web: Actively scan Nmap

Table of Contents 1. What is Nmap 2. Basic usage of Nmap 1. Scan a single device 2. Scan multiple devices with discontinuous IP addresses 3. Scan multiple devices with IP addresses in a continuous range 4. Scan devices across the entire subnet 3. Use Nmap for port scanning 1. What is a port? 2. […]

9. idSpanMap uses radix tree instead of the original unordered_map 10. Performance comparison before and after using radix tree

9. idSpanMap uses a radix tree instead of the original unordered_map Our original idSpanMap used the unordered_map hash bucket in the STL container. Because the STL container itself does not guarantee thread safety, we need to lock it when accessing to ensure thread safety. This is the performance of the memory pool we wrote. bottleneck […]

5.2.17. Dynamic mapping operation LED request_mem_region and ioremap; iounmap unmapping and release_mem_region release the requested memory

5.2.17. Dynamic mapping operation LED 5.2.17.1. How to establish dynamic mapping (1) request_mem_region, Apply (report) to the kernel for memory resources that need to be mapped. (2) ioremap, is really used to realize the mapping, pass it the physical address, and he will map and return a virtual address for you 5.2.17.2. How to destroy […]

nmap remote management and monitoring

expected update Chapter 1 nmap Vulnerability Scanning Basic principles and techniques of nmap vulnerability scanning Common options and parameters for nmap vulnerability scanning Practical case of nmap vulnerability scanning Chapter 2 nmap network detection and mapping Basic principles and techniques of nmap network detection and mapping Common options and parameters for nmap network detection and […]

Application of nmap in cloud security

expected update Chapter 1 nmap Vulnerability Scanning Basic principles and techniques of nmap vulnerability scanning Common options and parameters for nmap vulnerability scanning Practical case of nmap vulnerability scanning Chapter 2 nmap network detection and mapping Basic principles and techniques of nmap network detection and mapping Common options and parameters for nmap network detection and […]

com.fasterxml.jackson.databind.JsonMappingException: Undeclared general entity “mdash” ultimate solution

Questions When using jackson’s xml conversion object tool class, there are special characters in xml, jackson fails to recognize and convert, and reports an error! ! ! Reason According to XML, XML processors are not guaranteed to process the external DTD subset referenced in the DOCTYPE. This means, for example, that using entity references for […]