تفاوت بین HDFS و HBase:
HDFS:
HDFS is a Java-based file system utilized for storing large data sets.
HDFS has a rigid architecture that does not allow changes. It doesn’t facilitate dynamic storage.
HDFS is ideally suited for write-once and read-many times use cases.
HBase:
HBase is a Java based Not Only SQL database
HBase allows for dynamic changes and can be utilized for standalone applications.
HBase is ideally suited for random write and read of data that is stored in HDFS.
#nosql
#hdfs
#hbase
#hadoop
#apache
HDFS:
HDFS is a Java-based file system utilized for storing large data sets.
HDFS has a rigid architecture that does not allow changes. It doesn’t facilitate dynamic storage.
HDFS is ideally suited for write-once and read-many times use cases.
HBase:
HBase is a Java based Not Only SQL database
HBase allows for dynamic changes and can be utilized for standalone applications.
HBase is ideally suited for random write and read of data that is stored in HDFS.
#nosql
#hdfs
#hbase
#hadoop
#apache
مدیریت امنیت در شبکه های وایرلس
https://resources.infosecinstitute.com/category/enterprise/securityawareness/managing-wireless-network-security/
#wireless
#security
https://resources.infosecinstitute.com/category/enterprise/securityawareness/managing-wireless-network-security/
#wireless
#security
InfoSec Resources
Managing Wireless Network Security
Why Is Network Security Important?
Keeping your network secure is vitally important. Your network is the lifeblood of your company and it is responsible for th...
Keeping your network secure is vitally important. Your network is the lifeblood of your company and it is responsible for th...
افشای 320 میلیون هش
https://cynosureprime.blogspot.nl/2017/08/320-million-hashes-exposed.html
#hash
#crack
#troyhunt
#haveIbeenpwnd
https://cynosureprime.blogspot.nl/2017/08/320-million-hashes-exposed.html
#hash
#crack
#troyhunt
#haveIbeenpwnd
Cynosureprime
320 Million Hashes Exposed
Earlier this month (August 2017) Troy Hunt founder of the website Have I been pwned? [0] released over 319 million plaintext passwords [1...
اکسپلویت دور زدن فرآیند احراز هویت در مودم های D-link Dir-600
https://exploit.kitploit.com/2017/08/d-link-dir-600-authentication-bypass.html
#dlink
#router
#network
#webapp
https://exploit.kitploit.com/2017/08/d-link-dir-600-authentication-bypass.html
#dlink
#router
#network
#webapp
Kitploit
D-Link DIR-600 - Authentication Bypass
Exploit Collector is the ultimate collection of public exploits and exploitable vulnerabilities. Remote/Local Exploits, Shellcode and 0days.
پاسخ جالب تروی هانت به ویکی لیکس در مورد هک شدن وب سایت ویکی لیکس توسط OurMine
#fun
#ourmine
#wikileaks
#fun
#ourmine
#wikileaks
موتور جستجوی duckduckgo.com به رکورد ۵۰۰ میلیون سرچ در ماه رسید.
این موتور برخلاف گوگل و سایر موتورها فعالیت کاربر رو کنترل نمیکنه!
این موتور برخلاف گوگل و سایر موتورها فعالیت کاربر رو کنترل نمیکنه!
توضیح کاملی از نحوه کار فایل پاورپوینت آلوده به اکسپلویت CVE-2017-0199
https://blog.fortinet.com/2017/09/01/powerpoint-file-armed-with-cve-2017-0199-and-uac-bypass
#pptx
#malware
#exploit
#windows
https://blog.fortinet.com/2017/09/01/powerpoint-file-armed-with-cve-2017-0199-and-uac-bypass
#pptx
#malware
#exploit
#windows
باگ xss در سایت uber (در کوکی های سایت)
https://zhchbin.github.io/2017/08/30/Uber-XSS-via-Cookie/
#xss
#bugbounty
#pentest
#webapp
https://zhchbin.github.io/2017/08/30/Uber-XSS-via-Cookie/
#xss
#bugbounty
#pentest
#webapp
zhchbin
[BBP系列二] Uber XSS via Cookie
This write up is about part of my latest XSS report to Uber@hackerone. Sorry for my poor English first of all, I will try my best to explain this XSS problem throughly. JSONP RequestSeveral months ago
Pro PHP and JQuery (pdf)
https://index-of.es/Programming/Pro%20PHP%20and%20jQuery.pdf
#php
#jquery
#webapp
https://index-of.es/Programming/Pro%20PHP%20and%20jQuery.pdf
#php
#jquery
#webapp
قانون جدید کشور چین به دستگاه های امنیتی اجازه میده برای کارهای جاسوسی از باگهای 0day استفاده کنن!
https://securityaffairs.co/wordpress/62663/laws-and-regulations/chinese-cyber-security-law.html
#news
#china
https://securityaffairs.co/wordpress/62663/laws-and-regulations/chinese-cyber-security-law.html
#news
#china
Security Affairs
Chinese cyber security law will allow China to use zero-day knowledge for its intelligence
According to the Chinese Cyber Security law, the information obtained by the CNNVD could be used in intelligence operations.
مهندسی معکوس یک فایل باینری
https://0x00sec.org/t/reversing-and-exploiting-a-nuclear-bomb/3412
#RE
#binary
#gdb
#virus
https://0x00sec.org/t/reversing-and-exploiting-a-nuclear-bomb/3412
#RE
#binary
#gdb
#virus
0x00sec - The Home of the Hacker
Reversing and Exploiting a Nuclear Bomb ;)
Preface Yo! It’s been a long time since I last posted anything here. Life kept me more than busy, but now I’ve got a little more time on my hands. I decided to do a write up on the following binary, because it taught me some new things, compared to the…
ابزاری بر پایه پاورشل برای ساخت ماکروهای آفیس با اهداف تخریبی
https://github.com/curi0usJack/luckystrike
#ps
#windows
#office
#macro
#virus
https://github.com/curi0usJack/luckystrike
#ps
#windows
#office
#macro
#virus
GitHub
GitHub - curi0usJack/luckystrike: A PowerShell based utility for the creation of malicious Office macro documents.
A PowerShell based utility for the creation of malicious Office macro documents. - curi0usJack/luckystrike