Network monitoring on Linux This post mentions some linux command line tools that can be used to monitor the network usage. These tools monitor the traffic flowing through network interfaces and measure the speed at which data is currently being tran…
https://msdn.microsoft.com/en-us/library/ff647787.aspx Retired Content This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that we…
2018 年的文章, Using deep neural networks to hunt malicious TLS certificates from:https://techxplore.com/news/2018-10-deep-neural-networks-malicious-tls.html 使用LSTM对恶意证书进行分类,准确率94% 下面是介绍. Moreover, encryption can give online users a false sense of securi…
The Best Hacking Tools Hacking Tools : List of security tools specifically aimed toward security professionals for testing and demonstrating security weaknesses. Passwords Cain & Abel Cain & Abel is a password recovery tool for Microsoft Opera…
How HTML5 Web Sockets Interact With Proxy Servers Posted by Peter Lubberson Mar 16, 2010 With the recent explosion of WebSocket server implementations, a lot of questions have come up about how HTML5 Web Sockets deal with proxy servers, firewalls, an…