Recently again in the toss, often visit my blog friends may have appeared on the page 502 error hints, that is tossing CloudFlare CDN unsuccessful tips. In this first thanks to the jar, in his dedication and truth, last night finally successfully
Investigate how CVE-2015-5477 & CloudFlare Virtual DNS protects its users
Last week, ISC released a patch to fix a remote vulnerability in the BIND9 DNS server. This vulnerability causes the server to crash when processing a certain data packet.The
ConceptUsing the BPF (Berkeley Packet filter) toolset combined with the Iptables XT_BPF module enables high-performance packet filtering to address large-scale DDoS attacks. BPF Tools contains a simple set of Python scripts that are used to parse
Play games with hackers: Use CryptoWall tracker to mess up hacker actionsPreface:
In a TED speech, I personally demonstrated a game that interacts with 419 scammers-what happens after you reply to spam, so I also had the idea of playing a guerrilla
Recently, the official CloudFlare, and APNIC official cooperation with the IP1.1.1.1 to launch faster, more private DNS
Cloudflare runs one of the world's largest and fastest networks. APNIC is a nonprofit organization that manages IP
More than 10 years ago, an obscure Open-source Web server software was born, and more than 10 years later, its influence could rival Apache, attracting a large number of internet giants around the world, according to the US Wired magazine. He is the
18, Miscellaneous 1. Using shorthandParameter:-ZSome combination of parameters are often used, such as "--batch--random-agent--ignore-proxy--technique=beu", so write a large string is very bad to see, in Sqlmap, provides a shorthand way to shorten
New utility of php dos Vulnerability: CVE-2015-4024 Reviewed
0x01 how WAF is bypassedAccording to the principles of the php dos Vulnerability, when the multipart_buffer_headers function resolves the value corresponding to the header, there are n
HTTP 2.0 Introduction
HTTP 2.0, Hypertext Transfer Protocol 2.0, is the next generation HTTP protocol. was developed by the hypertext Transfer Protocol Bis (httpbis) Working Group of the Internet Engineering Task Force (IETF). Is the first update
Currently, the hearttbleed vulnerability of OpenSSL has been widely known: in OpenSSL, one of the most popular TLS implementations, the lack of a boundary check results in millions (or more) the Web server exposes various sensitive information in
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.