Article Tags
Quickly learn about HTTP and HTTPS protocols!

Quickly learn about HTTP and HTTPS protocols!

This article will give you a quick understanding of the HTTP and HTTPS protocols. It has certain reference value. Friends in need can refer to it. I hope it will be helpful to everyone.

Jun 17, 2020 am 11:06 AM
HTTP HTTPS
How does HTTPS ensure security? (detailed explanation)

How does HTTPS ensure security? (detailed explanation)

This article will take you through the problems of HTTP and introduce how HTTPS ensures security. It has certain reference value. Friends in need can refer to it. I hope it will be helpful to everyone.

Jun 17, 2020 am 10:59 AM
HTTPS
What is the main difference between HTTP and HTTPS

What is the main difference between HTTP and HTTPS

Web server security: The main differences between HTTP and HTTPS are: 1. The https protocol requires applying for a certificate; 2. http is a hypertext transfer protocol, and information is transmitted in plain text, while https is a secure SSL encrypted transmission protocol; 3. http The connection is simple and stateless.

Jun 16, 2020 pm 04:51 PM
HTTP HTTPS 区别
What is the principle of XSS attack

What is the principle of XSS attack

The principle of XSS attack is: the attacker enters malicious HTML code into a website with XSS vulnerabilities. When other users browse the website, the HTML code will be automatically executed to achieve the purpose of the attack, such as stealing the user's cookies. , destroy the page structure, redirect to other websites, etc.

Jun 13, 2020 pm 05:55 PM
XSS 原理
How to analyze database logs

How to analyze database logs

Common database attacks include weak passwords, SQL injection, privilege escalation, stolen backups, etc. By analyzing database logs, attack behaviors can be discovered, attack scenarios can be further restored, and attack sources can be traced.

Jun 11, 2020 pm 05:20 PM
数据库 日志
Sharing of several common webshell detection tools

Sharing of several common webshell detection tools

This article comes from the web server security column. It shares several common webshell detection tools with you. I hope it can help you. Webshell detection tools include: 1. Web Shell Detector; 2. CloudWalker.

May 09, 2020 pm 04:26 PM
Webshell
How to better defend against CC attacks under Linux

How to better defend against CC attacks under Linux

1. Install dependent packages: yum install perl-libwww-perl perl iptables 2. Download and install CSF: wget https://download.configserver.com/csf.tgz tar -xzf csf.tgz cd csf sh install.sh 3. Test CSF...

Apr 30, 2020 pm 05:40 PM
1
Introduction to PHP remote code execution vulnerabilities

Introduction to PHP remote code execution vulnerabilities

This article comes from the server security tutorial column. It introduces the problem of PHP remote code execution vulnerability in detail. It has certain reference value and I hope it can help everyone. The vulnerability is caused by the underflow of env_path_info in the fpm_main.c file in PHP-FPM.

Apr 09, 2020 pm 03:35 PM
php 漏洞
Use the new features of php7 to bypass the anti-killing rules

Use the new features of php7 to bypass the anti-killing rules

This article comes from the web server security column. It introduces how to use the new features of php7 to bypass the anti-killing rules. It has certain reference value and I hope it can help everyone.

Mar 04, 2020 am 10:45 AM
php7
Why is the traffic still being hijacked even though I use HTTPS?

Why is the traffic still being hijacked even though I use HTTPS?

"HTTPS=HTTP+SSL/TLS, this technology can be said to be simple or complex. To put it simply, for the security of network data, it protects traditional Internet HTTP traffic through encrypted transmission." , Dabai told Lao Zhou while drawing pictures.

Feb 22, 2020 pm 04:01 PM
网页 广告 诊断
FTP usage tutorial

FTP usage tutorial

Tutorial on how to use FTP: First download the "FileZilla" software and double-click to run the installation program; then open "File" -> "Site Manager"; then click "New Site" and fill in the host IP and space FTP user name and password; finally, locally Resources Find the file you want to upload and right-click to upload.

Feb 06, 2020 am 10:01 AM
FTP
Introduction to Linux local kernel privilege escalation vulnerability

Introduction to Linux local kernel privilege escalation vulnerability

This article comes from the server security tutorial column. It introduces the Linux local kernel privilege escalation vulnerability and reproduces the vulnerability. I hope it can help everyone. An attacker can use the Linux local kernel privilege escalation vulnerability to elevate users with ordinary privileges to root privileges.

Jan 16, 2020 pm 05:22 PM
linux 本地内核 提权 漏洞 介绍
PDO principle and correct use method

PDO principle and correct use method

This article is recommended by the website security tutorial column. It introduces the principles and correct use of PDO. I hope it can help you. As database parameterized queries become more and more common, SQL injection vulnerabilities have been greatly reduced compared to before. PDO, as the most typical pre-compiled query method in PHP, is used more and more widely.

Jan 11, 2020 pm 05:29 PM
PDO 原理 正确使用 方法
Five browsers with the best privacy protection

Five browsers with the best privacy protection

This article is recommended by the Server Security Tutorial column. It shares with you five browsers with strong privacy protection. I hope it can help you. On any type of device currently, the most installed and used browser is the browser, but not all browsers can help you keep it secret.

Jan 07, 2020 pm 05:05 PM
隐私保护 浏览器

Hot tools Tags

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

vc9-vc14 (32+64 bit) runtime library collection (link below)

vc9-vc14 (32+64 bit) runtime library collection (link below)

Download the collection of runtime libraries required for phpStudy installation

VC9 32-bit

VC9 32-bit

VC9 32-bit phpstudy integrated installation environment runtime library

PHP programmer toolbox full version

PHP programmer toolbox full version

Programmer Toolbox v1.0 PHP Integrated Environment

VC11 32-bit

VC11 32-bit

VC11 32-bit phpstudy integrated installation environment runtime library

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Hot Topics

Java Tutorial
1663
14
PHP Tutorial
1266
29
C# Tutorial
1239
24