Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Securing Spring Microservices with Keycloak Part 2

In thefirst part we setup a local Keycloak instance. In this blog we will see how we can leverage Keycloak to secure our frontend. For this purpose we will create a small Spring Boot application that...

View Article



SMG Comms Chapter 13: Sender and Receiver

~ This is a work in progress towards an Ada implementation of Eulora's communication protocol. Start withChapter 1.~ This chapter adds to SMG Comms a thin wrapper package that effectively rescues the...

View Article

Image may be NSFW.
Clik here to view.

Hacker News book suggestions

Analyzing Hacker News book suggestions inpython An analysis of an Hacker News thread, using Python, Hacker News API and Goodreads API, and the definitive top 20 book suggestion list! Alessandro Mozzato...

View Article

Refactoring C Code: Going to Async I/O

Now that I have a good idea on how to use OpenSSL andlibuvtogether , I’m going to change my code to support that mode of operation. I have already thought about this a lot, and the code I already have...

View Article

Image may be NSFW.
Clik here to view.

微信小程序黑客马拉松落幕,28小时见证27个小程序从0到1诞生!

2018 年 12 月 16 日下午,由腾讯公司微信事业群主办的「WeGeek 微信小程序黑客马拉松」(WeGeek Hackathon)在北京顺利闭幕。 WeGeek Hackathon 是面向全球小程序开发者、爱好者的黑客马拉松,旨在通过微信小程序平台进行小程序的创新开发,共同建设小程序生态。 WeGeek Hackathon,最酷的Mini Program Creators聚集地 本次...

View Article


Red Team Assessment Phases: Completing Objectives

The purpose of this phase of the assessment is fairly self-explanatory. In previous phases, the red team performed the operations necessary to set themselves up for success in achieving the goals of...

View Article

Image may be NSFW.
Clik here to view.

Security Features in SQL Server 2017

Microsoft has a number of security features in SQL Server 2017 that are useful for different purposes, depending on what you are trying to protect and what threat(s) you are trying to protect against....

View Article

Image may be NSFW.
Clik here to view.

Signal Sciences Named a 2018 Gartner Peer Insights Customers’ Choice for Web...

Distinction based on end-user ratings of their experience purchasing and using Signal Sciences next-gen WAF CULVER CITY, Calif. (BUSINESS WIRE) lt;a href=”https://twitter.com/hashtag/DevOps?src=hash”...

View Article


Industrial IoT platform gets updates from Pulse Secure

A new version of Industrial IoT platform, Pulse Secure version 9.0R3 aims to help their customers secure industrial IoT and streamline maintenance activities for greater production line output. Pulse...

View Article


Pure Storage: ML leads to high NPS

Pure Storage uses machine learning to help its customers' systems run better, and some of its customers use Pure Storage arrays to make their machine learning systems run better. Each Pure Storage...

View Article

Image may be NSFW.
Clik here to view.

T-Mobile and Sprint merger officially cleared by US national security panel,...

It wasreported on Friday that T-Mobile and Sprint would likely receive approval from U.S. national security officials for their $26 billion merger. The Wall Street Journal reports that T-Mobile was...

View Article

Image may be NSFW.
Clik here to view.

Akamai Received Top Scores in Gartner’s New Report "Critical Capabilities for...

Are you in the process of selecting a web application firewall (WAF) or thinking about whether your current solution is adequate? For many organizations selecting the right WAF to protect their...

View Article

Image may be NSFW.
Clik here to view.

使用钓鱼lnk针对英国、瑞士金融、贸易公司的定向攻击活动

一、 概述 近日,腾讯御见威胁情报中心在日常的恶意文件运营中,发现了几个可疑的钓鱼lnk(伪装成快捷方式文件的攻击程序)。经过分析发现,这些lnk构造巧妙,全程无PE文件落地(Fileless攻击),并且把解密key和C2存放在了twitter、youtube等社交站点上。...

View Article


How to get the current user in a Spring Security reactive (WebFlux) and...

When developing an application, we sometimes need to access the currently logged in user programmatically. In this post, we’ll discuss how to do that when using Spring Security ― both in non-reactive...

View Article

S2-001 漏洞详细分析

0x00 前言 阅读本文需要具备的知识: 熟悉J2EE开发, 主要是JSP开发 了解Struts2框架执行流程 了解Ognl表达式 如果你不具备这些知识, 阅读这篇文章将会是一场艰难的旅行. 0x01 漏洞复现 影响漏洞版本: WebWork 2.1 (with altSyntax enabled), WebWork 2.2.0 - WebWork 2.2.5, Struts 2.0.0 -...

View Article


Image may be NSFW.
Clik here to view.

什么样的漏洞可以要你一条命

以前,雷锋网 (公众号:雷锋网) 宅客频道(微信ID:letshome)编辑写过一篇《 什么样的漏洞买得起北京二环一套房? 》,给出了好几条因洞致富的途径,最近,我重新审视这个问题,引发了一个新疑问,什么样的漏洞会要你一条命? 一条新闻很快回答了我。 本文作者:李勤,雷锋网网络安全专栏作者,微信:qinqin0511 “飞马”出动的蝴蝶效应 10 月 2...

View Article

Image may be NSFW.
Clik here to view.

【安全帮】微软如何查获内部泄密者:套路让人防不胜防

摘要: 30国4万用户的政府服务登录凭证被盗4万多名钓鱼攻击受害者政府服务的在线账户被盗,且这些信息可能已被在暗网黑客论坛上出售。Group-IB 公司的研究员发现这些登录数据可以访问全球30个国家的服务。该公司表示这些受攻陷凭证是研究人员通过检测和逆向工程恶意软件以... 30 国 4 万用户的政府服务登录凭证被盗...

View Article


Image may be NSFW.
Clik here to view.

警告!千万别叫你的电脑感染这几种黑客技术

大家知道,黑客可以未经授权访问非机密信息,如信用卡详细信息,电子邮件帐户详细信息和其他个人信息。因此,了解一些常用于以未经授权的方式获取您的个人信息的黑客技术也很重要。今天小编就给大家介绍几种常见的黑客技术。 1.诱饵和开关 使用诱饵和切换黑客技术,攻击者可以在网站上购买广告位。之后,当用户点击广告时,他可能会被定向到感染了恶意软件的网页。这也是大家最容易中毒的方法之一...

View Article

Image may be NSFW.
Clik here to view.

手机不慎摔落时,这款“安全气囊”想保护你的手机安全落地

大概每个人都经历过手机摔落的场景, 你可能需要花大几百甚至上千元更换摔碎的屏幕,或者发现手机已经报废了。 可是,如果给手机加上一个“安全气囊”呢? 德国Aalen大学工程师Philip Frenzel,设计了一种手机“主动防护”装置, 当手机不慎掉落时,它会从手机的四角,迅速的弹出八个卷曲的弹片,包括手机不会与地面直接撞击,同时起到弹性缓冲的作用。...

View Article

Image may be NSFW.
Clik here to view.

Memes, messengers, and missiles: From Twitter to chat apps and weapons,...

RoundupWe are now firmly into the holiday season, the Christmas parties are kicking off, and folks are swapping their Excel files for eggnog, or something cliched like that. So, let's have a quick...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images