Tag:reticulation
-
Building a Web site on a Raspberry Pi [no public IP needed].
catalogs 1. Overview 2. Install Raspberry Pi OS with Raspberry Pi Imager 3. Setting up the Apache Web server 3.1 Testing the web site 3.2 Installing a static sample site 3.3 Publishing web sites to the public network 3.4 Installing Cpolar 3.5cpolar for token authentication 3.6 Generate cpolar random domain URLs 3.7 Generating cpolar second-level […]
-
Data Link Layer Protocol – Ethernet Protocol
Article Catalog The link layer solves the problemEthernet protocolUnderstanding EthernetEthernet frame formatRecognizing MAC AddressesCompare and contrast understanding of MAC addresses and IP addressesGetting to know MTUImpact of MUT on IP protocolsImpact of MTU on the UDP protocolImpact of MTU on the TCP protocolThe process of transferring data across a network ARP protocolRole of the ARP […]
-
Social Network Analysis 3: Basic Concepts and Methods of Privacy Attacks, Protection in Social Networks + De-Anonymization Techniques + Inferential Attack Techniques + k-Anonymity + Clustering-Based Privacy Protection Algorithms
Social Network Analysis 3: Basic Concepts and Methods of Privacy Attacks, Protection in Social Networks + De-Anonymization Techniques + Inferential Attack Techniques + k-Anonymity + Clustering-Based Privacy Protection Algorithms put at the forefront Social Networking Privacy Breach Pathways to User Data Exposure Privacy Risks of Complex Behavior Privacy challenges posed by technological developments Financial interests […]
-
Unable to save ip settings, prompted to check one or more settings and try again.
Some users upgraded their computers to Win11 system, they want to set ip, but they found that they can’t save ip settings please check one or more settings and retry, how do we solve it? Pure Home – win7 pure version system_win7 ghost pure version cure 1, “win + R” shortcut key to open the […]
-
A step-by-step guide to building a local Ubuntu web gaming site and realizing remote access for public network users via intranet penetration.
Article Catalog preamble 1. Local environment service setup 2. LAN test visits 3. Intranet penetration 3.1 ubuntu local installation of cpolar intranet penetration 3.2 Creating tunnels 3.3 Testing public network access 4. Configure fixed second-level subdomains 4.1 Reservation of a second-level subdomain 4.2 Configuring second-level subdomains 4.3 Testing access to fixed second-level subdomains on the […]
-
Network Layer Protocol – IP Protocol
Article Catalog IP protocolbasic conceptIP protocol formatSegmentation and AssemblysegmentationSpecial IP addressLimitations on the number of IP addressesPrivate IP address and public IP addressrouting (in computer networks)Routing Table Generation Algorithm IP protocol IP protocol is known as the “Internet Protocol”, IP protocol is the network layer protocol in the TCP/IP system. basic concept Problems solved at […]
-
[Transport Layer] TCP — three handshakes, four waves.
timeout retransmission mechanismConnection Management MechanismhandshakeFour waves.sliding windowcongestion controldelayed responsebring a message to sb.byte stream orientedSticky bag problemTCP anomalyTCP SummaryBased on TCP application layer protocolUnderstanding the second argument to listen timeout retransmission mechanism After host A sends data to B, the data may not reach host B because of network congestion or other reasons;If host A […]
-
QT- QNetworkAccessManager
QT(17)- QNetworkAccessManager 1 Introduction2 Types of public ownership3 Functions3.1 addStrictTransportSecurityHosts3.2 autoDeleteReplies3.3 cache3.4 clearAccessCache3.5 clearConnectionCache3.6 connectToHost3.7 connectToHostEncrypted3.8 cookieJar3.9 deleteResource3.10 enableStrictTransportSecurityStore3.11 get3.12 head3.13 isStrictTransportSecurityEnabled3.14 isStrictTransportSecurityStoreEnabled3.15 post3.16 proxy3.17 proxyFactory3.18 put3.19 redirectPolicy3.20 sendCustomReques3.21 setAutoDeleteReplies3.22 setCache 4 Signals5 Protected Functions6 Protected Slots 1 Introduction QNetworkAccessManager is a class in the Qt network module that is used to manage network requests […]
-
Introduction to Network Security Tutorial
Cybersecurity is a large and growing field that encompasses several areas of specialization, such as network defense, cyberattacks, data encryption, and more. Introduces the basic concepts, techniques, and tools of cybersecurity, going step-by-step to help you become a competent cybersecurity practitioner. I. Network security basics 1. Basic computer knowledge Understanding the basics of computer hardware, […]