An Overview of the Dynamic Module Loading Mechanism in Embedded Linux

An Overview of the Dynamic Module Loading Mechanism in Embedded Linux

1. Design Philosophy and Core Advantages of Dynamic Module Loading The Linux dynamic module loading mechanism (Loadable Kernel Modules, LKMs) is not merely a technical choice, but a systematic solution evolved to meet the core needs of embedded systems—resource efficiency, hardware diversity, security control, and development flexibility—which are deeply integrated into its design philosophy and … Read more

Vulnerability Alert | Multiple Remote Code Execution Vulnerabilities in VxWorks TCP/IP Stack

Vulnerability Alert | Multiple Remote Code Execution Vulnerabilities in VxWorks TCP/IP Stack

Vulnerability Alert Multiple Remote Code Execution Vulnerabilities in VxWorks TCP/IP Stack On July 30, the Armis security research team published an article claiming that they discovered a total of 11 vulnerabilities in the VxWorks TCP/IP stack, of which 6 vulnerabilities could lead to remote code execution. Vulnerability Description VxWorks is currently the most widely used … Read more

Research Analysis | Application Study of the Maturity Model for Information Security Protection Capability in Industrial Control Systems

Research Analysis | Application Study of the Maturity Model for Information Security Protection Capability in Industrial Control Systems

★ Beijing Tianrongxin Network Security Technology Co., Ltd. Zhang Yun Abstract: The “Information Security Technology – Maturity Model for Information Security Protection Capability in Industrial Control Systems” (hereinafter referred to as the “Maturity Model”) serves as a national standard, providing a systematic maturity assessment framework for information security protection in industrial control systems, aimed at … Read more

Exposing Linux Security Blind Spots: The io_uring Mechanism Can Bypass Mainstream Detection Tools

Exposing Linux Security Blind Spots: The io_uring Mechanism Can Bypass Mainstream Detection Tools

Shake Network Technology NewsClick the right to follow for the latest technology news!The ARMO research team recently disclosed significant flaws in Linux runtime security tools, confirming that the io_uring interface allows rootkits (kernel-level malware) to bypass conventional monitoring solutions.Tests show that mainstream tools, including Falco, Tetragon and even Microsoft Defender for Endpoint, are unable to … Read more

Windows vs. Linux for Server Operating Systems

Windows vs. Linux for Server Operating Systems

Many professional software applications (such as simulation computing) support both Windows and Linux, leading to hesitation among users when choosing a server operating system. Windows is easier to deploy and maintain, while Linux offers higher performance and security, making the choice difficult. Today, we will discuss the selection of server operating systems based on common … Read more

Stop Using the Antiquated HTTP/1, Upgrade to HTTP/2 with These Two Steps

Stop Using the Antiquated HTTP/1, Upgrade to HTTP/2 with These Two Steps

Recently, while analyzing SSE technology, I briefly mentioned HTTP/2, as the HTTP/1.x protocol has long been considered an “antique”. Reasons for Upgrade Upgrading from HTTP/1.x to HTTP/2 can bring various performance improvements and optimizations: Multiplexing In HTTP/1.x, each TCP connection can only handle one request or response, leading to the so-called head-of-line blocking issue. In … Read more

How Engineers Can Improve RS485 Hubs

How Engineers Can Improve RS485 Hubs

In fields such as industrial automation and remote monitoring, many are familiar with RS485 hubs. However, RS485 has several issues, such as data return delays and insufficient security. How can engineers leverage strengths and mitigate weaknesses to minimize these impacts?! 1. What Issues Exist with RS485 Hubs? Data return delay: The host can send data … Read more

Understanding HTTP Basic Authentication

Understanding HTTP Basic Authentication

Introduction I originally planned to continue sharing knowledge related to Kerberos, but the Kerberos protocol is quite complex and may require dozens of articles to fully describe. Therefore, I thought it would be better to intersperse discussions of other common network authentication protocols. The preliminary plan includes the following: HTTP Basic Auth, Digest Auth, OAuth, … Read more

Why HTTPS is More Secure than HTTP

Why HTTPS is More Secure than HTTP

Introduction to HTTP Protocol The HTTP protocol is a text-based transmission protocol that operates at the application layer of the OSI network model. The HTTP protocol communicates through request-response interactions between clients and servers. The protocol has been split from the previous RFC 2616 into six separate protocol specifications (RFC 7230, RFC 7231, RFC 7232, … Read more

New Discovery: Linux Rootkit Curing Can Bypass Modern Security Tools, Hiding Within the io_uring Interface

New Discovery: Linux Rootkit Curing Can Bypass Modern Security Tools, Hiding Within the io_uring Interface

Recently, researchers have discovered a brand new Linux rootkit—Curing—that can successfully bypass existing security tools through the io_uring interface in the Linux kernel, rendering it invisible in the system and even evading detection by modern enterprise-level security software. The io_uring interface was introduced in the Linux 5.1 version to enhance I/O operation performance, aiming to … Read more