MQTT protocol message broker service public network remote connection

Article directory Preface 1. Building Mosquitto on Linux 2. Install Cpolar on Linux 3. Create the MQTT service public network connection address 4. The client remotely connects to the MQTT service 5. Code calls MQTT service 6. Fixed connection TCP public network address 7. Fixed address connection test Foreword Mosquitto is an open source message […]

[[FIFO to BRAM IP interconnection, that is, AXIstream is transferred to the verilog code on BRAM]]

FIFO to BRAM IP interconnection, that is, AXIstream is transferred to the verilog code on BRAM control.v module control #( parameter TDATA_WIDTH = 32 , parameter BRAM_A_ADDR_WIDTH = 15 , parameter BRAM_din_WIDTH = 32 , parameter BRAM_B_ADDR_WIDTH = 15 )( input [TDATA_WIDTH – 1 : 0] tdata , input tvaild, input sys_clk, input sys_rst_n , […]

SVN server construction in Linux environment and integration with intranet penetration to achieve remote connection

Article directory Preface 1. Install SVN service on Ubuntu 2. Modify configuration file 2.1 Modify the svnserve.conf file 2.2 Modify passwd file 2.3 Modify authz file 3. Start the svn service 4. Intranet penetration 4.1 Install cpolar intranet penetration 4.2 Create tunnel mapping local port 5. Test public network access 6. Configure a fixed public […]

Springboot interface current limit to prevent connection point attacks

Article directory summary Overall architecture process Explanation of technical terms technical details summary Summary Use aop aspect + redis to implement interface current limit, IP limit, and prevent repeated submission Overall architecture process Tips: Use aop aspect + redis to implement interface current limit, IP limit, and prevent repeated submission Interface file package com.bzfar.config; import […]

Vulnerability anti-connection detection combination: intranet penetration and multi-protocol reuse port

http://Yaklang.io anti-connection technology three axe Anti-connection service Multi-protocol port multiplexing Intranet penetration What is anti-connection? Why do it Many times, when we perform vulnerability detection, we cannot determine whether a vulnerability exists through the information returned by the application. But if the command/special operation is indeed executed, how do we prove that the command or […]

Android connection bluetooth example

Android connection Bluetooth process (complete code at the end) Declare permissions 1) Declare permissions in the AndroidManifest manifest file (Note: Searching for Bluetooth requires location permission!!) <uses-permission android:name=”android.permission.BLUETOOTH” /> <uses-permission android:name=”android.permission.BLUETOOTH_ADMIN” /> <uses-permission android:name=”android.permission.BLUETOOTH_CONNECT” /> <uses-permission android:name=”android.permission.BLUETOOTH_SCAN” /> <uses-permission android:name=”android.permission.ACCESS_FINE_LOCATION” /> <uses-permission android:name=”android.permission.ACCESS_COARSE_LOCATION” /> 2) Apply for runtime permissions if (ContextCompat.checkSelfPermission(this, Manifest.permission.BLUETOOTH_SCAN) != PackageManager.PERMISSION_GRANTED ) […]

Print database query results to the web page, the database connection is based on Druid

First write an EmpDao interface, which has a method to query all data package com.sun.test; import java.util.List; public interface EmpDao { public List<Emp> findAll(String name,String sex); } Write an implementation class to implement this interface and inherit our BaseDao, which is full of encapsulated add, delete, modify and query statements in the database. package com.sun.test; […]

Detailed steps for virtual machine creation and connection

Article directory What is a virtual machine? Step 1: Choose virtualization software 1.1 VirtualBox 1.2 VMware Workstation 1.3 VMware Player 1.4 Hyper-V Step 2: Create a virtual machine 2.1 Open the virtualization software 2.2 Create a new virtual machine 2.3 Configure the virtual machine 2.4 Install operating system 2.5 Start the virtual machine Step 3: […]