Importance of data security

data security Data security has two opposite meanings: one is the security of data itself, which mainly refers to the active protection of data by using modern cryptographic algorithms, such as data confidentiality, data integrity, two-way strong identity authentication, etc.; the other is the security of data protection, which mainly uses ...

Posted by JimStrosky on Fri, 12 Nov 2021 01:31:04 -0800

thymeleaf template injection problem vulnerability

Introduction: thymeleaf is recommended as a template engine in Spring Boot because thymeleaf provides perfect spring mvc support. Thymeleaf is a java class library. It is a template engine of xml/xhtml/html5, which can be used as the view layer of mvc web applications. 1, Problem Description: the content displayed on the user page can be tampe ...

Posted by Cultureshock on Wed, 10 Nov 2021 07:21:25 -0800

"Principles and practice of network security technology" Chapter 6 buffer overflow attack - textbook experiment

Why didn't my stack overflow??? I've been learning binary and garbage hydrology recently. Just smile "Principles and practice of network security technology" Chapter 6 buffer overflow attack - textbook experiment Case code Let's read the code on the book first #include<stdio.h> #include<string.h> #include<windows.h ...

Posted by kraadde on Tue, 09 Nov 2021 18:37:21 -0800

2021-11-06 hadoop security mode

1 what is safe mode Security mode is a special state of HDFS. In this state, the file system only accepts data read requests, but does not accept change requests such as deletion and modification. When the namenode master node is started, HDFS first enters the safe mode. When the datanode is started, it will report the available block and oth ...

Posted by Thumper on Sat, 06 Nov 2021 11:06:32 -0700

CAS, escorting concurrent security at the hardware level

1, Foreword 2, CAS operation 2.1 AtomInteger class ensures atomicity Both synchronized and Lock are pessimistic locks. Here we learn a CAS operation, which is a lightweight Lock. There is an ABA problem in CAS operation. If the shared variables are one-way accumulation, this problem does not exist. If there are addition and subtraction, ...

Posted by e11even on Wed, 03 Nov 2021 12:21:52 -0700

Database security -- a brief analysis of SQLMap source code

directory structure Let's sort out the directory structure: here is the latest version of sqlmap 1.4.3.12 I downloaded 1. The data directory contains graphical interface templates that can be built, shell back door (the code inside is encrypted), udf rights lifting function, database injection detection load, etc 2.doc directory is the instr ...

Posted by Zmodem on Sun, 31 Oct 2021 03:51:36 -0700

Getting started with Spring Security

Getting started with Spring Security 1, Use of Spring Security 1.1 basic terms Spring Security is a powerful and highly customizable authentication and authorization framework. It is a set of Web security standards for spring applications. Spring Security focuses on providing authentication and authorization functions for java applicatio ...

Posted by tunari on Sat, 30 Oct 2021 00:00:24 -0700

New section of PE document

catalogue What values in the PE file will be affected by the new section? To add a new section: Add section manually Code new section If you need to build a shellcode at one end in the PE file (when the remaining space in the default section area is insufficient), you can solve this problem by adding a section. Usually, most shelling soft ...

Posted by mastermike707 on Thu, 28 Oct 2021 05:27:54 -0700

Code implementation of AES encryption algorithm

Code implementation of AES encryption algorithm Job objectives The AES encryption algorithm is implemented in C language and optimized to the fastest speed. Algorithm description Introduction to AES AES (Advanced Encryption Standard) is the most common symmetric encryption algorithm, also known as Rijndael encryption method. It is a block ...

Posted by trazan on Mon, 25 Oct 2021 07:18:14 -0700

[SHA256 of security algorithm] C language source code implementation of SHA256 abstract operation

summary As we all know, the summary algorithm is also a particularly important existence in the security field, and SHA256 is one of the most common summary algorithms. Its characteristic is that it has low computational complexity. The equal length summary value can be obtained by inputting the original text of unequal length data, which ...

Posted by stuartc1 on Fri, 22 Oct 2021 20:04:40 -0700