Super detailed how to configure VRRP tracking interface
Configure the tracking interface and authentication of VRRP
Principle overview:
When there is a problem with the uplink interface of the Master device of VRRP, and the Master device remains Active, the network will be interrupted. Therefore, the operation status of VRRP must be associated with the uplink ...
Posted by shu on Mon, 22 Nov 2021 23:09:40 -0800
TCP/IP Network Programming Notes
Chapter 1 understanding network programming and sockets
1.1 understand network programming and sockets
1.1.1 network programming and socket overview
Network programming: write programs to enable two networked computers to exchange data with each other.
socket: a software device used for network data transmission.
Network programming ...
Posted by coolbeansdude51 on Sun, 21 Nov 2021 11:01:45 -0800
[security vulnerability] rdecms-5.8.1 SSTI template injection leads to RCE
Vulnerability type
SSTI RCE
Utilization conditions
Scope of influence application
Vulnerability overview
On September 30, 2021, Steven Seeley, a foreign security researcher, disclosed an SQL injection vulnerability and an RCE vulnerability caused by SSTI in the latest DedeCMS version. Because the utilization conditions of SQL injection vul ...
Posted by gacon on Sat, 20 Nov 2021 06:57:18 -0800
Add routing table entry for IPv4
The following IP commands add routing table entries. By default, routes are added in the main routing table:
# ip route add 19.1.0.0/16 via 192.168.9.1
#
# ip route show table main
19.1.0.0/16 via 192.168.9.1 dev ens34
Kernel function inet_rtm_newroute handles the addition of routes. Function rtm_to_fib_config converts netlink data to kern ...
Posted by misfits on Fri, 19 Nov 2021 14:03:54 -0800
Use Socket in java to complete TCP protocol or UDP protocol communication
Use Socket in java to complete TCP protocol or UDP protocol communication
Introduce TCP and UDP
Two types of transmission protocols: TCP; UDP
TCP is the abbreviation of Tranfer Control Protocol. It is a connection oriented protocol to ensure reliable transmission. Through TCP protocol transmission, we get a sequential error free data stream. ...
Posted by cafrow on Thu, 18 Nov 2021 23:32:15 -0800
curl get request time statistics
When testing http services, you usually use curl to send http requests to the server. Curl will simulate the browser's request and help you establish a tls/ssl connection with the server. Sometimes we want to get the time-consuming in the request process to optimize the client experience. At this time, we usually use the - w parameter of curl. ...
Posted by creekriot on Tue, 16 Nov 2021 22:21:40 -0800
Actual combat | use Windows API to bypass process protection
Launched in Qianxin attack and Defense Community
Article address: https://forum.butian.net/share/817
preface
Recently, when studying a digital kill software, I saw a configuration option:
img
This self-protection actually loads the 360SelfProtection.sys driver (see the name should also have the 360SelfProtection_win10.sys file), Fengga ...
Posted by KPH71 on Tue, 16 Nov 2021 20:12:39 -0800
Chapter 10 network protocol and management configuration
3.5.7 sub network division
Sub network division: divide a large network (with more hosts) into multiple small networks (with less hosts), reduce the number of host ID bits, increase the number of network ID bits, and borrow the network ID bit from the host ID bit
The number of subnets divided is determined by the bits borrowed from the host I ...
Posted by Darghon on Tue, 16 Nov 2021 02:00:41 -0800
cfadmin - write high-performance server and client instances
Reading this article requires readers to have at least a basic knowledge of C/C + + network programming and how to use the basic Socket API
At the same time, readers should have at least used cfadmin framework and be proficient in using built-in library to complete simple business logic writing
Students interested in this article can also Off ...
Posted by hash1 on Fri, 12 Nov 2021 20:29:31 -0800
Network programming -- multicast and broadcasting
reference resources
TCP/IP network programming Yin Shengyu
Multicast and broadcasting
Multicast
Multicast data transmission is based on UDP. The difference from the implementation of UDP server / client is that UDP data is transmitted to a single target, while multicast data is transmitted to a large number of hosts joining (registering) a ...
Posted by tom92 on Wed, 10 Nov 2021 23:23:26 -0800