SEARCH KEYWORD -- White Knight
IT System Cyber Attack Case Study 01: Malicious Macro and Backdoor Trojan Attack on IT-Network
Project Design Purpose: The objective of this cyber attack case study is to develop a workshop showcasing a practical demonstration of a red team attacker implementing an IT system/network attack via a Malicious Macro MS-Office-Word file (CVE-2015-1641) and phishing email generation program to penetrate multiple layers of firewall defenses and implant a backdoor trojan into the railway system's OT network. Related Links: GitHub Project Link , LinkedIn Post Link Attacker Vector: Malicious Macro ...
How does MySQL handle DROP TABLE
A few days ago, when executing DROP TABLE in MySQL, all processes including DDL and DML were hung until DROP TABLE was completed. I am confused about this phenomenon. I have reviewed the source codes of MySQL to check how MySQL internally handle DROP TABLE. When user trigger DROP TABLE command: ########################MySQL SERVER drop table######################## /* Sql_table.cc delete (drop) tables. */bool mysql_rm_table( ) /* Execute the drop of a normal or temporary...
MySQL,DROP TABLE 2012-09-24 11:34:05
PHP advisory file lock : flock
When we process a file in PHP, we may often need to acquire a lock so that other scripts cannot edit the same file at the same time. There is a flock() function in PHP which can help us lock the file we want to process. But there is one issue we should take care. Recently, ffb encountered one issue while he was trying to lock a file handle. The codes are below: $filename = "/tmp/lock.txt"; $fp = fopen($filename, "r+"); if (!$fp...
flock(),advisory locking,PHP 2013-04-23 11:42:48
Power Grid OT Simulation System
Mini OT-Energy-System Cyber Security Digital Twin Figure-00: Power_Grid_OT_Simulation_System Environment Diagram, version v0.1.2 (2024) Project Design Purpose: The primary objective of this project is to develop a scaled-down Operational Technology (OT) digital twin/equivalent — an advanced software simulation system capable of emulating the functionality of an small-sized 18KW (560+MkWh/year) hybrid power grid. This system will meet the requirements for cybersecurity training, exercises...
8 powerful Chrome extensions
Chrome is a powerful browser, one reason why it's so powerful is that it has abundant extensions. There are various extensions in Chrome Web Store. They can meet all kinds of needs you have and they are very easy to install as well. Here we share with you 8 powerful extensions on Chrome. All of them can be downloaded from Chrome Web Store Holmes A bookmark search tool, if you have lots of bookmarks and you even don't know where they are. Hplmes can help you find them in real time by matching tit...
10gen provides free training courses for MongoDB
MongoDB is an open source document oriented database, developed with C++, it is to solve some real problems existing among development communities. In October 2007, MongoDB development began at 10gen, in 2009, MongoDB was open sourced as a standalone product. 10gen provides technical support, training and consultancy service. According to 10gen education, 10gen will provide some training courses for MongoDB starting from 22 October, 2012. Now it's available for registration. There are two cours...
Embrace open source
In past few days, there are many tech news which are related to open source. For example, Microsoft enables Linux on its Windows Azure cloud, Facebook open sourced its C++ library Folly and Samsung joined Linux foundation. Now more and more big companies realize the power of open source and are willing to contribute to the open source community. It will benefit not only developers but also these big companies as well.By providing some open source libraries or projects, developer may reduce their...
Open source,Microsoft,Samsung,Facebook,Linux 2012-06-06 05:37:59
IoT System Cyber Attack Case Study 02: Python Deserialization Attack and Library Hijacking Attack
Project Design Purpose: The objective of this cyber attack case study is to develop a workshop that demonstrates how a red team attacker can permanently compromise a people detection radar IoT device. The attack path is achieved through a series of attacks, including traffic eavesdropping, data deserialization attacks, web shell attacks, remote command/code execution, and Python library hijacking attacks. This case study is intended for IoT and data security professional training, aiming to ill...
Behind Start Screen of Windows Phone 8
Last week, Microsoft unveiled Windows Phone 8, in addition to some new features, the biggest difference between WP8 and iOS, Android is that it has a start screen consisting of abundant live tiles. Senior product manager of Microsoft Josh Phillips published an article on Microsoft official blog. He talks about the story behind start screen of Windows Phone 8. "How can we make Start even more personal" is the question Phillips and his team is always thinking about. Windows Phone makes the static ...
Windows Phone 8,Start Screen,Live Tile 2012-11-03 02:27:22
TIOBE : Where is that next big programming language?
TIOBE has released the Programming Community Index for May 2012 a bit late. The top 3 languages do not change compared to last Month TIOBE : C overtakes Java as the No.1 programming language, they are still C,Java and C++. However, the share of Java is continuing dropping, Objective-C is steadily rising Other languages which have rising trend are Visual Basic.NET,PL/SQL and Logo.The last 8 years not much has changed in the top 10 of the TIOBE index except for Objective-C (in) and Del...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>