본문 바로가기

전체 글

(720)
개발/서버
죽은 프로세스 살리기 #include #include #include #include #include #include #include /* 검사 주기(초) */#define CHECK_SECOND 30 /* 실행 서버 패스 및 이름 */#define APP_PATH "/root/ztsvr/ztsvr"#define APP_NAME "ztsvr" int check_process();void get_timef(time_t, char *); int main(){ int rt; time_t the_time; char buffer[255]; char app[255]; sprintf(app, "nohup %s &", APP_PATH); printf("START\n"); fflush(stdout); while(1) { time(&the_t.. 2015.09.10
개발/서버
How to kill zombie process [closed] I launched my program in the foreground (a daemon program), and then I killed it withkill -9, but I get a zombie remaining and I m not able to kill it withkill -9. How to kill a zombie process?If the zombie is a dead process (already killed), how I remove it from the output ofps aux?root@OpenWrt:~# anyprogramd & root@OpenWrt:~# ps aux | grep anyprogram 1163 root 2552 S anyprogramd 1167 root 2552.. 2015.09.10
news/IT
Valuable business connections – a review for SMEs Valuable business connections – a review for SMEs Businesses of all sizes adopt technology to make them more productive, cost effective or flexible and help them compete. Over the years, the adoption of tools such as mobile phones, wireless laptops, the internet and email have all been driven by such expectations. Small and medium-sized businesses (SMBs) are often at the forefront as it can give.. 2015.02.03
개발/해킹
Security of Cisco CallManager-based IP Telephony against Malicious Hacker Attacks Independent Lab Test Report: Security of Cisco CallManager-based IP Telephony against Malicious Hacker Attacks Cisco Systems becomes the first, and to date the only, IP-Telephony vendor to earn Miercom's highest rating of Secure for its proven ability to defend an IP phone system against malicious attack. 2015.02.03
개발/해킹
Network Security Visibility and Flow Analysis Network Security Visibility and Flow Analysis A man in the middle attack is one in which the attacker intercepts messages in a public key exchange and then retransmits them, substituting his own public key for the requested one, so that the two original parties still appear to be communicating with each other. The attack gets its name from the ball game where two people try to throw a ball direc.. 2015.02.03
개발/해킹
MITM (man in the middle attack) MITM (man in the middle attack) MITM (man in the middle attack)은 네트워크 통신을 조작하여 통신 내용을 도청하거나 조작하는 공격 기법이다. 중간자 공격은 통신을 연결하는 두 사람 사이에 중간자가 침입하여, 두 사람은 상대방에게 연결했다고 생각하지만 실제로는 두 사람은 중간자에게 연결되어 있으며 중간자가 한쪽에서 전달된 정보를 도청 및 조작한 후 다른 쪽으로 전달한다. 많은 암호 프로토콜은 중간자 공격을 막기 위하여 인증을 사용한다. 예를 들어, TLS/SSL 프로토콜은 공개 키를 기반으로 한 인증을 사용한다. 1. 중간자 공격을 막기 위한 방법에는 다음과 같은 것들이 제안되어 있다. 공개 키 기반구조(Public Key Infrastructures, PK.. 2015.02.03