Super detailed how to configure VRRP tracking interface

  Configure the tracking interface and authentication of VRRP Principle overview:         When there is a problem with the uplink interface of the Master device of VRRP, and the Master device remains Active, the network will be interrupted. Therefore, the operation status of VRRP must be associated with the uplink ...

Posted by shu on Mon, 22 Nov 2021 23:09:40 -0800

TCP/IP Network Programming Notes

Chapter 1 understanding network programming and sockets 1.1 understand network programming and sockets 1.1.1 network programming and socket overview Network programming: write programs to enable two networked computers to exchange data with each other. socket: a software device used for network data transmission. Network programming ...

Posted by coolbeansdude51 on Sun, 21 Nov 2021 11:01:45 -0800

[security vulnerability] rdecms-5.8.1 SSTI template injection leads to RCE

Vulnerability type SSTI RCE Utilization conditions Scope of influence application Vulnerability overview On September 30, 2021, Steven Seeley, a foreign security researcher, disclosed an SQL injection vulnerability and an RCE vulnerability caused by SSTI in the latest DedeCMS version. Because the utilization conditions of SQL injection vul ...

Posted by gacon on Sat, 20 Nov 2021 06:57:18 -0800

Add routing table entry for IPv4

The following IP commands add routing table entries. By default, routes are added in the main routing table: # ip route add 19.1.0.0/16 via 192.168.9.1 # # ip route show table main 19.1.0.0/16 via 192.168.9.1 dev ens34 Kernel function inet_rtm_newroute handles the addition of routes. Function rtm_to_fib_config converts netlink data to kern ...

Posted by misfits on Fri, 19 Nov 2021 14:03:54 -0800

Use Socket in java to complete TCP protocol or UDP protocol communication

Use Socket in java to complete TCP protocol or UDP protocol communication Introduce TCP and UDP Two types of transmission protocols: TCP; UDP TCP is the abbreviation of Tranfer Control Protocol. It is a connection oriented protocol to ensure reliable transmission. Through TCP protocol transmission, we get a sequential error free data stream. ...

Posted by cafrow on Thu, 18 Nov 2021 23:32:15 -0800

curl get request time statistics

When testing http services, you usually use curl to send http requests to the server. Curl will simulate the browser's request and help you establish a tls/ssl connection with the server. Sometimes we want to get the time-consuming in the request process to optimize the client experience. At this time, we usually use the - w parameter of curl. ...

Posted by creekriot on Tue, 16 Nov 2021 22:21:40 -0800

Actual combat | use Windows API to bypass process protection

Launched in Qianxin attack and Defense Community Article address: https://forum.butian.net/share/817 preface Recently, when studying a digital kill software, I saw a configuration option: img This self-protection actually loads the 360SelfProtection.sys driver (see the name should also have the 360SelfProtection_win10.sys file), Fengga ...

Posted by KPH71 on Tue, 16 Nov 2021 20:12:39 -0800

Chapter 10 network protocol and management configuration

3.5.7 sub network division Sub network division: divide a large network (with more hosts) into multiple small networks (with less hosts), reduce the number of host ID bits, increase the number of network ID bits, and borrow the network ID bit from the host ID bit The number of subnets divided is determined by the bits borrowed from the host I ...

Posted by Darghon on Tue, 16 Nov 2021 02:00:41 -0800

cfadmin - write high-performance server and client instances

Reading this article requires readers to have at least a basic knowledge of C/C + + network programming and how to use the basic Socket API At the same time, readers should have at least used cfadmin framework and be proficient in using built-in library to complete simple business logic writing Students interested in this article can also Off ...

Posted by hash1 on Fri, 12 Nov 2021 20:29:31 -0800

Network programming -- multicast and broadcasting

reference resources TCP/IP network programming Yin Shengyu Multicast and broadcasting Multicast Multicast data transmission is based on UDP. The difference from the implementation of UDP server / client is that UDP data is transmitted to a single target, while multicast data is transmitted to a large number of hosts joining (registering) a ...

Posted by tom92 on Wed, 10 Nov 2021 23:23:26 -0800