Kubernetes introduction to proficient | kubernetes cluster security - Authentication
Authorization
The above authentication process only confirms that both sides of the communication confirm that the other party is trusted and can communicate with each other. Authentication is to determine which resources the requestor has. API Server currently supports the following authorization policies (set through the startup parameter &q ...
Posted by dgudema on Thu, 10 Mar 2022 13:44:45 +0100
nmap Tutorial - 2 - Discovery Host
Discovery host refers to the host that detects activity in the network. Discovering hosts is the first and most important step in implementing penetration testing. Penetration testing can only be performed further if the target host is determined to be active. Hosts can be discovered in Nmap s in different ways, such as
IP discovery, ICMP d ...
Posted by AliasBDI on Wed, 09 Mar 2022 18:47:06 +0100
Sekiro + Xposed signature solution
1, Target
Previously introduced Public network ip update scheme of android real machine signature However, many friends left a message saying that there is no public ip in their ADSL, so they can't play.
To solve this problem, another solution is to use frp intranet penetration, but it is not very stable in the actual use process.
sekiro, wh ...
Posted by m4rw3r on Mon, 07 Mar 2022 19:28:12 +0100
Security test: Xiaomi (xiaomi.com) website SMS interface security test, how to protect the SMS interface?
- "hidden dangers are more dangerous than open fire, prevention is better than disaster relief, and the responsibility is heavier than Mount Tai"
preface
This paper introduces the security test process of sending SMS verification code interface in detail, including ideas, some test codes and test results. This test website ...
Posted by consolestrat on Mon, 07 Mar 2022 17:36:17 +0100
Process protection under r0
preface
The full name of SSDT is System Services Descriptor Table. This table is a link between the Win32 API of Ring3 and the kernel API of Ring0. SSDT not only contains a huge address index table, but also contains some other useful information, such as the base address of the address index, the number of service functions and so on. By modi ...
Posted by ThermalSloth on Mon, 07 Mar 2022 09:45:51 +0100
Operating system experiment -- process scheduling
Implementation of process scheduling algorithm Summary: The process scheduling algorithm is realized, including FCFS (first in first out), SPF (short process priority), HRRF (highest response ratio priority method) and HPF (priority method). A process management simulation system that allows n processes to run concurrently is designed. The syst ...
Posted by kennethl on Mon, 07 Mar 2022 05:54:46 +0100
Teach you the super cute navigation bar hand in hand
well! Hello, everyone. Today, let's make a lovely?? This demo is very basic, but it has a wide range of usage scenarios! As a front-end white, I'll teach you to realize it step by step today!
Realization effect
Look! This sliding effect is very interesting! I believe you must have thought about this sliding effect!
Implementation process
...
Posted by ereimber on Mon, 07 Mar 2022 01:50:39 +0100
Deep analysis of Java thread safety principle
Some novice or old java programmers know that accessing a shared variable under multithreading is non thread safe. The so-called non thread safe means that the modification of shared variables by thread a may not be visible to thread b. Direct example
// It is suggested that you can take a screenshot of the code and read it together with the t ...
Posted by Chinese on Sun, 06 Mar 2022 12:06:25 +0100
Sentinel integrates Nacos to realize dynamic rule configuration persistence and two-way synchronization
1. Why integrate Nacos
By default, Sentinel configuration rules are stored in memory. After the Sentinel service is re configured, the configuration will show that we realize the persistence of the configuration by integrating third-party middleware, such as using Nacos;
To realize the bidirectional synchronous persistence of Sentinel and ...
Posted by Afser on Sun, 06 Mar 2022 02:46:54 +0100
Specific case of springboot security, implementation of security framework, permission control, aop entry
Specific case of springboot security, implementation of security framework, permission control, aop entry
Introduction to springboot security
Security official Preface
Security is an ever-changing goal, and it is important to pursue a comprehensive and system wide approach. We encourage you to adopt additional layers of security in each area ...
Posted by maxsslade on Fri, 04 Mar 2022 10:34:27 +0100