1. Quote MySQL is a widely used relational database management system. For any enterprise or individual, data security and continuity are crucial. Backup and recovery are one of the important means to protect data security and achieve business continuity. This article will introduce the importance of MySQL backup and recovery, the selection of backup strategies, […]
Tag: uri
How to understand and select optimistic locks and pessimistic locks during back-end development?
The author was asked this practical question when participating in a soft opening interview at a bank, so I came here to learn and summarize it. To get straight to the point, when choosing between pessimistic locks and optimistic locks, you need to consider the specific application scenarios: Pessimistic locking is suitable for scenarios where […]
“Network Security” How to build a MySQL malicious server to read files?
Foreword Note: This article does not involve research on MySQL protocol messages. It only explains the principles and does some demonstrations. Although the threshold for direct use of building a MySQL malicious server to read files is relatively high, I personally feel that it is relatively new because I saw a relatively new way of […]
iManager&cloud suite supports configuring kingbase
Author yangjunlin Foreword More and more secret-related units have gradually increased their requirements for the Xinchuang environment, and service applications are also increasingly dependent on domestic databases. The open source database in the SuperGraph iManager for k8s product is replaced with domestic databases such as Kingbase. Customer needs and scenarios will follow. Therefore, this article […]
SpringSecurity front-end and back-end separation
1. Create the vue front-end framework http://t.csdnimg.cn/jRcInhttp://t.csdnimg.cn/jRcIn After creation, use the tool to open and download axios, element-ui Then import axios and element-ui in the global configuration. I also have interceptors and paging plug-ins. import axios from “axios”; import ElementUI from ‘element-ui’; import ‘element-ui/lib/theme-chalk/index.css’; // For back-end projects http://localhost:8080 //axios sets a default path // […]
RABC permission model and Spring Security
Today, I’m going to take you into an area full of strategy and excitement-permission battles. In this battle, our protagonists are the RABC permission model (Role-Based Access Control) and Spring Security. Together, they will create a safe and stable world for us. Permission model: the maker of game rules First, we compare the permission model […]
SpringbootSecurity login verification (front-end and back-end separation)
1. What is jwt The full name of JWT is JSON Web Token. If you understand it literally, it feels like a token based on the JSON format for network transmission. In fact, JWT is a compact Claims declaration format, designed for transmission in space-limited environments, common scenarios such as HTTPAuthorization request header parameters and […]
Interface test series – interface security test
The “Open Source Web Application Security Project” (OWASP) released the top ten API security risks “OWASP API Security Top 10” in 2019: failed object-level authorization, failed user authentication, excessive data exposure, lack of resources and rate limits, Broken function-level authorization, bulk allocation, security misconfigurations, injections, improper asset management, and insufficient logging and monitoring are among […]
React technical principles and code development practice: Configuring and using Webpack in React projects
Author: Zen and the Art of Computer Programming 1. Background Introduction React is one of the most popular front-end frameworks at the moment, and some basic knowledge about it has been released on its official website. React developers are increasingly joining the ranks. There are a large number of articles involving React in many places, […]
WEB Security (Command Execution) Note 2
Foreword A command execution vulnerability is a security vulnerability that allows an attacker to execute malicious system commands. This vulnerability typically occurs when an application or system does not properly validate user input, allowing the user to execute system commands by entering specific data. The occurrence of vulnerabilities is usually related to the following factors: […]