In the enterprise mentioned in the data protection, we may often think of documents, few people will...
Technique
In the memory addressing principle article, i introduced the basic knowledge of memory addressing , the memory...
Memory addressing principle In the network security incident analysis, will encounter memory addressing knowledge. Today, i am going...
Today, big data platform, big data analysis, big data applications have been developed in full swing. Our...
In the case of project management with Git, there are some frequently encountered problems that are complicated...
Recently, security researchers have discovered a new malware. The malware, like WannaCry extortion software, spreads itself by...
What is a robots.txt file? Search engine through a program robot (also known as spider), automatically access...
A Fork Bomb is a denial of service attack in the computer field using a system call...
SSH automatically encrypts and decrypts the network data between all SSH clients and the server. This process...
WEB Fuzz is a special form of network protocol fuzzy test, dedicated to follow the HTTP specification...
Browser Fingerprint Tracking is a way to track users over the past five years. In order to...
As you knew, php7 is set by default on Kali Linux 2016.2. For some reasons, you need...
Data mining is a concept first realized when businesses began storing important information on computer databases and...
Analysis of HTTPS SSL Encryption SSL (Secure Socket Layer): Netscape company is designed for WEB security transmission protocol. From...
IP Addresses Short for Internet Protocol address, an IP or IP address is a number (example shown...