Introduction to java network programming and project practice
java network programming
1.1 general
Global village: you are in Xi'an, you are an American friend! How do you communicate with each other?
1.11 take a chestnut for sending letters
The address of the other party, and the other party's information is located to a specific individual. Own address, own information With the above elements, rega ...
Posted on Wed, 27 Oct 2021 11:09:53 -0400 by GeoffOs
linux uses socket to realize simple network programming
brief introduction
Socket is an interprocess communication mechanism (socket IPC) under Linux. As mentioned earlier, using socket IPC can enable communication between applications on different hosts (network communication). Of course, it can also be different applications on the same host. Socket IPC usually uses the mode of client < - > ...
Posted on Tue, 26 Oct 2021 04:31:07 -0400 by fxmzb123
STM32 serial communication based on MDK 5
1, Serial port protocol and RS-232 standard
1. Serial port protocol
Serial communication refers to a communication mode between peripherals and computers that transmits data by bit through data signal line, ground wire, control line, etc. Serial communication protocol refers to the relevant specifications that specify the content of data ...
Posted on Mon, 25 Oct 2021 11:02:04 -0400 by sdotsen
Kept - "brain fissure" monitoring
Introduction to cerebral fissure
In the high availability (HA) system, when the "heartbeat line" connecting two nodes is disconnected, the HA system, which is originally a whole and coordinated action, will be split into two independent individuals. Because they lost contact with each other, they all thought it was the other part ...
Posted on Mon, 25 Oct 2021 05:22:10 -0400 by shamuntoha
An understanding of memory horse
preface
With the increasingly fierce game between attack and defense, professional security devices such as traffic analysis and EDR are widely used by defenders. The traditional webshll uploaded by files or the back door resident in the form of files are more and more easy to be detected. webshell has finally entered the era of memory hor ...
Posted on Sat, 23 Oct 2021 23:20:30 -0400 by Malkavbug
Access control list (ACL)
Access control list (ACL)
catalogue
Function and principle of access control list (ACL)
Direction of access control list in interface application
Type of ACL
Application rules and principles of ACL
Basic instruction
Function and principle of access control list (ACL)
Used to restrict access control (discard or release) of data packetsCo ...
Posted on Fri, 22 Oct 2021 22:27:08 -0400 by ejwf
[network programming] IO multiplexing select
executive summary
In this experiment, we try to use the IO multiplex select interface.
stay [network programming] TCP socket single machine communication experiment A demo of socket communication between a client thread and a server ...
Posted on Mon, 11 Oct 2021 13:40:58 -0400 by TheMightySpud
Dynamic routing BGP summary 1
1, Dynamic routing protocol partition
algorithm
Distance vector RIP EIGRP (fastest convergence) BGP (path information)Link state OSPF ISISPath vector BGP
Scope AS
IGP internal gateway protocolEGP border gateway protocol
BGP partition AS 1-65535 64512-65535 private as 2 ^ 16 insufficient as number
2, Characteristics
Neighbors can be estab ...
Posted on Sun, 10 Oct 2021 03:58:17 -0400 by cliffdodger
The MOVAPS issue is one step behind a 100-step getshell
When you perfectly laid out your stack, leaked the address of libc, got the syetem address in libc, got the'/bin/sh'address, and sendline got through one step later, but you suddenly found out, what? Why did system fail? The address is also right, check it over and over, and it's all right.
At this point you start to wonder if a new libc was ...
Posted on Wed, 06 Oct 2021 23:00:24 -0400 by Crackhead
DNS domain name resolution service configuration (recommended tutorial)
catalogue
1, DNS
1.1 introduction to DNS Service
DNS (Domain Name System), as a distributed database mapping domain names and IP addresses on the Internet, can make it easier for users to access the Internet without remembering the IP strings that can be read directly by the machine. The process of obtaining the IP address corresponding to ...
Posted on Mon, 20 Sep 2021 20:40:43 -0400 by dammitjanet