Tag:security
-
Is it better to use Linux for enterprise information security?
Many factors need to be considered when choosing an operating system, and one of the most critical factors is security. The general consensus of experts is that Linux is one of the most secure operating systems in design, which can be attributed to many factors, including its transparent open source code, strict user permission model, […]
-
Extreme experience: the role and practice of verification code in black ash production confrontation
Sharing guest: Liu haozhen’s extreme experienceEditor: sunxiaoqing Tsinghua UniversityProduction platform: datafuntalk, AI enlightener Guide: with the development of Internet technology, the confrontation between black and gray products on the network is becoming increasingly fierce. In the dynamic game of black and gray industry, the verification code plays an important role in raising the threshold of […]
-
[mysql] implementation of PHP IP login restrictions
When logging in, for businesses with high security, you need to restrict the specified IP or IP segment to log in. Some enterprise mail enterprises restrict the login only in their own enterprises At this time, design a database to realize this function Table structure: CREATE TABLE `iplimit_list` ( `id` int(10) unsigned NOT NULL AUTO_INCREMENT, […]
-
Talk about the security and performance of data in distributed system
In distributed systems, we know thatCap theoremandBase theory, the security and performance of data are negatively correlated. If the security of data is improved, its performance will decline. If the performance is improved, the security of data will decline. We will discuss this problem from several middleware. mysql When there is a bottleneck in MySQL […]
-
SQL server user’sa’login failed
The reason for the error should be that the SQL server authentication mode was not selected when installing SQL server. I remember that I only selected the windows authentication mode at that time. In this case, connecting to the database with the SA account will cause an error, as shown in the following figure: The […]
-
How to make PHP code more secure
catalogue summary Ultra vires loophole 1. Horizontal ultra vires 2. Vertical ultra vires 3. Context ultra vires The token of JWT needs secondary encryption LFI (local file contains) XSS CSRF (Cross Site Request Forgery) summary An attacker sends a malicious SQL command to the database by constructing it. If the program does not perform judgment […]
-
At the end of the year, is your MySQL password secure
preface: At the end of the year, should your database be inspected? Generally, patrol inspection will be concerned about password security, such as password complexity setting, whether there is regular modification, etc. In particular, the evaluation organization will be required to have a password security policy when conducting equal assurance evaluation. In fact, the MySQL […]
-
Windows11 operating system official version of win11 image system
Windows 11 has all the features and security of windows 10, as well as a redesigned look. It also comes with new tools, sounds and applications. All the details are complete. The combination of appearance, function and security will bring you a new computer experience.
-
Strategic cooperation between non convex technology and Northeast Securities
The first “Calendula Cup” private placement competition of Northeast Securities in 2022 will be grandly opened on May 16. On this occasion, non convex technology, as a strategic cooperation unit for technical support, has cooperated with Northeast Securities to create a service ecosystem covering the whole life cycle of the institution, bringing a new algorithm […]
-
Mutually exclusive lock and read-write lock of thread safety in go language
catalogue 1、 What is a mutex? 1. Concept 2. Unlocked 3. After locking 2、 Read write lock [efficiency revolution] 1. Why is the efficiency of read-write lock high 2. Usage 3、 Sync once 1.sync. Once generation background 2.sync. Overview of once mechanism 3.sync. Once pay attention 4. Usage 4、 Atomic packet operation preface: In a […]
-
Ctfshow [King’s Cup] (Part I)
The competition ended as early as the end of February. In fact, I wanted to write WP for a long time, but there are many knowledge points that have not been written, so they have been delayed until now. easy unserialize <?php /** * @Author: F10wers_13eiCheng * @Date: 2022-02-01 11:25:02 * @Last Modified by: F10wers_13eiCheng […]