3.2 Server Response
I.IntroductiontoWi-FiAuthenticationTheunderstandingofWi-Fiauthenticationcanbesimplifiedi...
3.2 Pilot establishment of a network security guarantee system oriented by risk management
PrefaceOneofthebasicprinciplesofprotectingChina'skeyinformationinfrastructureis'dynamic...
3.2 Example 1: Decryption of DrayTek Vigor2962 Firmware
Thepreviousarticlemainlyintroducedtheconcept,technology,tools,andframeworkoffirmwareemu...
3.1. Main Regulatory Authority for Data Protection
September20211.PrefaceTheGeneralDataProtectionRegulation(GDPR)oftheEuropeanUnionentered...

3.1 Start malicious service and listen to a large number of system broadcasts
Introduction:TheoccurrenceofmajoreventssuchasRecently,inthedailymonitoring,theShadowMo...
3.1 Do not use office accounts and passwords on ordinary websites
Accountpasswordisthemostfrequentlyusedbasicparameterindailyuse,anditisthelastlineo...
3.1 Automated security testing
Recently,wehavestartedtobuildSDLfromscratch,anditisstillablankslatewithnoresources...
3. Multi-party Security Computation - MPC (Secure Multi-Party Computation)
1.BackgroundNowadays,organizationsareincreasinglyconcernedaboutdatasecuritywhencollecting,...
3. Implementing Order State Transition with Spring State Machine
WhentalkingaboutSpringstatemachine,peopleoftenthinkaboutwhatthedifferenceisbetweenthi...
3. Implementation defects and bypassing integrity protection
OnOctober31st,atthe10thKConSecurityConference,thesecurityresearchersQinShi,LuHaoliang...