Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Our favorite gadgets of 2018 [Year in Review]

2018 has been an amazing year for Apple products, but there were a bunch of other tech companies that put out some incredible new gadgets that we’ve fallen in love with. Instead of focusing on the...

View Article



Image may be NSFW.
Clik here to view.

【安全帮】黑客利用漏洞从美国政府支付系统获利170万美元

Facebook 被曝从第三方 App 收集数据:涉及位置信息...

View Article

Image may be NSFW.
Clik here to view.

2018 in cybersecurity: Regrets, we have a few

There were cops unlocking iPhoneswith corpses. Australia mandated backdoors. Applecame out swinging against accusations they were infiltrated by Chinese spy chips. Japan's Cybersecurity minister said...

View Article

Image may be NSFW.
Clik here to view.

How Much of Your Security Is Based on Assumptions Instead of Evidence?

The Verodin team and I have spent many quarters traveling all across the US and abroad. When we’ve been out there giving talks, we’ve also been collecting security statistics from hundreds of audience...

View Article

Image may be NSFW.
Clik here to view.

The Technology of “Influence” Part 3 The Onion Browser

Introduction In my novel “ Influence ”, the lead character J@ck Tr@de performs various hacking tasks. In the book he spends a lot of time securing his connections, hiding his identity and hiding his...

View Article


Image may be NSFW.
Clik here to view.

Solidity中的sha256/keccak256如何正确传参

今天遇到一个需求:用户传递一个字符串过来,跟当前的时间拼在一起取哈希值,作为唯一标识。 举个例子,假如用户传递的字符串是abc,当前时间是123,我们来看看标准答案: $ echo -n 'abc123' | shasum -a 256 6ca13d52ca70c883e0f0bb101e425a89e8624de51db2d2392593af6a84118090...

View Article

Image may be NSFW.
Clik here to view.

这篇1993年写就的《加密叛军》 今天依然值得一读

加密货币和区块链的成功,离不开行业先驱的前仆后继。 译者 | Moni 编辑 | 卢晓明 出品 | Odaily星球日报(ID:o-daily) 编者按:本文原名《加密叛军》,首发于 1993 年 Wired,作者 Steven Levy,也是《黑客》的作者,讲述了一段斗争者如何为网络隐私保护争取绝对隐私、及现今被广泛使用的公私钥加密算 法的诞生故事。...

View Article

Image may be NSFW.
Clik here to view.

Deep Learning For Security Cameras Part 1

This is part 1 of a series of posts on my experience trying to build a object detection setup for my home security cameras. Here I'm going over some preliminary results and talking about the history to...

View Article


Image may be NSFW.
Clik here to view.

What is an Active Directory Forest?

An Active Directory forest (AD forest) is the top most logical container in anActive Directory configuration that contains domains, users, computers, and group policies. “But wait?” you say. “I...

View Article


Image may be NSFW.
Clik here to view.

How is Diffie-Hellman Key Exchange Different than RSA?

How is Diffie-Hellman Key Exchange Different than RSA? kdobieski Fri, 12/21/2018 10:37 The Diffie-Hellman Key Exchange Diffie-Hellman key exchange , also called exponential key exchange, is a method of...

View Article

Image may be NSFW.
Clik here to view.

CNCERT:2018年11月我国DDoS攻击资源月度分析报告

本月重点关注情况 1、本月利用肉鸡发起DDoS攻击的控制端中,境外控制端最多位于美国;境内控制端最多位于江苏省,其次是贵州省、广东省和浙江省,按归属运营商统计,电信占的比例最大。 2、本月参与攻击较多的肉鸡地址主要位于江苏省、广东省、山东省和福建省,其中大量肉鸡地址归属于电信运营商。2018年以来监测到的持续活跃的肉鸡资源中,位于山东省、福建省、江苏省占的比例最大。...

View Article

Image may be NSFW.
Clik here to view.

7 Business Metrics Security Pros Need to Know

These days, security has to speak the language of business. These KPIs will get you started. 1 of 8 (Image: Moritz320 ) Peter Drucker, aka the founder of modern management, is credited with writing,...

View Article

Image may be NSFW.
Clik here to view.

Serverless Identity Security

Is there a serverless identity security solution worth considering? As more IT management tools move to the cloud, IT admins are searching for innovative IAM solutions to help protect their...

View Article


Image may be NSFW.
Clik here to view.

有些病毒都成精了 可监视宿主行为协调发动攻击

病毒与为其提供生存环境的宿主(细菌)之间,总是上演着“猫捉老鼠”的游戏。一旦发现病毒的踪迹,宿主的免疫系统就会启动,誓要将它们赶尽杀绝。 对此,病毒也绝不会束手待毙。最新研究显示,通过监视宿主行为,有些病毒可交换信息,等待时机,然后协调行动。 图:普林斯顿大学生物学家邦妮巴斯勒(Bonnie Bassler)与学生贾斯汀西尔普(Justin Silpe)发现,有些病毒可监视宿主行为,并协调发动攻击...

View Article

Image may be NSFW.
Clik here to view.

Hot Off the Press: Splunk's 2019 Security Predictions Are Here!

Predicting the future of security is no easy feat. Technological and organizational requirements are constantly changing, threats are emerging with no end in sight, and security resources are as...

View Article


getting SSL error on GeddyJs using Heroku PG on dev environment

i am using GeddyJs with a heroku cedar app deployment. I am using Heroku Postgres services for the database. I have configured the username/password/hostname/dbname in the config file on geddyjs but...

View Article

Image may be NSFW.
Clik here to view.

2019年五大攻击形式和数据泄露的八大预测

任何公司企业都免不了数据泄露事件。但这些事件会以哪种形式出现?攻击者是怎么获得访问权的?他们会窃取或破坏什么?到底是什么驱使着他们尝试这些攻击?数据泄露的本质和后果在来年会有怎样的改变?在此,业界专家们就网络罪犯明年入侵网络盗取数据的目标、途径和原因作出了他们的预测。 五大攻击形式 1. 汽车网络攻击将可能致命...

View Article


Image may be NSFW.
Clik here to view.

Google Cloud Platform + Hacker Noon

Heyo Hacker, very excited to announce thatHacker Noon has joined the Google Cloud for Startups program, which provides high growth companies cloud credits (up to $100K), technical support, and access...

View Article

PowerShell and SHA512 SSL Certificates

It’s a beautiful weekend, and I thought hey lets get something quick done in the home-lab before going out to the movies %). The other guy on the other end (the lab) says: DREAM ON!!! I’m tinerking...

View Article

Image may be NSFW.
Clik here to view.

Developing Secure Android Apps.

I’ve been developing android apps for over 3 years now and I’m also a security enthusiast. During this journey, most of the new talks and blogs in the Android community were talking about the new shiny...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images