Vitess security auditPRESENTS Vitess security audit In collaboration with the Vitess maintainers, Open Source Technology Improvement Fund and The Linux Foundation Authors Adam KorczynskiDavid Korczynski com> Date: June 5, 2023 This report is licensed under Creative Commons 4.0 (CC BY 4.0) Vitess Security Audit, 2023 Table of contents Table of contents 1 Executive summary 2 Notable findings 3 Project found 16 SLSA review 38 Conclusions 40 1 Vitess Security Audit, 2023 Executive summary In March and April 2023, Ada Logics carried out a security audit of Vitess. The primary focus of the audit was 0 码力 | 41 页 | 1.10 MB | 1 年前3
Istio Security AssessmentIstio Security Assessment Google August 6, 2020 – Version 1.1 Prepared for Arun Kumar R Prepared by Mark Manning Jeff Dileo Divya Natesan Andy Olsen Feedback on this project? https://my.nccgroup assessment was to identify security issues related to the Istio code base, highlight high risk configurations commonly used by administrators, and provide perspective on whether security features sufficiently subsequent phases of the assessment. A test plan was created which matched areas of code with specific security controls (e.g. service discovery, certificate lifecycle, side car injection) to focus testing efforts0 码力 | 51 页 | 849.66 KB | 1 年前3
firebird metadata security ruзапроса на соединение процесс сервера удостоверяет пользователя по базе данных безопасности (security database). После успешного удостоверения сервер разрешает приложению (пользователю) произвести доступ безопасности, то даже хорошее шифрование становится немного больше, чем “безопасностью по неясности” (security by obscurity). 4.2.2. Ограничение распространения данных Некоторые просят шифровать данные базы “безопасности по неясности” Предлагаются и различные другие формы “безопасности по неясности” (security by obscurity). Например, специальные события, возникающие в моменты входа/подключения и отключения0 码力 | 21 页 | 156.51 KB | 1 年前3
A Security Guide for Kotlin DevelopersA Security Guide for otlin Developers I N D E X Overview..................................................................1 Kotlin’s Security Profile............................................2 Most Common Security Attacks...............................3 Top Kotlin Security Risk...........................................5 OWASP Mobile TOP 10 Mobile Risks..........................10 Protect developers and other key decision makers in software security and software supply chain vulnerabilities with information regarding the top security risks they can expect to face — from inherent weaknesses0 码力 | 13 页 | 1.80 MB | 1 年前3
Firebird File and Metadata SecurityFirebird File and Metadata Security Geoff Worboys Version 0.6, 30 June 2020 Table of Contents 1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 7. Acceptable Low Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . don’t know about Firebird, see this link: www.firebirdsql.org This article discusses the security of Firebird database files and in particular access to the metadata stored in those files. It has been written0 码力 | 19 页 | 115.27 KB | 1 年前3
firebird metadata security de0 码力 | 20 页 | 127.60 KB | 1 年前3
Security Beyond Memory SafetyC and C++: A Security Perspective Security Beyond Memory Safety Using Modern C++ to Avoid Vulnerabilities by DesignMax Hoffmann Security Beyond Memory Safety CppCon 2024 2 Security Beyond Memory Safety Hoffmann Security Beyond Memory Safety CppCon 2024 3 FIFTY SHADES OF SHOOTING YOURSELF IN THE FOOT WITH A RAILGUNMax Hoffmann Security Beyond Memory Safety CppCon 2024 4Max Hoffmann Security Beyond yearsMax Hoffmann Security Beyond Memory Safety CppCon 2024 6Max Hoffmann Security Beyond Memory Safety CppCon 2024 7Max Hoffmann Security Beyond Memory Safety CppCon 2024 8Max Hoffmann Security Beyond Memory0 码力 | 79 页 | 4.15 MB | 6 月前3
Using MySQL for Distributed Database Architectures© 2018 Percona. 1 Peter Zaitsev Using MySQL for Distributed Database Architectures CEO, Percona PingCAP Infra Meetup, Shanghai, China, May 26, 2018 © 2018 Percona. 2 About Percona Solutions of Thousands of Updates/Sec Traverse Tens of Millions of Rows/Sec Comfortably Handle Several TB Database size © 2018 Percona. 7 Lets Do Some Math 100.000 QPS 10 Queries per User Interaction 10 Paired with Replicated Data © 2018 Percona. 24 Where Replication Happens Storage Level Database Level Application Level © 2018 Percona. 25 Storage Level Replication Replication in SAN/NAS0 码力 | 67 页 | 4.10 MB | 1 年前3
Materialize MySQL Database engine in ClickHouseMaterializeMySQL Database engine in ClickHouse WinterZhang(张健) About me • Active ClickHouse Contributor • MaterializeMySQL Database Engine • Custom HTTP Handler • MySQL Database Engine • BloomFilter query MySQL Database Engine • Mapping to MySQL database • Fetch table list from MySQL • Fetch table struct from MySQL • Fetch data from MySQL when execute query MaterializeMySQL Database Engine • to MySQL database • Consume MySQL BINLOG and store to MergeTree • Experimental feature (20.8, recommend latest stable version) MaterializeMySQL Database Engine MaterializeMySQL Database Engine0 码力 | 35 页 | 226.98 KB | 1 年前3
Firebird Internals: Inside a Firebird DatabaseFirebird Internals Inside a Firebird Database Norman Dunbar Version 1.2, 13 August 2021 Table of Contents 1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Database Structure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3. Standard Database Page Header. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 4. Database Header Page — Type 0x010 码力 | 63 页 | 261.00 KB | 1 年前3
共 1000 条
- 1
- 2
- 3
- 4
- 5
- 6
- 100













