Edward Linus's personal blog, focusing on coding and etc.

Latest stories

New Way to Install Adobe Creative Cloud to Specified Directory

0x01 Story As is known to us all, officially, the default install directory for Adobe Creative Cloud can’t be changed from C:/Program Files/Adobe to users desire directory unless users have install at least one of Adobe Creative Cloud product. Hence, I am wondering about whether there is another way to install Adobe Creative Cloud component without installing one then changing install...

Monitor Changes in a Website and Push Notification to Slack via Huginn and Slack API

0x00 Story A fellow of mine wants to monitor changes in a website, at first he use a monitor plugin in chrome, but before long he realized that he cannot keep his computer running all the time, therefore to use an VPS to monitor  is a pretty decent choice. Here comes the question, what software should we use? It comes to me that I can use Python to write a crawler, but I’m too lazy to...

Creating a Fake Crashed Tab When Current Tab Loses Focus

0x00 Story Once upon a time I bumped into a site, as long as the tab losed focus, the tab caption will be changed into something like “oops, the tab crashed!”. It is really funny, isn’t it? So I spend some time digging into it and I found it really easy to do it, hence I decide to write a short tutorial on how to do it. 0x01 Mechanism Firstly, we should know how to know whether...

The Installation and Configuration of Docker in CentOS

0x00 What’s Docker? Docker is an open-source app container engine, which allows developers pack their app and dependencies into a portable container, then the developers could deploy it on any machines based on Linux. Moreover, it could also be used for virtualization, where every container is isolated from each other by sandbox mechanism. 0x01 How to install Docker? Before installation...

Meltdown和Spectre漏洞概述及目前应急预案

0x00 概述 前几日爆出的包含Intel,AMD以及使用ARM架构的厂商的处理器中的重大漏洞可谓是在业内卷起轩然大波,这些漏洞可分为Meltdown和Spectre两类。本文就Google Zero Project,Meldown and Spectre以及博主所掌握的信息对目前漏洞机制,原理,应急预案进行归纳总结。 0x01 漏洞机制及影响对象 从目前所获得的信息来看,前者的影响更为显著,其实质是恶意数据缓存载入(Rogue data cache load (CVE-2017-5754)),打破了用户级页表与系统内核级页表之间的隔离,这种隔离机制的失效影响是非常大的,举个例子来说,你在银行的账号密码现在完全可以被也在用这个银行的恶意用户收集到。 后者,也就是Spectre,其实质是绕过式边界检测以及分支目标注入(bounds check bypass (CVE-2017-5753)...

Edward Linus's personal blog, focusing on coding and etc.

Meta