Importance of data security
data security
Data security has two opposite meanings: one is the security of data itself, which mainly refers to the active protection of data by using modern cryptographic algorithms, such as data confidentiality, data integrity, two-way strong identity authentication, etc.; the other is the security of data protection, which mainly uses ...
Posted by JimStrosky on Fri, 12 Nov 2021 01:31:04 -0800
thymeleaf template injection problem vulnerability
Introduction: thymeleaf is recommended as a template engine in Spring Boot because thymeleaf provides perfect spring mvc support. Thymeleaf is a java class library. It is a template engine of xml/xhtml/html5, which can be used as the view layer of mvc web applications.
1, Problem Description: the content displayed on the user page can be tampe ...
Posted by Cultureshock on Wed, 10 Nov 2021 07:21:25 -0800
"Principles and practice of network security technology" Chapter 6 buffer overflow attack - textbook experiment
Why didn't my stack overflow???
I've been learning binary and garbage hydrology recently. Just smile
"Principles and practice of network security technology" Chapter 6 buffer overflow attack - textbook experiment
Case code
Let's read the code on the book first
#include<stdio.h>
#include<string.h>
#include<windows.h ...
Posted by kraadde on Tue, 09 Nov 2021 18:37:21 -0800
2021-11-06 hadoop security mode
1 what is safe mode
Security mode is a special state of HDFS. In this state, the file system only accepts data read requests, but does not accept change requests such as deletion and modification.
When the namenode master node is started, HDFS first enters the safe mode. When the datanode is started, it will report the available block and oth ...
Posted by Thumper on Sat, 06 Nov 2021 11:06:32 -0700
CAS, escorting concurrent security at the hardware level
1, Foreword
2, CAS operation
2.1 AtomInteger class ensures atomicity
Both synchronized and Lock are pessimistic locks. Here we learn a CAS operation, which is a lightweight Lock. There is an ABA problem in CAS operation. If the shared variables are one-way accumulation, this problem does not exist. If there are addition and subtraction, ...
Posted by e11even on Wed, 03 Nov 2021 12:21:52 -0700
Database security -- a brief analysis of SQLMap source code
directory structure
Let's sort out the directory structure: here is the latest version of sqlmap 1.4.3.12 I downloaded 1. The data directory contains graphical interface templates that can be built, shell back door (the code inside is encrypted), udf rights lifting function, database injection detection load, etc 2.doc directory is the instr ...
Posted by Zmodem on Sun, 31 Oct 2021 03:51:36 -0700
Getting started with Spring Security
Getting started with Spring Security
1, Use of Spring Security
1.1 basic terms
Spring Security is a powerful and highly customizable authentication and authorization framework. It is a set of Web security standards for spring applications. Spring Security focuses on providing authentication and authorization functions for java applicatio ...
Posted by tunari on Sat, 30 Oct 2021 00:00:24 -0700
New section of PE document
catalogue
What values in the PE file will be affected by the new section?
To add a new section:
Add section manually
Code new section
If you need to build a shellcode at one end in the PE file (when the remaining space in the default section area is insufficient), you can solve this problem by adding a section. Usually, most shelling soft ...
Posted by mastermike707 on Thu, 28 Oct 2021 05:27:54 -0700
Code implementation of AES encryption algorithm
Code implementation of AES encryption algorithm
Job objectives
The AES encryption algorithm is implemented in C language and optimized to the fastest speed.
Algorithm description
Introduction to AES
AES (Advanced Encryption Standard) is the most common symmetric encryption algorithm, also known as Rijndael encryption method. It is a block ...
Posted by trazan on Mon, 25 Oct 2021 07:18:14 -0700
[SHA256 of security algorithm] C language source code implementation of SHA256 abstract operation
summary
As we all know, the summary algorithm is also a particularly important existence in the security field, and SHA256 is one of the most common summary algorithms. Its characteristic is that it has low computational complexity. The equal length summary value can be obtained by inputting the original text of unequal length data, which ...
Posted by stuartc1 on Fri, 22 Oct 2021 20:04:40 -0700