Python full stack Web security attack and Defense 2. Information collection and sqlmap introduction

Article directory 1, Real IP address collection 1.CDN introduction 2. Judge whether there is CDN (i.e. whether it is a real IP) 3. bypass CDN 2, shodan introduction and search 1. Information collection method 2. Introduction to Shodan search engine 3.shodan registration, login and search 3, Intro ...

Posted on Wed, 12 Feb 2020 07:54:56 -0800 by faheemhameed

apache configuration file httpd.conf security related configuration

1, Configure virtual host httpd.conf two required options (centos 6.9) LoadModule vhost_alias_module modules/mod_vhost_alias.so #Open module, default is on NameVirtualHost *:80 #Open NameVirtualHost, default is off 1. Based on ip address Configure a new ip address for eth0 [root@redwand conf]# ...

Posted on Tue, 11 Feb 2020 04:25:07 -0800 by vamosbenedikt

OpenSSL and implementation of private CA to realize certificate application issuing

2 OpenSSL OpenSSL is an open source software library package, which can be used by applications to communicate securely, avoid eavesdropping, and confirm the identity of the other end of the connection. This package is widely used in web servers on the Internet The main library is written in C language ...

Posted on Mon, 10 Feb 2020 04:33:27 -0800 by Thoughtless

Encapsulate POI excel export and realize export by configuring xml template

In business system development, business data is usually exported to excel. If only one or two business functions are exported, we can directly write code to realize it. However, if there are many different business data to be exported, if we build workbook s, sheet s, row s and cell s through code, i ...

Posted on Mon, 10 Feb 2020 00:12:56 -0800 by ngu_tri

Mirror Management, Port Mapping, Container Interconnection for Docker Containers

Layer of docker image Each instruction in the Dockerfile creates a new mirror layer; The mirror layer will be cached and reused; When the instructions of the Dockerfile are modified, the copied file changes, or the variables specified when the image is built are different, the corresponding mirror layer cache will fail. When the mirror cache ...

Posted on Sun, 09 Feb 2020 14:14:03 -0800 by py343

Spring Boot: Custom starter

In Spring Boot, the most commonly used is the starter. Starter can be understood as a pluggable plug-in. For example, if you want to use jdbc plug-in, you can use Spring Boot Starter jdbc. As the version goes on, the starter family grows. In the traditional Maven project, some layers and components are usually divided into modules to manage, so ...

Posted on Sun, 09 Feb 2020 10:33:04 -0800 by allanonschick

Host list for ansible, yml syntax, playbook details + operations

Contents of this chapter:inventory host list2. yml grammar3. playbook Details + Operations inventory host list ansible The default host list is/etc/ansible/hosts file //Host lists can be set manually or generated dynamically through Dynamic Inventory //Use FQDN for generic hostname vi /etc/ansible/hosts [webserver] #Square bracket set ...

Posted on Sun, 09 Feb 2020 09:28:59 -0800 by cybercrypt13

SpringBoot integrated Log4j

(1) Add dependency in pom.xml <!--Remove springboot Default log--> <dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter</artifactId> <exclusions> <exclusion> <groupId>org.spri ...

Posted on Sun, 09 Feb 2020 07:07:54 -0800 by Arc

Spring transaction-04-isolation and propagation-3-TransactionTemplate

1, use Template classes that simplify the definition of procedural transactions and transaction exception handling. The central approach is{ @link #execute}, implementation supported{ @link Transaction code for the transactioncallback} interface. This template handles the transaction life cycle and possible exceptions, such as the transaction ...

Posted on Sun, 09 Feb 2020 06:11:44 -0800 by entropicsinkhole

Kafka consumer multithreaded implementation

Kafka Producer, the producer of Kafka, is thread-safe, whereas consumer KafkaConsumer is non-thread-safe.KafkaConsumer defines an acquire() method to detect if only one thread is currently operating and throws a ConcurrentModifycationException exception if other threads are operating: java.util.Co ...

Posted on Thu, 06 Feb 2020 19:46:51 -0800 by HUWUWA