Principles and practical combat of CSRF vulnerabilities in network security, as well as CSRF vulnerability protection methods

1. Introduction Generally speaking, CSRF is a deceptive behavior and a malicious use of a website. Although it sounds like cross-site scripting (XSS), it is very different from XSS, and the attack method is almost the same. XSS exploits trusted users within a site, while CSRF exploits trusted websites by disguising requests from trusted users. […]

Section 9 Windows Class Protection Evaluation Server Configuration Modification

Table of Contents 1. Server password restrictions 2. Service remote management 3. Turn on the logging function 4. Clear identification information 5.SSL/TLS protocol information leakage 5.1.tomcat disables 3DES and DES algorithms: 5.2.nginx disables 3DES and DES algorithms: 6. Terminal Services is not using Network Level Authentication (NLA) 7. Microsoft Windows Remote Desktop Protocol service program […]

Spring Security Vulnerability Protection-HttpFirewall and HTTPS

1. HttpFirewall Spring Security has several areas where the patterns you define are tested against incoming requests to determine how the request should be handled. This happens when the FilterChainProxy decides which filter chain the request should pass through, and when the FilterSecurityInterceptor decides which security constraints apply to the request. When testing against a […]

iOS_Crash 4: Crash capture and protection

Article directory 1.Crash capture 1.2.NSException 1.2.C++ exceptions 1.3.Mach exception 1.4.Unix signals 2.Crash protection 2.1. Method not implemented 2.2.KVC causes crash 2.3.KVO causes crash 2.4. Collection class causes crash 2.5. Other scenarios that require attention: 1.Crash capture According to the different sources of Crash, it is divided into the following three categories: 1.2.NSException Application layer exceptions, […]

Apache ShardingSphere 5.4.1 version is released, data encryption has been upgraded to provide a higher level of data protection!

Summary ShardingSphere Apache ShardingSphere ushered in the release of version 5.4.1 this week. This version lasted for more than two months and merged a total of 967 PRs from global teams and individuals. The new version has improved functionality, performance, testing, and documentation. , examples and other aspects have been greatly optimized. This update contains […]

Spring Security vulnerability protection-HTTP security response header

1. Default Security Header Spring Security provides a default set of secure HTTP response headers to provide secure defaults. While each of these headers is considered a best practice, it should be noted that not all clients use these headers, so additional testing is encouraged. You can customize specific headers. For example, suppose you want […]

[Microservice Protection] Sentinel Flow Control Rules – In-depth exploration of Sentinel’s flow control mode, flow control effects, and flow limiting of hotspot parameters

Article directory Preface 1. Quickly master the use of Sentinel 1.1 What is a cluster point link? 1.2 Simple usage example of Sentinel 2. Sentinel flow control mode 2.1 Direct mode 2.2 Association mode 2.3 Link mode 3. Flow control effect 3.1 Fail fast 3.2 Preheating mode 3.3 Waiting in line 4. Flow control of […]

Kernel IO stack | Bounce buffer, bio segmentation, integrity protection and current storage

line17 ※1 Bounce buffer The function of the blk_queue_bounce function is to try to create a bounce buffer. It is usually necessary to create such a special area when the memory area given by bio is at an address that is not reachable by the peripheral device (such as performing DMA on high-end memory) to […]

SpringCould Microservice Protection 01 – Download and use the Sentinel component

1. First introduction to Sentinel 1.1. Avalanche problems and solutions 1.1.1. Avalanche problem In microservices, the calling relationships between services are complex, and one microservice often depends on multiple other microservices. As shown in the figure, if service provider I fails, part of the current application’s business will also be blocked because it depends on […]