be compiled from the source code on GitHub): Taking index.luac as an example, we see the changes before and after decryption of index.luac: We see that the lua script after decryption by xxtea is still not Plain text! We previously determined that the xxtea encryption was used based on the cocos2d framework source code and the master apk decoding result, and the Lua script of the app also has a signature value, which also confirms that it is the xxtea encryption method, but we
    Safety 1532 2023-05-18 08:34:19
  • How to perform IP address analysis and application
    How to perform IP address analysis and application
    1. IP address 1. IPV4 is composed of 32-bit binary number 2. IP address is composed of two parts: network bit + host bit 3. Classification of IP address: Category range network bit and host bit A1-126 network + main + main + Main B128-191 Network + Network + Main + Main C192-223 Network + Network + Network + Main D224-239 Multicast Address E240-254 Scientific Research 2. Private Network Address A10.0.0.0~10.255.255.255B172,16.0 .0~172.31.255.255C192.168.0.0~192.168.255.255 3. Subnet mask The subnet mask is used to distinguish the network bits and host bits of the IP address. The network bits are represented by consecutive 1's.
    Safety 1997 2023-05-17 22:55:04
  • How to conduct in-depth analysis of Vietnamese APT attack samples
    How to conduct in-depth analysis of Vietnamese APT attack samples
    1. Introduction APT has become a hot topic in the security field. Innovación ylaboratorio, a subsidiary of Eleven Paths, published the "Docless Vietnam APT" report in April: The above information states that we have detected that some malicious emails were sent to mailboxes belonging to the Vietnamese government. The date of this Vietnamese email is March 13, 2019. This email may have come from within the Vietnamese government. It cannot be ruled out that someone sent this email to the security department because there are suspicious elements in this email. TKCTquyInam2019.doc.lnk.malw sample information is as follows: Picture 1: TKCTquyInam2019.doc.lnk.m
    Safety 852 2023-05-17 22:26:37
  • Example analysis of static analysis of APK files to discover leakage of hard-coded passwords in APP applications
    Example analysis of static analysis of APK files to discover leakage of hard-coded passwords in APP applications
    The Writeup I share with you today is a static analysis of Android APP. Due to the problem of insecure storage and hard-coded password leakage in the APP, it is possible to log in to its SMS management system and hijack its SMS interface configuration. The following is the relevant analysis and research. . Getting Started Since the scope of the public testing project involves a certain Android APP from a relevant manufacturer, I downloaded this APP on my Android phone and took out its APK file for static analysis. Here are two native and fast APK download URLs recommended: https://apk.support/apk-downloader https://apkpure.com/ After obtaining the APK file, we need to process it
    Safety 1205 2023-05-17 21:16:19
  • Android basic reverse engineering is not implemented very well
    Android basic reverse engineering is not implemented very well
    0x01Activity jump demo is still the last demo. This time we change the Button logic and change it to jump. Build a new Activity Jump ActivityHere jump to our new Activity. Use Intent to jump, which is equivalent to a carrier. The specific code is as follows: Intenti=newIntent(MainActivity.this,Main2Activity.class);startActivity(i); set the logo to generate apk test 0x02Androidmanifest.xml description First let’s look at Androidm
    Safety 1098 2023-05-17 20:22:36
  • What are the Android MaterialDesign application methods?
    What are the Android MaterialDesign application methods?
    1: The top background image slowly disappears when you slide up, and the title is suspended. 1.1: Set the previous added dependencies in CoordinatorLayout. I have already said it in the previous article, so I won’t repeat it here. A new one is added to the coordinator layout this time. Layout CollapsingToolbarLayout (Collapsing Toolbar Layout), it is obvious that the toolbar in the above rendering slides up and the picture is folded in. This is an animation effect. If it were not for the power of the MaterialDesign library, we would have written this ourselves. Let's analyze what is used in the renderings. Just look at the colored text, an Apple background image, and a floating button (adsorbed on Collapsin
    Safety 1026 2023-05-17 19:28:26
  • How to solve Windows worm virus
    How to solve Windows worm virus
    0x00 Preface The worm is a very old computer virus. It is a self-contained program (or a set of programs) that usually spreads through the network. Every time it invades a new computer, it is on this computer. Makes a copy of itself and automatically executes its own program. Common worms: Panda Burning Incense Virus, Shock Wave/Shock Wave Virus, Conficker Virus, etc. 0x01 Emergency Scenario One morning, the administrator found at the egress firewall that the internal network server continued to initiate active connections to overseas IPs. The internal network environment was unable to connect to the external network, and there was no way to figure it out. 0x02 event analyzes the server's intranet IP seen on the egress firewall. First, disconnect the virus-infected host from the intranet, then log in to the server, open D-shield_web scan and check
    Safety 2849 2023-05-17 19:22:10
  • How to classify IP addresses and divide subnets
    How to classify IP addresses and divide subnets
    IP is a 32-bit unsigned integer, and its range is 0.0.0.0-255.255.255.255. Specifically, an IP consists of two parts: network number + host number. If the network numbers are the same, it means that within a network segment, you can Direct communication using mac data frame. Given a network number, the host number is all 0, the ip represents the network address, the host number is all 1, the ip represents the broadcast address, the representation of the ip address: xxxxxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx|--net--| ---------host----------------|The network number of a class A address starts with 0, the network number of a class B address starts with 10, and the network number of a class C address starts with 10 is 11
    Safety 2015 2023-05-17 19:01:32
  • What is Django development and offensive and defensive testing like?
    What is Django development and offensive and defensive testing like?
    1. For basic Django development, I used to use 1.8.2 for my blog. I still installed it on my machine, so I took it over and used it. Of course, the new version will fix a lot of bugs. You should learn newer versions as much as possible. This article is about An introductory chapter. 1. Download, install and start #Download djangopipinstalldjango==1.8.2-ihttps://pypi.mirrors.ustc.edu.cn/simple/#Create a folder and activate the virtual environment virtualenvdjango_democddjango_demosourcebin/activate#Create a folder to store django files mkdi
    Safety 1316 2023-05-17 18:11:09
  • How to implement Juniper JunOS PPPOE configuration
    How to implement Juniper JunOS PPPOE configuration
    1) Select interface fe-0/0/1 as the physical interface of the PPPOE dial-up interface, and encapsulate it into pppoesesetinterfacesfe-0/0/1unit0encapsulationppp-over-ether2) Configure the PP0.0 parameters of the PPPOE interface setinterfacespp0unit0pppoe-optionsunderlying-interfacefe-0/ 0/1.0setinterfacespp0unit0pppoe-optionsidle-timeout0setinterfacespp0unit0pppoe-
    Safety 1159 2023-05-17 17:55:12

Tool Recommendations

jQuery enterprise message form contact code

jQuery enterprise message form contact code is a simple and practical enterprise message form and contact us introduction page code.
form button
2024-02-29

HTML5 MP3 music box playback effects

HTML5 MP3 music box playback special effect is an mp3 music player based on HTML5 css3 to create cute music box emoticons and click the switch button.

HTML5 cool particle animation navigation menu special effects

HTML5 cool particle animation navigation menu special effect is a special effect that changes color when the navigation menu is hovered by the mouse.
Menu navigation
2024-02-29

jQuery visual form drag and drop editing code

jQuery visual form drag and drop editing code is a visual form based on jQuery and bootstrap framework.
form button
2024-02-29

Organic fruit and vegetable supplier web template Bootstrap5

An organic fruit and vegetable supplier web template-Bootstrap5
Bootstrap template
2023-02-03

Bootstrap3 multifunctional data information background management responsive web page template-Novus

Bootstrap3 multifunctional data information background management responsive web page template-Novus
backend template
2023-02-02

Real estate resource service platform web page template Bootstrap5

Real estate resource service platform web page template Bootstrap5
Bootstrap template
2023-02-02

Simple resume information web template Bootstrap4

Simple resume information web template Bootstrap4
Bootstrap template
2023-02-02

Cute summer elements vector material (EPS PNG)

This is a cute summer element vector material, including the sun, sun hat, coconut tree, bikini, airplane, watermelon, ice cream, ice cream, cold drink, swimming ring, flip-flops, pineapple, conch, shell, starfish, crab, Lemons, sunscreen, sunglasses, etc., the materials are provided in EPS and PNG formats, including JPG previews.
PNG material
2024-05-09

Four red 2023 graduation badges vector material (AI EPS PNG)

This is a red 2023 graduation badge vector material, four in total, available in AI, EPS and PNG formats, including JPG preview.
PNG material
2024-02-29

Singing bird and cart filled with flowers design spring banner vector material (AI EPS)

This is a spring banner vector material designed with singing birds and a cart full of flowers. It is available in AI and EPS formats, including JPG preview.
banner picture
2024-02-29

Golden graduation cap vector material (EPS PNG)

This is a golden graduation cap vector material, available in EPS and PNG formats, including JPG preview.
PNG material
2024-02-27

Home Decor Cleaning and Repair Service Company Website Template

Home Decoration Cleaning and Maintenance Service Company Website Template is a website template download suitable for promotional websites that provide home decoration, cleaning, maintenance and other service organizations. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-05-09

Fresh color personal resume guide page template

Fresh color matching personal job application resume guide page template is a personal job search resume work display guide page web template download suitable for fresh color matching style. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-29

Designer Creative Job Resume Web Template

Designer Creative Job Resume Web Template is a downloadable web template for personal job resume display suitable for various designer positions. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28

Modern engineering construction company website template

The modern engineering and construction company website template is a downloadable website template suitable for promotion of the engineering and construction service industry. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28