MQTT (Message Queuing Telemetry Transport) is a "lightweight" communication protocol based on Publish / Subscribe mode. The protocol is built on TCP/IP L4 Layer and released by IBM in 1999. It is a Publish / Subscribe message protocol designed for remote devices with low hardware performance and scenarios with poo ...
When executing a program in multi process mode, you need to create a process before forking
//Create a process and return the number of the process in the program
//Return process number
Child processes and parent processes shar ...
Posted by jpschwartz on Thu, 24 Feb 2022 09:08:40 +0100
Server communication process
1,adopt socket()Function to create a to receive a connection request socket
2,To construct the host connection address sockaddr_in structural morphology,include sin_family,sin_port,sin_addr Three members
3,binding sockaddr_in Structure and socket
4,adopt listen()Function will stocket Set to listenin ...
Posted by mdemetri2 on Wed, 23 Feb 2022 02:59:37 +0100
Design and implementation of network chat program
1. Understand Socket The principle of communication, learn to use Socket for simple network programming, and write a chat program on this basis.
2. Understand Qt programming and be familiar with C + + language.
1. Background knowledge
Posted by intenz on Fri, 11 Feb 2022 09:24:44 +0100
Introduction before chapter
This chapter focuses on the basic concept of switch, spanning tree protocol STP, content of switch table, switch configuration, switch mode, switch VLAN configuration, virtual LAN technology and switch STP configuration
Test point 1: basic concept of switch
1. Basic concepts LAN switch is a network co ...
Posted by etingwall on Sun, 06 Feb 2022 22:16:46 +0100
Analysis of CSRF and XSS
Bloggers recently had an interview and encountered a question: * * What are the principles of CSRF and XSS? How to prevent CSRF and XSS** Because the blogger didn't understand this part deeply enough, the answer in the interview was not comprehensive enough. Today, let's discuss the mystery behind CSRF and X ...
Posted by dazz_club on Sun, 30 Jan 2022 05:22:08 +0100
introduction: After entering the intranet, it is a point-to-line and then face-to-face test. First, find out the current machine situation, such as the role in the domain and the services provided; Then use this as a springboard to collect information from other machines. When enough information is collected, the higher the possibility of winni ...
Posted by inutero on Wed, 19 Jan 2022 12:48:11 +0100
Gongzong No.: Black palm A blogger who focuses on sharing penetration testing, hot spots in the hacker circle and hacker tool technology area!
During intranet penetration, a WebShell or CobaltStrike, Metasploit, etc. are just the beginning. It is more about moving horizontally within the intranet, expanding the results and reaching ...
Posted by Crashin on Sat, 15 Jan 2022 23:04:25 +0100
Self use ~ do not spray
4.1.1 overview of network layer functions
*Overview of network layer functions
The packet is transmitted from the source end to the destination end to provide communication services for different hosts in the packet switching network
*Network layer functions
1.Routing and forwarding
2.Heterogeneous network int ...
Posted by Panthers on Sun, 09 Jan 2022 09:51:40 +0100
Simulate BGP group attribute policy configuration instance using eNSP
As shown in the figure There are two user network segments in AS 300 When users in AS 100 access these two network segments It is hoped to realize traffic sharing on R2 and R3 When AS 200 accesses these two network segments It is hoped that traf ...
Posted by gth759k on Mon, 03 Jan 2022 10:14:37 +0100