Meow's Testing Tools - Burpsuite
[toc] Burpsuite test web: www.dvwa.co.uk Testing workflow SQL injection UPDATE, INSERT, SELECT, ORDER BY retrieve hidden data: input: Gifts https://web/product...
[toc] Burpsuite test web: www.dvwa.co.uk Testing workflow SQL injection UPDATE, INSERT, SELECT, ORDER BY retrieve hidden data: input: Gifts https://web/product...
[toc] HTML - List And Table HTML lists list: <ul>, <ol>, <dl> data inside: <li> <body> // Unordered HTML List <ul> <li>Coffee</li> ...
Data Structures - Basic 1 - Recursion basic The 3 Recursion Laws Analyzing Recursive Algorithms Examples of Recursion linear recursion ...
Data Structures - Basic 1 - Analysis Objectives Experimental Studies Counting Primitive Operations The Seven Functions The Co...
pythonds3 - 8. Graphs and Graph Algorithms Graphs Vocabulary and Definitions The Graph Abstract Data Type An Adjacency Matrix 邻...
ref https://www.geeksforgeeks.org/binary-tree-data-structure/ DS - pythonds3 - 7. Binary Tree Data Structures and Algorithms in Java, 6th Edition.pdf Data Stru...
Data Structures Basic 1 Priority Queues Priority Queues ADT: Priority Queue in java Implementing a Priority Queue Entry Interfa...
DS - pythonds3 - 6. Algorithms Sorting and Searching summary Searching The Sequential Search 一个个找 Sequential Search of an Unordered...
DS - pythonds3 - 5. Recursion - Exercises check the reverse words check the mirror words exchange the coins factorial of a number recursive tree Fibonacc...
DS - pythonds3 - 1. Introduction 1.5. Why Study Data Structures and Abstract Data Types? 1.8. Getting Started with Data 1.8.1. Built-in Atomic Data Types ...
Phishing (S+ 7th ch10) Vishing overview Vishing overview combine phishing with Voice over IP (VoIP) Although crank calls have been in existence since the invention o...
Phishing (S+ 7th ch10) Phishing 网络仿冒 overview Type of phishing Goals of phishing New Phishing Attacks soluti...
Pharming 网络嫁接 overview Pharming 网络嫁接 overview Similar in nature to e-mail phishing, pharming seeks to obtain personal information by domain spoofing. ...
[toc] book: security+ 7ch CISSP chap13 Control Types CompTIA lists the following control types in the objectives: TAP principle: Technical controls use technology. ...
[toc] Intrusion detection system (IDS) IDS basic software / hardware system detect signs of malicious activity on network or individual computer. IDS is designed to detect: threats...