Understanding System Files on Android Devices

Understanding System Files on Android Devices

Just like we can see the system files of Windows in the Windows File Explorer, we can also view the system files of Android through some file management applications. It is because of these files that our Android phones can function properly. I think we are all quite familiar with the directory structure and functions … Read more

Exploiting Cisco RV160W Router Vulnerabilities: From 1-Day Analysis to 0-Day Discovery

Exploiting Cisco RV160W Router Vulnerabilities: From 1-Day Analysis to 0-Day Discovery

This article is a highlight from the Kanxue Forum. Author ID: b0ldfrev (This article was written a few months ago, and was not published until the official patch was released.) I initially planned to analyze the recent unconditional RCE vulnerability in the Cisco RV160W router. While diffing the firmware, I made some new discoveries. https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-rv160-260-rce-XZeFkNHf.html … Read more

Comprehensive Guide to Self-Cleaning Mining Trojans

Comprehensive Guide to Self-Cleaning Mining Trojans

Source: System Security Operation and Maintenance This article is written by Tencent security experts and serves as a “Self-Cleaning Guide for Mining Trojans” to assist security operation and maintenance personnel of government and enterprise clients in self-diagnosing and removing mining Trojans. 1. What is a Mining Trojan A mining Trojan occupies the CPU for overclocking … Read more

Optimize Android Fragmentation 2.0 with Magisk Module

Optimize Android Fragmentation 2.0 with Magisk Module

Optimize Android Fragmentation 2.0 (Loop Version) Installation Install via Magisk Manager. Module Introduction Author: Ku An @ Mr. Peng 331 Version 1.0: – Utilize crontab (power-saving) to fstrim the device every 15 minutes – Has execution output logs – Executes once after boot Version 2.0 Update Content: – Removed crontab (incompatible with some models) – … Read more

Emergency Response Procedures for Cybersecurity Incidents

Emergency Response Procedures for Cybersecurity Incidents

Emergency Response Steps: 1. Focus on ensuring business stability. Blacklist IP, rate limit, human verification code. First, activate the operational emergency plan to ensure stable business operation and system stability (network, system files, startup items, libraries, memory). Experience is irreplaceable. Think about security incidents with an event correlation mindset. All operations must be recorded with … Read more

How to Port BusyBox, the Swiss Army Knife of Linux Tools, to RT-Thread Smart

How to Port BusyBox, the Swiss Army Knife of Linux Tools, to RT-Thread Smart

RT-Thread Smart Series Serialization Serial Number Content 1 “When the Raspberry Pi Meets RT-Thread Smart – Introduction to Application Programming” 2 “RT-Thread Smart and Raspberry Pi: wget & cURL Network Client” 3 “How to Port BusyBox, the Swiss Army Knife of Linux Tools, to RT-Thread Smart?” 4 sdl graphics application 5 dropbear and ssh server … Read more

GuiLite: A Lightweight GUI Framework for Embedded Systems

GuiLite: A Lightweight GUI Framework for Embedded Systems

What is GuiLite? GuiLite is a cross-platform, extremely small header file GUI library. It can run not only on PC platforms but also on embedded systems, making it very lightweight and easy to use. GuiLite is tailored for embedded systems, providing a rich set of GUI controls and a friendly API interface to help developers … Read more