Origin of Ray

Lift the fog of the Internet together

Today, I took a look at the latest introductory tutorial on the Unity official website. In the process of watching, I simply summarized the concepts involved and the content that needs to be paid attention to.

Read more »

Recently, I seriously looked at the operating system from the beginning. I felt that I didn’t do anything in college, and the whole process seemed to be looking at new knowledge.

After reading a part of it, I feel that it can only form a little system, and I have a little understanding. To sum it up here, this should be a series.

Read more »

Node.js allows you to run JavaScript outside of the browser. Due to its streamlined, fast, and cross-platform nature, Node.js can greatly simplify projects by unifying the stack. Although Node.js is not a web server, it allows servers (things that can be programmed in JavaScript) to exist in environments outside of the actual web client.
As Node.js becomes more and more popular, its security issues are the focus of hackers and security researchers.

Read more »

The last blog analyzed the classification and basic combat methods of XSS, and this time I will continue to accept an XSS virus.

Definition

First, let’s analyze what is the XSS worm virus.

It is a cross-site scripting virus, mostly written in JavaScript, to break through the security restrictions of the browser, it is based on social engineering to induce users to click on the malicious invitation link to visit the site on the site to infect users, infected users and then send content containing worms to continue to infect secure users.

Read more »

XSS (Cross Site Scripting, pay attention to cross-site, not cross-domain, the difference between the two you can search for yourself) vulnerability is a commonplace front-end security threats.

But in fact, it still ranks in the top ten of the front-end vulnerability list so far.

In addition, I recently bought a course on cyber security vulnerabilities. Of course, the main purpose is to protect my information security, hahaha.

The course is roughly divided into five parts. The first part is the basics of security, which are all basic knowledge, such as HTML, CSS, JS, PHP, NGINX, Spring, network protocols, etc. In fact, it is a classic interview question. What will happen when you receive a webpage? This question is an excellent question. It can even be said that it is the backbone of all technologies on the Internet. Almost all of your knowledge can be linked to the real question.

The second part is the back-end security, a small part is about file upload vulnerabilities, or some Nginx vulnerabilities, most of them are about SQL injection, this part, read a little I think I should go back to see the database and then come back to see, because the basic do not understand.

So jump directly to the third part of the front-end security, up is this XSS, and refresh their own wave of cognition, record.

Read more »
0%