ARP Spoofing Experiment
ARP spoofing is a technique by which the attacker send forged Address Resolution Protocol (ARP) packets into a local area networl(LAN). IP and MAC The ARP protocol translates between IP addresse...
ARP spoofing is a technique by which the attacker send forged Address Resolution Protocol (ARP) packets into a local area networl(LAN). IP and MAC The ARP protocol translates between IP addresse...
A UNIX shell is essentially an interactive program that runs other programs on behalf of the user. A Unix shell is a command-line interpreter or shell that provides a command line user interfac...
Telnet is insecure because it sends login credentials, including the password, in unencrypted plain text to the Telnet server. This makes it easy for anyone with access to the network to capture an...
I’m currently using the iCESugar open source FPGA board. Using Quartus on Parallels Desktop or other virtual machines can be quite a hassle. However, there are fortunately other, more convenient wa...
Implement Digital Clock by STC89C52 Preface The final problem combinate all the function learned before, such as nixie tubes, alarm, buzzer and timers, etc. To finish this task, we should link all...
Due to security reasons, I decided to move the sharing links of xray & v2ray from the blog to the github private repository. If you need to use it, please contact me through GitHub.