Near the year, people will become impetuous, and the code written during the period can be described as messy. However, it is always necessary, which […]
Read moreAuthor: admin
DNS domain name analysis problem investigation record
Other engine data is called in the way in the player project. Yesterday’s colleagues responded, and there was a problem in calling data. When there […]
Read moreWindows redescence stdout to network connection of the current process
The previous period of time encounters a requirement and wants to redirect the standard output of the current process to a TCP connection. If in […]
Read moreIT practitioners need to know security knowledge (2)
03 – Authentication – Certification factor (what can be used to do certification vouchers) A. Something you know Only what you know. Such as: password. […]
Read moreUnderstanding Internet Working Principles from Google Downtime
Translator Note: This article mentioned that CloudFlare is a Headquarters Content Distribution Network (CDN) service company, which was established in 2009 by three developers of […]
Read moreRemember a packet loss network failure
The phenomenon of HTTP service cards appear from time to time when a “nginx / php” server is. I started to suspect that PHP has […]
Read moreUse parameterized queries to prevent SQL injection vulnerability
SQL injection vulnerabilities have been a nightmare, CMS, BBS, and blog, no suffering from a web application. SQL injection principle In the past, it is […]
Read moreData anti-leakage DLP technology depth analysis
In the enterprise, it is mentioned in the enterprise. You may often remember the documentation. Few people will pay attention to the content of the […]
Read moreIOS security – block Tweak from injection hook API
Seeing a way online can be added to Other Linker Flags: 1 -Wl, -sectcreate, __ restrict, __ restrict, / dev / null The method to […]
Read moreSlembunk Trojan
Slembunk was originally found by FireEye. Later, some other security companies have also discovered that the authors have been able to get the sample, analyzing […]
Read more