2009年11月18日 星期三
mitm and ssl
The Secure Goose: TLS renegotiation vulnerability and Frequency X Blog: IBM Internet Security Systems show this vulnerability. or one kind of CSRF.
2009年11月16日 星期一
core dump analysis
In Getting a backtrace from a coredump, it shows the tools for getting backtraces from coredumps.
Recently, my stuff asks me what is the procedure to get the reason that a program generates coredump in an AIX 5.3 machine.
# dbx <program generates="" the="" coredump=""> <coredump file="">
then the reason will be shown and which function/line generates the coredump.
Here is another post that show similar information.
It is interesting for me.
So I get involved to study whether to get such information in various platform.
btw, is there any tool to show such information in various platform ?
Recently, my stuff asks me what is the procedure to get the reason that a program generates coredump in an AIX 5.3 machine.
# dbx <program generates="" the="" coredump=""> <coredump file="">
then the reason will be shown and which function/line generates the coredump.
Here is another post that show similar information.
It is interesting for me.
So I get involved to study whether to get such information in various platform.
btw, is there any tool to show such information in various platform ?
訂閱:
文章 (Atom)