Analyze HTTP requests to reduce the risk of HTTP smuggling attacks and HTTP data receiving asynchronous attacks

The words written in the front HTTP/1.1 has gone through a long development process from 1991 to 2014: HTTP/0.9– 1991HTTP/1.0– 1996HTTP/1.1RFC 2068– 1997RFC 2616- 1999RFC 7230- 2014 This means that various servers and clients in the Internet may have many security problems, which will also create opportunities for HTTP smuggling attack (HTTP ...

Added by billmasters on Sat, 26 Feb 2022 08:36:22 +0200

nginx source code analysis -- master and worker process model

1, Overall architecture of Nginx nginx in normal execution will have multiple processes. The most basic processes are master process (monitoring process, also known as main process) and woker process (working process), and possibly cache related processes. A relatively complete overall frame structure is shown in the figure: 2, Core proces ...

Added by Sulphy on Sat, 26 Feb 2022 08:17:12 +0200

ddns automatic refresh via HTTP API

Recommended in this article“ Free DDNS ”For free DDNS service at home, if you have wired commercial bandwidth and have no home bandwidth, you don't need to consider DDNS, unless it is business width, which is DHCP public network IP. Such business width is generally used for illegal trading. There are many people, such as business wi ...

Added by nenena on Fri, 25 Feb 2022 05:53:40 +0200

Java learning notes day24 network programming

Network programming summary Under the network communication protocol, programs running on different computers can transmit data Three elements IP address: the address of the equipment in the network, which is the unique identification;Port: the unique identification of the application in the device;Protocol: the rules of data transmission i ...

Added by veridicus on Thu, 24 Feb 2022 20:03:58 +0200

Use PyTorch to build ResNet50 network

Friends who have seen my previous ResNet18 and ResNet34 may wonder whether the method of building 18 and 34 layers can be directly used in the construction of ResNet above 50 layers. I have also tried. However, the network construction above ResNet50 is not like 18 to 34 layers, which can be completed by simply modifying the number of convoluti ...

Added by bateman on Thu, 24 Feb 2022 18:33:46 +0200

VLAN and layer 3 switch

Daily share: Any restriction starts from your heart. 1, Concept and advantages of VLAN 1. Split broadcast domain 1) Physical segmentation: divide the network into several small networks physically, and then connect different networks with routing equipment that can isolate broadcasting to realize communication. 2) Logical segmentatio ...

Added by erika_web on Thu, 24 Feb 2022 07:22:41 +0200

netty -- sticky package and half package problem

netty(3) – stick pack and half pack problem What is TCP sticky packet and half packet? Suppose the client sends two data packets D1 and D2 to the server respectively. Since the number of bytes read by the server at one time is uncertain, there may be the following four situations. The server reads two independent data packets, D1 an ...

Added by t_miller_3 on Thu, 24 Feb 2022 07:12:25 +0200

Embedded Linux Development - root file system NFS network mount

1. Preface The root file system is the first file system mounted after the Linux kernel is started. As described in the previous article, how to use busybox to make the root file system. This article introduces how to make the kernel find the file system after the root file system is successfully made, complete the mount, and enter the system ...

Added by dv_evan on Wed, 23 Feb 2022 18:43:27 +0200

GPS positioning system - Android terminal

preface GPS series - Android terminal, github project address tag: gps_mine Android mobile terminal mainly uses Gaode map positioning, uploads positioning information in the background, and then tries to keep it alive as much as possible. It includes two small functions: 1. Upload positioning information; 2. Simulate positioning information ...

Added by zurron on Wed, 23 Feb 2022 08:55:25 +0200

Analysis of Huawei network security discussion

Topic expression As shown in the figure, FW1 and FW2 are active and standby HA, FW1 is active access, FW2 is standby access, FW3 and FW4 establish IPSec VPN tunnel with FW1 and FW2 through isp1 line. When isp1 line fails, use standby ISP2 line, FW1 and FW2 establish VPN tunnel, in which FW3 is located behind NAT equipment, and the external ...

Added by mega77 on Tue, 22 Feb 2022 08:22:15 +0200