Thursday, June 4, 2020

What is XSS attack and more about it.

About XSS attack cross-site scripting attack, when users browse the web, the embedded script code is executed, thus achieving the purpose of attacking users, common vulnerability pages, website search Page, message board. To...

How does blockchain technology development combine with existing industry chains?

As the saying goes, "Standing on the wind, pigs will wind", then the biggest outlet in 2018 is undoubtedly the "blockchain", the blockchain is in the early stages of development, and...

Does the Bitcoin incident prove that China’s cyber security is vulnerable?

Let’s talk briefly about these two days of bitcoin events: Time: 2017-05-12 08:00 Risk: As long as the computer is connected to the Internet, there is a hidden danger of port 445. It...

How do I automatically find Amazon buyers through Facebook and continue marketing?

In the past few days of the New Year, a very good friend of mine returned to Vancouver from the United States for the weekend. He is an IT and...

Advantages and disadvantages of VPN in practical application

Virtual Private Network (VPN). Its function is to establish a private network on the public network for encrypted communication. Widely used in enterprise networks. The VPN gateway implements remote access by encrypting the data...

A telephoto monster Nikon P1000 technology review

Since the release of the Nikon P900, people have been paying attention to the telephoto camera. It looks like a SLR shape, and its simple and convenient shooting experience, as well...

Highest Paying Url shortener sites [2019]

Linksop is a brand new URL shortener where users can shorten their links and earn money by sharing them anywhere on internet. Though, this network is new but it is offering...

How to do broadband speed slow solution? [Photo]

The use of broadband has brought us a lot of convenience, but when we use broadband, we will encounter various problems. For example, the most common one is...

Let’s Encrypt finally released the Wildcard certificate

As the title, Let's Encrypt finally released the Wildcard (general domain name) certificate after several rounds of jump tickets, the folk called: wild card Let's Encrypt is a digital certificate authority launched in...

Top 10 common hacking techniques you should know

"With simple hacking, hackers can understand unauthorized personal information that you may not want to disclose. Learn about these common hacking techniques, such as phishing, DDoS, clickjacking, etc., to facilitate your personal...