current location:Home > Technical Articles > Operation and Maintenance > Safety
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- How to obtain credit card data using Bluetooth
- This article is recommended by the web server security column. Students in need should read it carefully. This article demonstrates how to use Bluetooth to obtain credit card data from FUZE. FUZE is an IoT device the same size as an ordinary credit card. You can use a smartphone App to program the FUZE card through Bluetooth.
- Safety 3175 2019-11-29 17:47:25
-
- Common web security interview questions (share)
- Background When I went out for interviews before, I was often asked some security questions. Security involves a huge field, and I only have a superficial understanding of it. I have to find information to review before every interview, which is very troublesome. So I systematically sorted it out based on some of the information I collected before and my interview experience. I hope it will be helpful to everyone. Text: First, we briefly introduce several common attack methods: SQL injection, XSS, CSRF, click hijacking, man-in-the-middle attack...
- Safety 3778 2019-11-29 17:37:16
-
- Detailed explanation of the five-layer protocol of the network
- Computer network five-layer protocol: 1. Application layer (HTTP, SMTP, FTP, ping, telnet, DNS, DHCP); 2. Transport layer (TCP, UDP); 3. Network layer (IP, ICMP); 4. Data link Road layer (ARP, RARP); 5. Physical layer.
- Safety 5282 2019-11-29 16:54:33
-
- Detailed explanation of TCP's three-way handshake and four-way wave
- TCP is a protocol for connection-oriented, reliable process-to-process communication; TCP provides full-duplex service, that is, data can be transmitted in both directions at the same time.
- Safety 2349 2019-11-29 16:43:35
-
- Detailed explanation of HTTP protocol
- The http (Hypertext Transfer) protocol is the most widely used network protocol on the Internet. It is mainly used for Web services and is implemented by computers processing text information in the format of HTML (Hypertext Markup Language).
- Safety 2858 2019-11-29 10:08:44
-
- Detailed introduction to penetration testing and vulnerability scanning
- This article introduces penetration testing and vulnerability scanning from the web server security column, hoping to help everyone understand it better. Penetration testing is an assessment method that evaluates the security of computer network systems by simulating the attack methods of malicious hackers.
- Safety 5392 2019-11-28 17:53:01
-
- Detailed introduction to data storage security of DSMM
- Below, the web server security tutorial column will introduce the data storage security of DSMM to everyone. I hope it will be helpful to everyone. Data storage security is part of data center security and organizational security. This process includes three process areas: storage media security, logical storage security, and data backup and recovery.
- Safety 4894 2019-11-28 17:19:39
-
- Why HTTPS is more secure than HTTP
- HTTP (Hypertext Transfer Protocol) is currently the most widely used protocol on the Internet. As people's awareness of network security increases, HTTPS is increasingly adopted. Whether we are visiting some shopping websites, or logging into some blogs, forums, etc., we are all protected by HTTPS.
- Safety 3232 2019-11-28 15:52:06
-
- How to perform security analysis on web logs
- This article is recommended by the web security tutorial. Everyone is welcome to communicate and discuss. 0x02 Log analysis skills: Determine the time range of the intrusion, use this as a clue to find suspicious logs within this time range, conduct further investigation, and finally identify the attacker and restore the attack process.
- Safety 3082 2019-11-27 18:05:50
-
- How to fix remote command execution vulnerability in Apache axis component
- This article is recommended by the web server security column. Everyone is welcome to come to this column to learn together. The essence of the remote command execution vulnerability in the "Apache axis" component is that the administrator configures the AdminService incorrectly, which can be repaired by disabling the axis remote management function.
- Safety 5437 2019-11-27 17:41:01
-
- Safe Development Practice Principles
- This article introduces the practical principles of security development to everyone in the web security tutorial column. Everyone is welcome to discuss and learn. Security development practice principles: 1. Security training; 2. Security application development; 3. “Security+DevOps=DevSecOps”; 4. Application security testing; 5. Continuous monitoring and analysis.
- Safety 2936 2019-11-26 17:59:59
-
- Three process injection techniques in Miter ATT&CK matrix
- Below, the web server security column will introduce three process injection techniques in the "Mitre ATT&CK" matrix. I hope it can help you. Three process injection techniques: classic process injection, "Process Hollowing" and "Process Doppelgänging".
- Safety 3523 2019-11-26 10:02:21
-
- Summary of 40 commonly used intrusion ports for hackers worth collecting
- Commonly used ports used by hackers: 1. Port 21 penetration analysis; 2. Port 22 penetration analysis; 3. Port 23 penetration analysis; 4. 25 and 465 ports penetration analysis; 5. 53 ports penetration analysis.
- Safety 18210 2019-11-23 18:01:19
-
- Detailed introduction to data transmission security of DSMM
- Data transmission security is the safe management of data transmission over the network. This is an important stage of data security, and it is also a process in which data security incidents, such as data leakage, theft, tampering, etc., occur frequently.
- Safety 4456 2019-11-22 18:24:39