Skip to content
It technology security

It technology security

Second generation CDN architecture and ordinary CDN architecture

Recently, there is no thing to write, introduce a thing of our company a few births, may be a new thing for many people. . […]

Read more

Analysis of HTTP Authentication Algorithm in Cloud Storage

March 5, 2022 admin

Base64-coded HTTP Basic Authentication is no longer widely used due to security issues. In the cloud storage, the security of the data has been widely […]

Read more
  • website security

Diagnosis and processing of TCP Flood Attack (SYN FLOOD)

March 5, 2022 admin

Syn Flood introduction Summary The website was attacked many times, the most violent TCP flood attack, namely SYN FLOOD. Syn Flood is one of the […]

Read more
  • network system

HTTP’s POST parameter submission and upload different from Mojolicious implementation.

March 5, 2022 admin

For HTTP protocols, we have several different ways of processing, so we have several different processing methods, so there are different processing for the client […]

Read more
  • network system

A Record, MX Record, CNAME Record, URL Forward, NS Record, Dynamic Record

March 5, 2022 admin

1, cname (canonicalname) record, (aliasfromondomainnametoanother) is usually called alias pointing You can transfer the registered different domains to a primary domain! Unlike a record, the […]

Read more
  • network system

TCP sliding window and window zoom factor (Window Scaling)

March 5, 2022 admin

I. Introduction Said TCP sliding window protocol, I believe everyone is very familiar, but said that the WINDOW Scaling parameter may know and have been […]

Read more
  • network system

View Network Status Detailed Use NetStat

March 5, 2022 admin

1. 11 network connection status on Linux servers: Photo: TCP state machine Normally: a normal TCP connection will have three phases: 1, TCP three handshake; […]

Read more
  • network system

Gen_TCP how to limit the size of the package

March 4, 2022 admin

When we do TCP servers, we usually cause damage to both security attacks or to avoid extreme requests from safety, and prevent extreme requests for […]

Read more
  • network system

Important things say three times: ARQ protocol

March 4, 2022 admin

I have encountered a problem recently. I bought a server in Ali Cloud and used it to build a “service service for Internet information”. My […]

Read more
  • network system

An example of accept_ra

March 4, 2022March 9, 2022 admin

In IPv6, Router Advertisement (referred to as RA) is a critical ICMP package, and Stateless AutoConf is relying on RA configuration IP address, the host […]

Read more
  • network system

Browser picture rendering optimization

March 3, 2022 admin

Why use the Height and Width properties to specify the image size Have you seen the content when the document is loaded, it will display […]

Read more
  • system architecture

Posts navigation

«Previous Posts 1 2 3 4 … 29 Next Posts»

Recent Posts

  • Second generation CDN architecture and ordinary CDN architecture
  • Cuckoo Filter: Design and Implementation
  • Agent service and overload protection
  • Thoughts on TCP Reliability, Talking about Application Layer Agreement Design
  • Website Optimize smaller static resources

Recent Comments

No comments to show.

Archives

  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021

Categories

  • network system
  • system architecture
  • website security