current location:Home > Technical Articles > Operation and Maintenance > Safety
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- What are the common techniques for MySQL database?
- 1. How to choose the type of server? The meanings of each parameter in the MySQL server configuration window are as follows. [ServerConfigurationType] This option is used to set the type of server. Click the down button to the right of this option to see 3 options. The specific meanings of the three options are as follows: Development Machine: This option represents a typical personal desktop workstation. Assume that there are multiple desktop applications running on the machine. Configure the MySQL server to use minimal system resources. ServerMachine (server): This option represents the server. MySQL server can run together with other applications, such as FTP, ema
- Safety 971 2023-05-18 13:29:00
-
- Example Analysis of Security Risks of SolarWinds Supply Chain APT Attack Incident
- Background On December 13, the top U.S. security company FireEye (Chinese name: Huoyan) released a report stating that it had discovered a global intrusion activity and named the organization UNC2452. The APT organization invaded the SolarWinds company, implanted malicious code in the SolarWindsOrion commercial software update package, and distributed it. FireEye called it SUNBURST malware. The backdoor contains the ability to transfer files, execute files, analyze the system, reboot the machine, and disable system services for the purpose of lateral movement and data theft. SolarWindsOrionPlatform is a powerful, scalable infrastructure monitoring and management platform for
- Safety 1069 2023-05-18 12:52:27
-
- Example analysis of vBulletin 5.x remote code execution vulnerability
- Introduction to vBulletin components vBulletin is the global leader in forum and community publishing software. Its security, powerful management functions and speed, and its ability to serve more than 40,000 online communities are highly favored by customers. Many large forums have chosen vBulletin as their community. From the customer list displayed on the official website of vBulletin, we can know that the famous game production company EA, the famous game platform Steam, Japan's large multinational company Sony, and the United States NASA are all its customers. vBulletin is efficient, stable and safe. In China There are also many large customers, such as Hummingbird.com, 51 Group Buying, Ocean Tribe and other online forums with tens of thousands of people using vBull.
- Safety 1281 2023-05-18 11:46:45
-
- Analysis of examples of Google fixing Chrome 0-day vulnerabilities under active attacks
- Google released a Chrome update on the 25th to fix three security vulnerabilities, including a 0-day vulnerability that is being actively exploited. Details about these attacks and how the vulnerability was exploited against Chrome users have not been made public. The attacks were discovered on February 18 by Clement Lecigne, a member of Google's threat analysis team. The Google Threat Analysis Group is the department at Google that investigates and tracks groups of threat actors. Chrome version 80.0.3987.122 fixes the 0-day vulnerability. The update is available for Windows, Mac, and Linux users, but ChromeOS, iOS, and Android users
- Safety 878 2023-05-18 11:25:12
-
- What is a simple and secure API authorization mechanism based on signature algorithm?
- When I was working on an advertising system, I found that the advertising systems of most of the platforms I connected to used tokens to authorize interfaces, and this token remained unchanged and was provided by advertisers. It can be said that this is a streaking interface, but this kind of The interface does not have high security requirements, which can only prevent malicious calls and verify the identity of the channel. Last year, the author wrote about an API unified authorization platform that provides unified authorization management for internal service open interfaces and third-party system calls. Apart from facilitating management interface authorization, it has no other purpose, but it costs money to deploy. This is probably the most pointless project I've ever done. The API authorization mechanism introduced today may also be a more widely used API interface authorization mechanism. I remember that the author used to do the WeChat payment function.
- Safety 1439 2023-05-18 10:49:52
-
- How idaPro analyzes app decryption lua script
- Through the previous idaPro debugging or hook, we can obtain the xxtea decryption key. For sign, we can directly open the original file: we can see the sign value: byds. Therefore, we can try to decrypt it with the xxtea decryption tool (which can be compiled from the source code on GitHub): Taking index.luac as an example, we see the changes before and after decryption of index.luac: We see that the lua script after decryption by xxtea is still not Plain text! We previously determined that the xxtea encryption was used based on the cocos2d framework source code and the master apk decoding result, and the Lua script of the app also has a signature value, which also confirms that it is the xxtea encryption method, but we
- Safety 1532 2023-05-18 08:34:19
-
- How to perform IP address analysis and application
- 1. IP address 1. IPV4 is composed of 32-bit binary number 2. IP address is composed of two parts: network bit + host bit 3. Classification of IP address: Category range network bit and host bit A1-126 network + main + main + Main B128-191 Network + Network + Main + Main C192-223 Network + Network + Network + Main D224-239 Multicast Address E240-254 Scientific Research 2. Private Network Address A10.0.0.0~10.255.255.255B172,16.0 .0~172.31.255.255C192.168.0.0~192.168.255.255 3. Subnet mask The subnet mask is used to distinguish the network bits and host bits of the IP address. The network bits are represented by consecutive 1's.
- Safety 1997 2023-05-17 22:55:04
-
- How to conduct in-depth analysis of Vietnamese APT attack samples
- 1. Introduction APT has become a hot topic in the security field. Innovación ylaboratorio, a subsidiary of Eleven Paths, published the "Docless Vietnam APT" report in April: The above information states that we have detected that some malicious emails were sent to mailboxes belonging to the Vietnamese government. The date of this Vietnamese email is March 13, 2019. This email may have come from within the Vietnamese government. It cannot be ruled out that someone sent this email to the security department because there are suspicious elements in this email. TKCTquyInam2019.doc.lnk.malw sample information is as follows: Picture 1: TKCTquyInam2019.doc.lnk.m
- Safety 852 2023-05-17 22:26:37
-
- Example analysis of static analysis of APK files to discover leakage of hard-coded passwords in APP applications
- The Writeup I share with you today is a static analysis of Android APP. Due to the problem of insecure storage and hard-coded password leakage in the APP, it is possible to log in to its SMS management system and hijack its SMS interface configuration. The following is the relevant analysis and research. . Getting Started Since the scope of the public testing project involves a certain Android APP from a relevant manufacturer, I downloaded this APP on my Android phone and took out its APK file for static analysis. Here are two native and fast APK download URLs recommended: https://apk.support/apk-downloader https://apkpure.com/ After obtaining the APK file, we need to process it
- Safety 1205 2023-05-17 21:16:19
-
- Android basic reverse engineering is not implemented very well
- 0x01Activity jump demo is still the last demo. This time we change the Button logic and change it to jump. Build a new Activity Jump ActivityHere jump to our new Activity. Use Intent to jump, which is equivalent to a carrier. The specific code is as follows: Intenti=newIntent(MainActivity.this,Main2Activity.class);startActivity(i); set the logo to generate apk test 0x02Androidmanifest.xml description First let’s look at Androidm
- Safety 1098 2023-05-17 20:22:36
-
- What are the Android MaterialDesign application methods?
- 1: The top background image slowly disappears when you slide up, and the title is suspended. 1.1: Set the previous added dependencies in CoordinatorLayout. I have already said it in the previous article, so I won’t repeat it here. A new one is added to the coordinator layout this time. Layout CollapsingToolbarLayout (Collapsing Toolbar Layout), it is obvious that the toolbar in the above rendering slides up and the picture is folded in. This is an animation effect. If it were not for the power of the MaterialDesign library, we would have written this ourselves. Let's analyze what is used in the renderings. Just look at the colored text, an Apple background image, and a floating button (adsorbed on Collapsin
- Safety 1026 2023-05-17 19:28:26
-
- How to solve Windows worm virus
- 0x00 Preface The worm is a very old computer virus. It is a self-contained program (or a set of programs) that usually spreads through the network. Every time it invades a new computer, it is on this computer. Makes a copy of itself and automatically executes its own program. Common worms: Panda Burning Incense Virus, Shock Wave/Shock Wave Virus, Conficker Virus, etc. 0x01 Emergency Scenario One morning, the administrator found at the egress firewall that the internal network server continued to initiate active connections to overseas IPs. The internal network environment was unable to connect to the external network, and there was no way to figure it out. 0x02 event analyzes the server's intranet IP seen on the egress firewall. First, disconnect the virus-infected host from the intranet, then log in to the server, open D-shield_web scan and check
- Safety 2849 2023-05-17 19:22:10
-
- How to classify IP addresses and divide subnets
- IP is a 32-bit unsigned integer, and its range is 0.0.0.0-255.255.255.255. Specifically, an IP consists of two parts: network number + host number. If the network numbers are the same, it means that within a network segment, you can Direct communication using mac data frame. Given a network number, the host number is all 0, the ip represents the network address, the host number is all 1, the ip represents the broadcast address, the representation of the ip address: xxxxxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx|--net--| ---------host----------------|The network number of a class A address starts with 0, the network number of a class B address starts with 10, and the network number of a class C address starts with 10 is 11
- Safety 2015 2023-05-17 19:01:32
-
- What is Django development and offensive and defensive testing like?
- 1. For basic Django development, I used to use 1.8.2 for my blog. I still installed it on my machine, so I took it over and used it. Of course, the new version will fix a lot of bugs. You should learn newer versions as much as possible. This article is about An introductory chapter. 1. Download, install and start #Download djangopipinstalldjango==1.8.2-ihttps://pypi.mirrors.ustc.edu.cn/simple/#Create a folder and activate the virtual environment virtualenvdjango_democddjango_demosourcebin/activate#Create a folder to store django files mkdi
- Safety 1316 2023-05-17 18:11:09
-
- How to implement Juniper JunOS PPPOE configuration
- 1) Select interface fe-0/0/1 as the physical interface of the PPPOE dial-up interface, and encapsulate it into pppoesesetinterfacesfe-0/0/1unit0encapsulationppp-over-ether2) Configure the PP0.0 parameters of the PPPOE interface setinterfacespp0unit0pppoe-optionsunderlying-interfacefe-0/ 0/1.0setinterfacespp0unit0pppoe-optionsidle-timeout0setinterfacespp0unit0pppoe-
- Safety 1159 2023-05-17 17:55:12