• Ms17-010 remote overflow vulnerability – Eternal Blue [cve-2017-0143]


    Ms17-010 remote overflow vulnerability (eternal blue) Ti:2019-12-25 By: Mirror Wang Yuyang MS17-010 CVE-2017-0143 MS17-010 CVE-2017-0144 MS17-010 CVE-2017-0145 MS17-010 CVE-2017-0146 MS17-010 CVE-2017-0148 Experimental preparation Loophole principle Ms17-010 vulnerability in kernel state functions in Windows SMB v1srv!SrvOs2FeaListToNtDeal withFEAThere is a buffer overflow on the large non paged kernel pool during the (file extended attributes) conversion. functionsrv!SrvOs2FeaListToNtWill beFEAList […]

  • Principle analysis | in depth understanding of Apache Flink’s network protocol stack


    By Nico kruber Translated by: Cao Yingjie Flink’s network protocol stack is one of the core components of the Flink runtime module and the core of every Flink job. It connects all subtasks of taskmanager, so the performance of Flink jobs, including throughput and latency, is critical. Unlike the control channel between taskmanager and jobmanager […]

  • Nine ways to copy files in Python


    Python has many ready to eat modules (such as OS, subprocess, and shutil) to support file I / O operations. In this article, you’ll see some special ways to copy files in Python. Let’s start to learn these nine different ways to implement Python copy file operation. Before you start, you have to understand why […]

  • Kafka source code analysis 3: recordaccumulator message storage


    Summary In the first two sections, I analyzed some source codes, but I didn’t share them for a month. The reason is that I encountered some problems in the in-depth reading, because I read the source code with kafkaproducer sending message (send method) as the entry to start line by line analysis. When new classes […]

  • “Black technology” behind Kafka, the hottest technology in big data development


    Kafka is an open source stream processing platform developed by Apache Software Foundation, which is widely used in data buffering, asynchronous communication, collection of logs, system decoupling, etc. Compared with other common message systems, Kafka not only guarantees most of the functional features, but also has outstanding performance in high throughput, low latency and other […]

  • Memcpy() to read and write the data in the circular buffer


    Using memcpy() function to read and write the circular buffer First, a brief introduction to mencpy function Here is the declaration of the memcpy() function   void *memcpy(void *str1, const void *str2, size_t n)ParameterSTR1 — points to the target array used to store the copied content, and the type is cast to void * pointer.STR2 — […]

  • The way of go concurrency – goroutine scheduling principle & Channel details


    Concurrency (parallelism) has always been one of the core topics in a programming language, and it is also the topic most concerned by developers. As a rich second-generation programming language with “high concurrency” halo since its debut, the concurrency (parallelism) programming of go language is definitely worth exploring by developers, and the concurrency (parallelism) programming […]

  • Java NiO buffer process details


    Preface Use Java NiO buffer when interacting with NiO channels As you know, data is read into the buffer from the channel and written to the channel from the buffer. A buffer is essentially a block of memory that can be written to data and then read again This memory block is contained in the […]

  • MySQL – InnoDB features – buffer pool


    Cache management is the core system of DBMS, which is used to manage the access, cleaning and expulsion of data pages. Although the operating system itself has page cache, it is not specially designed for the database, so most database systems manage the cache by themselves. Almost all data page accesses involve buffer pool, so […]

  • Preliminary exploration of serial port configuration under Linux


    First, inStructure termsBasic configuration of serial port (such asBaud rate setting, check bit and stop bit setting And so on. (One): struct termios   //The setting of serial port is mainly settingMembers of struct termios      { tcflag_t  c_iflag;  //input mode flags  Enter the mode flag. tcflag_t  c_oflag;  //output mode flags  Output mode flag tcflag_t  c_cflag;  //control mode flags  Control mode flag tcflag_t  c_lflag;  //local mode flags  Local mode flag. cc_t c_line; […]

  • What is the Buffer in Node.js?


    Most people have abilities and opportunities they don’t know about and are likely to do things they never dreamed of. — Dale Carnegie The children’s shoes that move from the front end to Node.js will be strange to this part of the content, because some simple string operations in the front end have met the […]

  • Four methods of avoiding carriage return by inputting single character in C language


    Use’ n’to shield the return sign in scanf (). scanf(“%d\n”, &n); scanf(“%c”, &c); 2. Add a space at the front of the scanf () format string to shield the return character. scanf(“%d”, &n); Scnf (“% c”, & c); //% C with a space in front, filter return 3. Use getchar () to read a carriage […]