不安全
G.O.S.S.I.P 阅读推荐 2025-01-08 软件安全分析2030远景规划
1 year 2 months ago
一看标题便知,今天推荐的论文是一篇高瞻远瞩之作,这就是来自TOSEM的最新论文Software Security Analysis in 2030 and Beyond: A Research Roa
Mashups – 复活 Yahoo! Pipes,过滤、组合、转换 RSS、CSV
1 year 2 months ago
Home业界消息Mashups – 复活 Yahoo! Pipes,过滤、组合、转换 RSS、CSV
UN aviation agency ICAO confirms its recruitment database was hacked
1 year 2 months ago
The International Civil Aviation Organization (ICAO), a part of the United Nations, confirmed on We
Crypto User's Guitar Offers More Security Than Traditional Methods
1 year 2 months ago
Last Friday I caught up with a colleague and a friend whom I have never met in person, but only onli
Census III study spotlights ongoing open-source software security challenges
1 year 2 months ago
Backward incompatibilities, the lack of standard schemas for components, and projects staffed by
How Sigma rules for emerging threats take shape - Someone noticed CVE-2024-49113 (#LDAPNightmare) could be detected and shared raw logs - I realized w...
1 year 2 months ago
Ubuntu 清理垃圾文件以释放空间多种方法
1 year 2 months ago
在 Ubuntu 上,清理垃圾文件以释放空间有多种方法。以下是常见的几种方法:1.清理 APT 缓存APT 会下载和保存安装的软件包文件。如果不再需要这些文件,可以清理它们。清理未使用的包文件:sud
Six Tech Trends Shaping the Future of Brand Experiences
1 year 2 months ago
Six Tech Trends Shaping the F
利用js挖掘漏洞
1 year 2 months ago
在漏洞挖掘中,通过对js的挖掘可发现诸多安全问题,此文章主要记录学习如何利用JS测试以及加密参数逆向相关的漏洞挖掘。一、js中的敏感信息泄露1、默认用户名密码2、硬编码密码、其他秘钥泄露二、js中的指
CISA Releases Two New Industrial Control Systems Advisories for 2025
1 year 2 months ago
Overview The Cybersecurity and Infrastructure Security Agency (CISA) released two critica
The Annual Question: Bugs Caused by Week-Based Year Formatting in Java
1 year 2 months ago
When dealing with week numbering issues across different regions or cultures, standardization challe
How Grand Central Dispatch Library Helps Organize Threads
1 year 2 months ago
I am Boris Dobretsov, and this is the fifth part of a series Understanding Parallel Programming: A G
Help Net Security - A FOSS tool to analyse IOC
1 year 2 months ago
The Crypto Bull Market Could Hit Its First Peak in Q1 2025
1 year 2 months ago
I have spent over six years working in the marketing aspect of cryptocurrencies. I currently run a G
How to Install Windows on Disk With Linux
1 year 2 months ago
PrefaceSetting up a dual-boot system on a PC typically requires installing Windows first and then L
Backdooring Your Backdoors - Another $20 Domain, More Governments - watchTowr Labs
1 year 2 months ago
关注 | 2024年12月全国受理网络违法和不良信息举报1803.7万件
1 year 2 months ago
扫码订阅《中国信息安全》邮发代号 2-786征订热线:010-823410632024年12月,中央网信办举报中心指导全国各级网信举报工作部门、主要网站平台受理网民举报色情、赌博、侵权、谣言等违法和
行业 | 智能安全技术再获突破 长亭科技发布语义分析3.0
1 year 2 months ago
扫码订阅《中国信息安全》邮发代号 2-786征订热线:010-823410631月7日,长亭科技语义分析3.0暨雷池30巡回发布会首站在北京举行。发布会上,长亭科技分享了语义分析技术的最新成果、雷池
专家观点 | 在法治轨道上有序推进数据跨境流动
1 year 2 months ago
扫码订阅《中国信息安全》邮发代号 2-786征订热线:010-82341063文 | 中国人民大学法学院 黄尹旭;北京数字经济与数字治理法治研究会 杨竹中共中央办公厅、国务院办公厅印发的《关于数字贸
Checked
3 hours 36 minutes ago
unSafe.sh - 不安全
不安全 feed