Some time ago, there was a problem with the company's Android packaging service. The phenomenon is that when uploading the 360 server for reinforcement, it is very likely to get stuck in the upload stage, retry for a long time, and finally fail. I have conducted some troubleshooting and Analysis on this situation, solved this problem, wrote thi ...
Added by formxshape on Thu, 27 Jan 2022 20:34:19 +0200
The book is based on a simple scenario: the user enters a URL into the browser and returns the response, which is the life cycle of a network request.
The book is divided into six parts:
The application layer client generates HTTP and delegates it to the protocol stack of the operating systemThe protocol stack (TCP/IP module) calls the netwo ...
Added by countrydj on Thu, 27 Jan 2022 07:33:02 +0200
The general usage of Metasploit was described in the previous article, so this article focuses on the commands of the tool. Use it further, and follow and trust me if you are interested
Meterpreter System commands:
1,getuid Command: Used to return the captured or running user name on the target machine
2,getpid Command: used to return the curr ...
Added by dscuber9000 on Thu, 27 Jan 2022 03:43:00 +0200
As the most popular network request underlying framework at present, how to defeat other frameworks and be recognized by the majority of people? Compared with other network frameworks, it has the following advantages:
Support gizp compression and decompression of dataSupport http1 0,http2. 0,SPDY_ 3,QUICSupport network resp ...
Added by phpmoron on Thu, 27 Jan 2022 01:32:38 +0200
Python builds TCP communication
TCP/IP (Transmission Control Protocol/Internet Protocol) refers to a protocol cluster that can realize information transmission between multiple different networks. TCP/IP protocol refers not only to TCP and IP Two agreements, but one by FTP,SMTP,TCP,UDP The protocol cluster composed of, IP and ...
Added by EPCtech on Wed, 26 Jan 2022 22:22:54 +0200
as Figure 1 As shown in:
Routers PE1, P1, P2 and PE2 belong to the same autonomous system. They are required to achieve the purpose of IPv6 network interconnection through IS-IS protocol. PE1, P1, P2 and PE2 belong to IS-IS process 1 and are all Level-2 devices.
It is required to establish a two-way SRv6 BE path bet ...
Implement an RPC framework by hand
1, Introduction to RPC pre knowledge
1. What is RPC?
RPC is an abbreviation for Remote Procedure Call.
Suppose we have two servers A and B. an application deployed on server A wants to call the functions and methods of the application deployed on server B. because they are not in the same memory space, the ...
Added by gooman on Wed, 26 Jan 2022 00:17:00 +0200
BGP basic experiment
BGP is used and configured according to the logic of the real network environment; All PC s can communicate with each other.
Simulation connection diagram
1, Configure IP address
ip add 184.108.40.206 24
ip add 192.168.1.1 24
Added by nanban on Tue, 25 Jan 2022 15:21:17 +0200
netfilter Kernel Implementation overview
netfilter is the foundation of network firewall in Linux kernel. Whether it is iptables based on xtables, conntrack and nftables, its bottom layer is based on netfilter. In general, netfilter provides a relatively general firewall framework, which provides an entry through which other netwo ...
Added by bugcoder on Tue, 25 Jan 2022 08:08:45 +0200
Network optimization exercises
Among them, Dropout and Weight Decay are two methods that have been practiced in future experiments (fitting thematic). In this experiment, we will practice some other important network optimization methods.
(1) Small batch gradient drop (this section will discuss the setup of ba ...
Added by koldstar on Tue, 25 Jan 2022 07:25:54 +0200