SSRF uses gopher to attack mysql and Intranet

SSRF uses Gopher 0X01 foreword After studying the application of Gopher protocol for one day, I decided to write a summary about the SSRF utilization of Gopher protocol. Reference link: https://blog.csdn.net/qq_41107295/article/details/103026470 0X02 overview SSRF (server side request forgery) se ...

Added by dipenmistry on Tue, 23 Jun 2020 08:03:47 +0300

Using Redis to implement the cut-to-program operation

This project is a Spring boot project Redis Cutting Programming Target: Add a comment to the method to cache when querying Method: Custom Note+AOP Section Programming step Say nothing but go directly to the code demonstration Step One Definition Notes @Retention(RetentionPolicy.RUNTIME) @Target( ...

Added by Bad HAL 9000 on Tue, 23 Jun 2020 05:27:47 +0300

DB2 database varchar field to int field problem

Paste my code first: SELECT BELONG_INSTN_COD AS DEPT_ID, SUM(BALANCE) AS BAL, CASE WHEN length(CERT_ID) = 15 THEN '19' || SUBSTR(CERT_ID, 7, 6) ELSE SUBSTR(CERT_ID, 7, 8) END AS BIRTH_DATE, CASE WHEN length(CERT_ID) = 15 THEN SUBSTR(CERT_ID, 9, 2) ELSE SUBSTR(CERT_ID, 11, 2) END AS MM, CASE WHEN length(CERT_ID) = 15 THEN SUBSTR(CERT_ID ...

Added by sharpnova on Sun, 21 Jun 2020 19:12:14 +0300

Hacker attack and defense of station B [network security] - record

cc attack: for applications, such as malicious swipe verification code DDoS attack: for servers, such as a large number of http requests, malicious access with large traffic Note source station B video (Knowledge Area > wild Technology Association)Hacker attack and defense: from entry to access to y ...

Added by FoxhoundX on Sun, 21 Jun 2020 12:11:09 +0300

04GORM source code interpretation

brief introduction query Query process Build query SQL statement Conditional statement Summary search structure Definition of search search method Summary summary brief introduction GORM source code interpretation, based on v1.9.11 edition. query In the previous section, we explored how models are defined and how data tables are creat ...

Added by champoi on Sun, 21 Jun 2020 12:01:47 +0300

CURD basic operation of MongoDB

Note: This paper is based on MongoDB 4.2.6 1. Delete Delete a document > db.bb.find().pretty() { "_id" : ObjectId("5ed6549830571733ccb3d678"), "jordan" : 23, "haha" : "ending" } { "_id" : ObjectId("5ed6549830571733ccb3d679"), "kobe" : 24, "haha" : "ending" } > db.bb.remove({jordan: 23}) ...

Added by StefanRSA on Sun, 21 Jun 2020 09:46:27 +0300

RocketMQ for reliable message final consistency

RocketMQ for reliable message final consistency Business description In this case, RocketMQ middleware is used to realize the final consistent distributed transaction of reliable messages and simulate the transfer transaction process of two accounts. Two accounts are in different banks (Zhang San is ...

Added by legomez2000 on Sun, 21 Jun 2020 09:31:11 +0300

Packaging Helm diagrams using Operator technology and deploying them to K8S clusters

Preface In " Packaging and deploying complex applications to the k8s cluster using helm "In this article, we package the application as a chart with helm, which simplifies the deployment process. However, while helm supports Seamless Upgrades for Stateless Applications on the line of Basic Install, replacing the mirrored version to ta ...

Added by kevin_newbie on Fri, 19 Jun 2020 19:26:51 +0300

If BigDecimal is not used properly, the boss's loss will still be deducted from your salary

Yunqi information:[ Click to see more industry information]Here you can find the first-hand cloud information of different industries. What are you waiting for? Come on! We have basically formed a common sense that we need to use BigDecimal instead of others where money is needed, and we all know that floating-point variables will lose precisio ...

Added by keiran420 on Thu, 18 Jun 2020 11:53:31 +0300

How to Design High Performance Distributed Locks

What is a distributed lock? In a JVM, where multiple threads are concurrent, we can use synchronous or Lock locks to ensure that only one thread can modify shared variables or execute code blocks at a time.However, our services are deployed on a distributed cluster basis, and for some shared resources, the use of Java locks in a distributed en ...

Added by gersh on Wed, 17 Jun 2020 19:51:19 +0300