文章分类 - security
摘要:copy from : https://www.redhat.com/sysadmin/rpm-gpg-verify-packages Large and popular RPM repositories are typically replicated around the world. The
阅读全文
摘要:这两个安全模型在看cissp osg教材的时候不懂,报的培训班老师也没讲解原理及为什么,直观上,这两个模型就是对立的。看了11 hours cissp书后恍然大悟,这是本好书。摘抄如下: Bell-LaPadula includes the following rules and propertie
阅读全文
摘要:copy from: https://learn.microsoft.com/zh-cn/archive/blogs/brian_swan/do-stored-procedures-protect-against-sql-injection When I’ve asked people about
阅读全文
摘要:以下分类是根据CISSP OSG中的分类。 1. Virus: Viruses are self-replicating executable programs that attach themselves to or within another executable file with the
阅读全文
摘要:from:https://www.fortinet.com/resources/cyberglossary/rootkit Rootkit Definition A common rootkit definition is a type of malware program that enables
阅读全文
摘要:一直对这两个的应用场景有所疑惑。参考这个:What is SAML vs OAuth? Find out what's different - Auth0 ,在此记录下。 SAML (Security Assertion Markup Language) is a well-established,
阅读全文
摘要:转自: https://zhuanlan.zhihu.com/p/598105882 读了最近发生的蔚来数据泄漏的报道:蔚来数据泄漏:黑客有理,车主遭殃 ,感觉国内企业普遍不太重视网络安全及数据的保护,隐私的保护等安全问题。 当我们的造车新势力雄心壮志进军欧美市场的时候,可能会碰到一个下马威(如果他
阅读全文