various protocols

Learn about various protocols, we have the largest and most updated various protocols information on alibabacloud.com

Bestorm fuzz software cracking

A very important discipline in vulnerability mining is fuzz technology, including local parameters and network overflow. bestorm is a business software and industry leader in terms of network, which is also easy to use, in particular, tcp fuzz

Implementation of TCP/IP under Windows

The Windows implementation of the TCP/IP protocol is built on the OSI foundation of the previous blog post.The user state is implemented by Ws2_32.dll and some other service provider DLLs, in which Ws2_32.dll is a framework. Can accommodate a very

Is SDN always vulnerable to network security vulnerabilities?

Theoretically, SDN technology should bring about a safer network. Because, through virtual networks to programmable stacks, the network will become more flexible and operations should be more automated, which should mean less "fat finger"

Network Management for easy O & M (I)

Scenario: Mr. Zhang is a company's network administrator who manages many devices, including routing and switching. One day, he suddenly received a call from the user, saying he could not access the internet. After arriving at the scene, he found

Implementation of OpenSSL-Based Secure sessions

I. Overview SSLSSL (Secure Socket Layer) Secure Socket Layer. In the early days, netscape wanted various protocols working at the application Layer to implement data security during data transmission, the half-layer structure introduced between the

Libcurl library security

Woyigui blog The curl library is a free large client URL transfer library. The official description is as follows: ReferenceLibcurl is a free and easy-to-use client-side URL transfer library, supporting FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP,

How to test the hardware firewall system

A practice from the CERT (R) Security Improvement modular (http://www.cert.org/security-improvement) The purpose of this test is to know whether the firewall wants to work with our imagination. Before that, you must: · Develop a complete test plan

Sockets and WebSocket

This article was reprinted from: HTTP://ZENGRONG.NET/POST/2199.HTM1. OverviewAfter choosing the WebSocket technology, inevitably, I will compare it with other protocols and techniques. The most common is the need to compare WebSocket and HTTP,

SOAP Webservice and RESTful Webservice

Http://blog.sina.com.cn/s/blog_493a845501012566.htmlREST is an architectural style whose core is resource-oriented, rest is designed and developed for network applications to reduce the complexity of development and improve the scalability of the

Ring-letter IOS SDK Tutorials

: Http://www.easemob.com/downloadsSDK Directory Explained1. The packages downloaded from the official website are divided into the following four parts: The development and use of the ring-letter iOS SDK Ring Letter iOS Release note

Pcap file format and Wireshark

Pcap is a data packet capture library, which is used by many software as a data packet capture tool. Wireshark also uses the pcap library to capture data packets. The packets captured by pcap are not the original network byte streams, but are

Kafka implementation details (I)

If you read Kafka for the first time, read the distributed message system Kafka preliminary Some people have asked the difference between Kafka and general MQ, which is difficult to answer. I think it is better to analyze the implementation

Oracle Database Modeling and Design

Oracle is a relational database management system suitable for large-scale, medium-sized, and micro-computers. It uses structured guery language as its database language. SQL mainly includes three functions: Data Definition, data manipulation

Knowledge and capabilities of software designers

Computer Learning must go through a process of deepening understanding from theory to practice. Let's talk about my experiences in passing the software designer examination. Computer and software engineering knowledge in the software designer

IP protocol family

Download This part includes: • IP protocol family • IPv6 Chapter 2 IP protocol family Author: Mark A. sportack This chapter includes: • TCP/IP Model • Understand the I p Protocol • Understand the Transmission Control Protocol (t c p) • Understand

Python crawling web pages (1)-urllib/urllib2/requests

Document directory 1. Capture simple web pages 2. Download an object 3. basic use of urllib 4. basic use of urllib2 I recently learned Python again. Unfortunately, I didn't use it for work. I could only use my spare time to play it out.1.

Network Monitoring Tool for Windows CE (I)

Author: Ma Ning Recently, a software network connection problem has left me alone. The problem itself is not complex, mainly because of different network settings. In the debugging process, I used several network monitoring tools under Windows CE to

Linux Firewall (below): iptables extension module-l7-filter installation and function implementation

If you work as a network administrator in the company, the boss may ask you to block QQ and Xunlei. If you use iptables to implement these functions? First of all, we need to know that QQ and Xunlei are both specific services. When transmitting data,

Analysis of wince6.0 USB driver architecture

1. Role of the wince Device USB is a master-slave structure, which is divided into the master end and the slave end. Generally, the master end is called the host and the slave end is called the client, but there are some differences in the wince

Several packet capture tools on Mac

Cocoa packet Analyzer Http://www.tastycocoabytes.com/cpa/ Cocoa packet analyzer is a native Mac OS ximplementation of a network protocol analyzer and packet sniffer. CPA supportsthe industry-standard pcap packet capture format for reading, capturing

Total Pages: 15 1 .... 5 6 7 8 9 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.