current location:Home > Technical Articles > Operation and Maintenance > Safety

  • How to write a triangle in CSS
    How to write a triangle in CSS
    CSS writes the triangle /*createanarrowthatpointsup*/div.arrow-up{width:0px;height:0px;border-left:5pxsolidtransparent;/*leftarrowslant*/border-right:5pxsolidtransparent;/*rightarrowslant*/border-bottom:5pxsolid #2f2f2f;/*bottom,addbackgroundcolorhere*/font-size:0px;
    Safety 888 2023-05-14 14:07:56
  • How to analyze and reproduce Apache Commons Collections deserialization vulnerability
    How to analyze and reproduce Apache Commons Collections deserialization vulnerability
    1.1 Status Completes vulnerability mining condition analysis and vulnerability reproduction. 1.2 Vulnerability analysis Versions with security flaws: Apache Commons Collections 3.2.1 or below, [JDK version: 1.7.0_80] Apache Maven 3.6.3. POC core code: packagecom.patrilic.vul;importorg.apache.commons.collections.Transformer;importorg.apache.commons.collections.functors.ConstantTransformer;
    Safety 1305 2023-05-14 14:04:06
  • What is the method of data recovery in linux system
    What is the method of data recovery in linux system
    Tools: hexedit, fdisk The following operations are all completed in the root environment. hexedit: On Linux, hexedit is often used to modify the hexadecimal code of the program. Fdisk will not be introduced here. Now let's go into the world of disks and see what disks do to data. First, use root privileges in the terminal to run the following command: Command: fdisk-l/dev/sdb1 is today’s protagonist. From the picture, you can clearly see some related data, such as disk size, sector, I/Osize etc. The disk format is ext4, not vfat32 and NTFS format on MS, at the end of the article
    Safety 3130 2023-05-14 13:49:06
  • What is the method for non-destructively adjusting the capacity of C drive with DiskGenius?
    What is the method for non-destructively adjusting the capacity of C drive with DiskGenius?
    How to expand the C drive with DiskGenius? As we all know, after using a computer for a long time, you will find that your C drive space becomes smaller and smaller, or even seriously insufficient. Even deleting some downloaded software cannot fundamentally solve the problem. The best solution is to expand the C drive without loss. Let’s teach you how Use DiskGenius to losslessly expand the C drive. Partitions with data are risky and need to be operated with caution. We are not responsible for data loss. Please back up your important data before operating a partition with data to avoid losing it. Note: If DiskGenius wants to expand the C drive, it can only separate the capacity from the D drive next to it, not another one. Or multiple partition operations, novice friends need to pay special attention to this. The first step is to insert the bootable USB flash drive into the computer, restart the computer and press the shortcut key to enter the computer's
    Safety 4203 2023-05-14 13:25:06
  • How to use css to disable mouse events
    How to use css to disable mouse events
    Disabling mouse events The new pointer-events in CSS3 allow you to disable mouse events for elements. For example, a link cannot be clicked if the following style is set. .disabled{pointer-events:none;}
    Safety 777 2023-05-14 12:43:06
  • How to Easily Complete Enterprise Security Orchestration Response SOAR
    How to Easily Complete Enterprise Security Orchestration Response SOAR
    The 2019 Security Orchestration and Automated Response Solutions (SOAR) Market Guide released by the authoritative consulting organization Gartner states that “by 2022, more than 30% of security companies with security teams of more than 5 people will use SOAR security orchestration automation. Response plan”. Today we will introduce how enterprises can use the NSFOCUS SOAR system to complete security orchestration and automated response within three minutes. Looking at the pain points and demands of enterprises in security operations from the security incident handling process. In the traditional security operation and maintenance and incident handling of enterprises, the following process is generally followed: Table: After the above 7 steps of the traditional security operation and maintenance process, an information security incident The disposal process is complete. In this process, multiple departments and different roles will participate.
    Safety 1163 2023-05-14 12:22:06
  • How to deeply understand GOT table and PLT table
    How to deeply understand GOT table and PLT table
    0x01 Preface Operating systems usually use dynamic linking to improve the efficiency of program running. In the case of dynamic linking, all functions in the link library are not loaded together when the program is loaded, but are loaded on demand when the program is executed. If a function is not called, then it will not be loaded in the program. Being loaded into life. This design can improve the smoothness of program operation and reduce memory space. Moreover, modern operating systems do not allow modification of code segments, only data segments, so the GOT table and PLT table came into being. 0x02 A preliminary exploration of the GOT table and the PLT table. Let's take a brief look at an example. If we follow up scanf@plt, we will find that there are three lines of code jmp. An address pushes a value to the stack. jmp
    Safety 1446 2023-05-14 12:13:14
  • The idea of ​​​​sqlmap processing sign encryption
    The idea of ​​​​sqlmap processing sign encryption
    When I tested the company's APP, I found that we added a 32-bit character to all parameter contents and finally performed MD5 encryption. Since the APP processing process first verifies whether the sign is correct, if the signature verification fails, it will not be able to enter the database at all. In order to use SQLMAP to test it, I wrote a script for proxy data. After intercepting the data packet , perform encrypted replacement of its parameter content and 32 characters. Note: This script is suitable for the company's internal system, because you can know the encryption process; or you can get the encryption method of the front-end JS. First, I wrote a program using Django to simulate the company's system. The process was to obtain the POST ID and token, and add a custom encrypted word.
    Safety 1322 2023-05-14 11:52:12
  • How to perform APK simple code injection
    How to perform APK simple code injection
    1. Foreword When the apk is not encrypted, the smail file is obtained by decompiling it. Just inject the code that needs to be injected. Then seal and sign it! 2. Make apk Use androidstudio to generate a simple apk. Just use the default code. packagecom.example.myapplication1;importandroidx.appcompat.app.AppCompatActivity;importandroid.os.Bundle;publicclassMainActivityextendsAppCompatActivity{
    Safety 2162 2023-05-14 11:43:06
  • How to optimize SylixOS network card driver
    How to optimize SylixOS network card driver
    1. Development environment Operating system: SylixOS Programming environment: RealEvo-IDE3.1 Hardware platform: AT9x25 development board 1. Technical implementation After writing the network card driver and realizing the basic sending and receiving functions, this article will briefly introduce it How to optimize the sending function of the network card driver and improve the throughput and real-time performance of sending. 1.1 Network card sending throughput optimization The network card driver can improve sending throughput through zero copy. The driver calls the enetCoreTx sending function to realize the sending of Ethernet messages. This function receives two parameters, which are netdev structure type pointer and pbuf type pointer. enetCoreTx will copy the content pointed to by pbuf to
    Safety 1381 2023-05-14 11:16:14
  • How to use wireshark simply
    How to use wireshark simply
    The ideal access environment for wireshark is a hub, but there are basically no pure hubs on the market now. Most of the so-called hubs on the market are small switches and the like. As we all know, the traffic of the switch router is sent to the destination port, that is, the destination port will only receive data packets sent to itself, while the hub is broadcast and sends data packets to all ports in the entire broadcast domain, so on the hub Packet capture is ideal. When wireshark captures packets, you can use filtering to capture only the packets you want to capture, or you can set no filtering, in which case all packets on the network will be captured. In the data packets captured by wireshark, data packets of different protocols are highlighted in different colors, and in the v of the main menu
    Safety 972 2023-05-14 10:31:05
  • What are the commonly used Oracle statements for performance testing?
    What are the commonly used Oracle statements for performance testing?
    Oracle's performance test mainly simulates a large number of SQL statement operations to put pressure on the database server. Before testing, you need to prepare the following SQL statements to be simulated, test scripts, and prepare the test control machine, test pressure machine, and the database server under test. Oracle database performance advantages and disadvantages Advantages 1. Can run on all mainstream platforms (including windows). Fully supports all industry standards. Adopt a completely open strategy. This enables customers to choose the most suitable solution. Full support to developers. 2. Parallel servers extend the capabilities of windownt by enabling a group of nodes to share work in the same cluster, providing high availability and high scalability cluster solutions. 3. If windowsNT
    Safety 1393 2023-05-14 09:13:05
  • SoapFormatter deserialization vulnerability example analysis
    SoapFormatter deserialization vulnerability example analysis
    1. Preface NetDataContractSerializer and DataContractSerializer are used to serialize and deserialize data sent in Windows Communication Foundation (WCF) messages. There is an important difference between the two: NetDataContractSerializer includes the CLR, adding extra information through CLR types and saving references to support type precision, while DataContractSerializer does not. Therefore, NetDataContr can only be used if the same CLR type is used on the serialization and deserialization sides
    Safety 1939 2023-05-14 09:07:05
  • Javascript how to convert array to object
    Javascript how to convert array to object
    Converting an Array to an Object If you want to convert an array to an object, the fastest way is with the spread operator (...). varplants=['Saturn','Earth','Uranus','Mercury','Venus','Earth','Mars','Jupiter'
    Safety 1442 2023-05-14 08:49:05
  • Why does online behavior management ban teamviewer?
    Why does online behavior management ban teamviewer?
    A few days ago, the Shenzhen Network and Information Security Information Notification Center issued an emergency notice stating that the well-known remote office tool TeamViewer has been compromised by the overseas hacker group APT41, reminding corporate organizations to take protective measures. In other words, APT41 has broken through all the protection systems of TeamViewer and obtained relevant data permissions. The risk level is very high. Before teamviewer officially provides solutions and releases relevant patches, we recommend that users suspend the use of teamviewer software to avoid unnecessary losses. The following is an introduction to teamviewer communication methods and how to use WSG Internet Behavior Management to ban teamviewer. 1.teamv
    Safety 1398 2023-05-14 08:37:13

Tool Recommendations

jQuery enterprise message form contact code

jQuery enterprise message form contact code is a simple and practical enterprise message form and contact us introduction page code.
form button
2024-02-29

HTML5 MP3 music box playback effects

HTML5 MP3 music box playback special effect is an mp3 music player based on HTML5 css3 to create cute music box emoticons and click the switch button.

HTML5 cool particle animation navigation menu special effects

HTML5 cool particle animation navigation menu special effect is a special effect that changes color when the navigation menu is hovered by the mouse.
Menu navigation
2024-02-29

jQuery visual form drag and drop editing code

jQuery visual form drag and drop editing code is a visual form based on jQuery and bootstrap framework.
form button
2024-02-29

Organic fruit and vegetable supplier web template Bootstrap5

An organic fruit and vegetable supplier web template-Bootstrap5
Bootstrap template
2023-02-03

Bootstrap3 multifunctional data information background management responsive web page template-Novus

Bootstrap3 multifunctional data information background management responsive web page template-Novus
backend template
2023-02-02

Real estate resource service platform web page template Bootstrap5

Real estate resource service platform web page template Bootstrap5
Bootstrap template
2023-02-02

Simple resume information web template Bootstrap4

Simple resume information web template Bootstrap4
Bootstrap template
2023-02-02

Cute summer elements vector material (EPS PNG)

This is a cute summer element vector material, including the sun, sun hat, coconut tree, bikini, airplane, watermelon, ice cream, ice cream, cold drink, swimming ring, flip-flops, pineapple, conch, shell, starfish, crab, Lemons, sunscreen, sunglasses, etc., the materials are provided in EPS and PNG formats, including JPG previews.
PNG material
2024-05-09

Four red 2023 graduation badges vector material (AI EPS PNG)

This is a red 2023 graduation badge vector material, four in total, available in AI, EPS and PNG formats, including JPG preview.
PNG material
2024-02-29

Singing bird and cart filled with flowers design spring banner vector material (AI EPS)

This is a spring banner vector material designed with singing birds and a cart full of flowers. It is available in AI and EPS formats, including JPG preview.
banner picture
2024-02-29

Golden graduation cap vector material (EPS PNG)

This is a golden graduation cap vector material, available in EPS and PNG formats, including JPG preview.
PNG material
2024-02-27

Home Decor Cleaning and Repair Service Company Website Template

Home Decoration Cleaning and Maintenance Service Company Website Template is a website template download suitable for promotional websites that provide home decoration, cleaning, maintenance and other service organizations. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-05-09

Fresh color personal resume guide page template

Fresh color matching personal job application resume guide page template is a personal job search resume work display guide page web template download suitable for fresh color matching style. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-29

Designer Creative Job Resume Web Template

Designer Creative Job Resume Web Template is a downloadable web template for personal job resume display suitable for various designer positions. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28

Modern engineering construction company website template

The modern engineering and construction company website template is a downloadable website template suitable for promotion of the engineering and construction service industry. Tip: This template calls the Google font library, and the page may open slowly.
Front-end template
2024-02-28