Attack using MSF framework
Reproduce using official POC
Heartbleed (English: heartbleed), also referred to as heartbleed vulnerability, is a security vulnerability that appears in the encryption library OpenSSL, which is ...
Posted by weevil on Wed, 09 Feb 2022 03:32:35 +0100
Problem solving ideas:
The basic knowledge of tree array will not be repeated here. We only need to know that it can deal with interval maintainability and modifiable RMQ problems, which is more efficient.
The following is the operation of segment tree
Single point modification
void update(int x,in ...
Posted by franknu on Sat, 29 Jan 2022 15:26:36 +0100
Whimsical journey: my original blog is completely knocked by hand, absolutely not carried, and there can be no repetition in the whole network; I have no team, only share for technology lovers, and all content does not involve advertising. All my articles are only published in CSDN and personal blog (must be the domain name of fantasy journey). ...
Posted by dgwade on Sat, 22 Jan 2022 11:16:47 +0100
1, SSL introduction
SSL (Secure Socket Layer) uses data encryption, authentication and message integrity verification mechanisms to provide security assurance for application layer protocols based on reliable connections such as TCP.
The functions provided by SSL protocol mainly include:
1. Confidentiality of data transmission: use symmetric ...
Posted by cornercuttinjoe on Fri, 21 Jan 2022 13:07:09 +0100
This article is based on Linux operating system demonstration. Preparations: server with public IP (CentOS7), apply for a domain name, apply for SSL certificate for the domain name, and bind the server's public IP with the domain name.
1, Download and install Nginx
Nginx download website: http://nginx.org/en/download.html Baidu online di ...
Posted by snowrhythm on Fri, 14 Jan 2022 10:01:22 +0100
😘 This article explains how to install the Docker container Nginx on a Linux system and use Nginx to proxy HTTPS encryption requests. If you don't want such a complex configuration, you can use it pagoda For one-click deployment, automatic acquisition of SSL certificates, etc., this article is purely manual configuration of SSL certifi ...
Posted by rbragg on Wed, 12 Jan 2022 18:23:23 +0100
How to build centos7 Mini platform step by step and deploy SSH Remote Login
First, you have to download an image of centos7 minimum. I downloaded it on the official website
I took an empty U SB flash drive, which is small, so I decided to download centos7 minimum.
An assistant for installing USB flash dis ...
Posted by dexhaven on Fri, 31 Dec 2021 06:15:07 +0100
Build encrypted web service https httpd+mod_ssl
To implement encryption authentication, this security module is called mod_ssl
yum install mod_ssl -y
After installation, an SSL is generated under the sub configuration module Conf file
Go to view the configuration items in the file
Listen 443 ht ...
Posted by cash09 on Fri, 31 Dec 2021 01:39:04 +0100
We know that to implement https, MQTT and other protocols, communication security is required, and the client must support tls certificates.
However, it seems that we don't need to pay attention to tls when we open the computer and mobile browser to visit https website every day?
The answer is that the browser manufacturer has helped us to be ...
Posted by salasilm on Mon, 27 Dec 2021 09:58:05 +0100
Original title website
For some reason, this website will not be accessible
1045. Medicine Collection - original website
Chenchen is a gifted and intelligent child. His dream is to become the greatest doctor in the world. To this end, he wanted to learn from the most prestigious doctors nearby. The doctor gave him ...
Posted by psychohagis on Mon, 20 Dec 2021 07:34:50 +0100