Several kinds of common cryptographic attacks in WEB
reference resources: https://www.freebuf.com/articles/database/151167.html
https://www.jianshu.com/p/7f171477a603Because it involves cryptography, I have a big head. Let's record it.Padding oracle attack and CBC flip byte attackXOR (XOR)What is XOR?
XOR is an operation method, which is briefly summarized as the same false different truetrue xor ...
Added by PrinceOfDragons on Fri, 11 Feb 2022 10:14:07 +0200
Introduction to the use of sqlmap
1, sqlmap get target1. Introduction to SQL injectionThe so-called SQL injection is to cheat the server to execute malicious SQL commands by inserting SQL commands into the web form to submit or enter the query string of domain name or page request.
Specifically, it is the ability to inject SQL commands into the background database engine by usi ...
Added by robert_a89 on Fri, 11 Feb 2022 10:13:47 +0200
Express security verification -- password encryption and authentication
bcrypt password encryption
In practical applications, it is not safe to store user passwords directly in plaintext. Here is how to use password parsing and parsing
Installing the bcrypt module
yarn add bcrypt
Encryption and parsing function You need to encapsulate promise to avoid errors caused by asynchrony
exports.hash = (myPlaintex ...
Added by wellmoon on Fri, 11 Feb 2022 10:10:44 +0200
JUCxu Learning Arrangement
JUC Knowledge Point-Complete Set
What is juc?
java.util.concurrentjava.util.concurrent.locksLock-related API sjava.util.concurrent.atomicAtomic operation apiThread Safe and Flexible
JUC classification summary?
lockReentrantLock, ReadWriteLock, StampedLock, Wait for Condition notification, Block wake-up LockSupportAtomsBasic Type, Array Type, ...
Added by printf on Fri, 11 Feb 2022 09:54:44 +0200
Several common postures for handling exceptions in SpringBoot
1. Use @ ControllerAdvice , and @ ExceptionHandler , to handle global exceptions
This is a commonly used method at present, which is highly recommended. Junit 5 is used in the test code. If you create a new project to verify the following code, remember to add relevant dependencies.
1. Create an exception information entity class
Non essen ...
Added by panic! on Fri, 11 Feb 2022 09:49:32 +0200
Operating system: banker algorithm
Report Download Code download
1. Problem description
1.1 banker algorithm
The applicant shall state in advance the maximum demand for various resources. When dynamically applying for a certain type of resources during process activities, the system reviews whether the number of existing resources in the system can meet the maximum demand of ...
Added by ryanbutler on Fri, 11 Feb 2022 09:48:15 +0200
New version of silly girl + docking onebot protocol + docking Qinglong tutorial
70% of this article is reprinted and 30% is supplemented. Original text: 2022 new and complete version of Qinglong panel docking robot, and silly girl docking onebot(oicq) protocol realizes robot function_ Dabei's Programming Notes blog - CSDN blog_ Qinglong panel qq robot
Solve bash: /root/sillyGirl/sillyGirl: insufficient permissions and ws ...
Added by akillez on Fri, 11 Feb 2022 09:46:13 +0200
MyBatis learning: advanced query (one-to-one mapping)
1, One to one mapping
Suppose that in the permission system, a user can only have one role, that is, the relationship between users and roles is limited to one-to-one relationship.
1.1 handling one-to-one relationships using automatic mapping
A user has a role. We add the role class SysRole field in the user class SysUser. As follows:
publi ...
Added by djelica on Fri, 11 Feb 2022 09:45:56 +0200
Python digital analog notes Sklearn sample cluster analysis
1. Classification of classification
Classification of classification? Yes, there are different kinds of classification, and it is often confused in the fields of mathematical modeling and machine learning.
First of all, let's talk about Supervised learning and Unsupervised learning. Does it mean that there are no teachers and Discipline Inspe ...
Added by semlabs on Fri, 11 Feb 2022 09:33:14 +0200
Dynamic web pages - reverse analysis + cases
Introduction: this chapter mainly explains the related technologies of dynamic web page crawling. The crawling of dynamic web pages mainly includes reverse analysis method and simulation method. Today, we will mainly introduce the reverse analysis method. Later, we will focus on the use of selenium Library in the simulation method.
Dynamic ...
Added by JonathanS on Fri, 11 Feb 2022 09:32:07 +0200