<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第56期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第56期）</strong></h5>
<blockquote> 2015/03/23-2015/03/29</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>百度统计js被劫持用来DDOS Github<br><a target="_blank" href="http://drops.wooyun.org/news/5398">http://drops.wooyun.org/news/5398</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Full Open Source Car Hacking Kit For The Masses<br><a target="_blank" href="http://www.forbes.com/sites/thomasbrewster/2015/03/25/hack-a-car-for-60-dollars/">http://www.forbes.com/sites/thomasbrewster/2015/03/25/hack-a-car-for-60-dollars/</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Millions of computers left vulnerable to BIOS chip hack<br><a target="_blank" href="http://www.welivesecurity.com/2015/03/23/millions-computers-left-vulnerable-bios-chip-hack/">http://www.welivesecurity.com/2015/03/23/millions-computers-left-vulnerable-bios-chip-hack/</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Stealing Data From Computers Using Heat<br><a target="_blank" href="http://www.wired.com/2015/03/stealing-data-computers-using-heat/">http://www.wired.com/2015/03/stealing-data-computers-using-heat/</a></div><div class="single"><span id="tags">[视频]&nbsp;&nbsp;</span>Fei-Fei Li: How we&#039;re teaching computers to understand pictures<br><a target="_blank" href="http://www.ted.com/talks/fei_fei_li_how_we_re_teaching_computers_to_understand_pictures">http://www.ted.com/talks/fei_fei_li_how_we_re_teaching_computers_to_understand_pictures</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>国内漏洞奖励计划大盘点<br><a target="_blank" href="http://security.tencent.com/index.php/blog/msg/80">http://security.tencent.com/index.php/blog/msg/80</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Study reveals We are being tracked by Our Smartphones<br><a target="_blank" href="https://www.hackread.com/study-reveals-we-are-being-tracked-by-our-smartphones-every-3-minutes/">https://www.hackread.com/study-reveals-we-are-being-tracked-by-our-smartphones-every-3-minutes/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>谷歌发现用于中间人攻击的证书<br><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=Mjg2NTE4MzUwMA==&amp;mid=203772126&amp;idx=1&amp;sn=0c0c9faafe4e2f83df382baf4f16cf8d&amp;scene=2&amp;from=timeline&amp;isappinstalled=0#rd">http://mp.weixin.qq.com/s?__biz=Mjg2NTE4MzUwMA==&amp;mid=203772126&amp;idx=1&amp;sn=0c0c9faafe4e2f83df382baf4f16cf8d&amp;scene=2&amp;from=timeline&amp;isappinstalled=0#rd</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>websocket-injection:WebSocket 中转注入工具<br><a target="_blank" href="https://github.com/RicterZ/websocket-injection">https://github.com/RicterZ/websocket-injection</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>大数据分析与机器学习领域Python兵器谱<br><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MjM5MTQ4NzgwNA==&amp;mid=202880218&amp;idx=6&amp;sn=6784f6074c5cb3f4d3880890cb0ca802&amp;scene=2&amp;key=79cf83ea5128c3e5a6321fe2b80da0a2f3ad9e27c6fd428c41fb23b425a82bff3aa2dd9aa7c902a3b22a35a041cfa814&amp;ascene=1&amp;uin=MjI2NDkwNDk2MA%3D%3D&amp;de">http://mp.weixin.qq.com/s?__biz=MjM5MTQ4NzgwNA==&amp;mid=202880218&amp;idx=6&amp;sn=6784f6074c5cb3f4d3880890cb0ca802&amp;scene=2&amp;key=79cf83ea5128c3e5a6321fe2b80da0a2f3ad9e27c6fd428c41fb23b425a82bff3aa2dd9aa7c902a3b22a35a041cfa814&amp;ascene=1&amp;uin=MjI2NDkwNDk2MA%3D%3D&amp;de</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Smart COM Fuzzing - Auditing IE Sandbox Bypass in COM Objects<br><a target="_blank" href="https://sites.google.com/site/zerodayresearch/Smart_COM_Fuzzing_Auditing_IE_Sandbox_Bypass_in_COM_Objects_final.pdf">https://sites.google.com/site/zerodayresearch/Smart_COM_Fuzzing_Auditing_IE_Sandbox_Bypass_in_COM_Objects_final.pdf</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>web日志取证分析工具<br><a target="_blank" href="http://security.tencent.com/index.php/opensource/detail/15">http://security.tencent.com/index.php/opensource/detail/15</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>GTC2015 deep learning session vedio<br><a target="_blank" href="https://registration.gputechconf.com/form/session-listing&amp;doSearch=true&amp;additional_parameter_selector=none&amp;queryInput=&amp;topic_selector=Machine+Learning+%26+Deep+Learning&amp;type_selector=none">https://registration.gputechconf.com/form/session-listing&amp;doSearch=true&amp;additional_parameter_selector=none&amp;queryInput=&amp;topic_selector=Machine+Learning+%26+Deep+Learning&amp;type_selector=none</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>列举些Android SDK的国内镜像和相关资源<br><a target="_blank" href="http://www.xrpmoon.com/blog/archives/jripple1118.html">http://www.xrpmoon.com/blog/archives/jripple1118.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE-2014-4487 – IOHIDLibUserClient堆溢出漏洞<br><a target="_blank" href="http://blog.pangu.io/cve-2014-4487/">http://blog.pangu.io/cve-2014-4487/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>easyPass:字典生成和整理工具<br><a target="_blank" href="https://github.com/he1m4n6a/easyPass">https://github.com/he1m4n6a/easyPass</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>揭秘：钓鱼攻击工具包Angler Exploit Kit初探<br><a target="_blank" href="http://www.freebuf.com/news/special/61942.html">http://www.freebuf.com/news/special/61942.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>honggfuzz:A general-purpose fuzzer with simple, command-line interface<br><a target="_blank" href="https://code.google.com/p/honggfuzz/">https://code.google.com/p/honggfuzz/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>BCTF 2015 CamlMaze命題報告及CTF題目鏡像準備方法<br><a target="_blank" href="http://maskray.me/blog/2015-03-23-bctf-2015-camlmaze">http://maskray.me/blog/2015-03-23-bctf-2015-camlmaze</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>对JiaThis Flash XSS的挖掘与分析<br><a target="_blank" href="http://www.leavesongs.com/PENETRATION/jiathis-fso-flash-xss-rootkit.html">http://www.leavesongs.com/PENETRATION/jiathis-fso-flash-xss-rootkit.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Firefox 31~34远程命令执行漏洞的分析<br><a target="_blank" href="http://drops.wooyun.org/papers/5350">http://drops.wooyun.org/papers/5350</a></div><div class="single"><span id="tags">[会议]&nbsp;&nbsp;</span>IROS 2014 Aerial Open Source Robotics Workshop<br><a target="_blank" href="http://pixhawk.org/iros2014/proceedings/">http://pixhawk.org/iros2014/proceedings/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>Python Programming Tutorials Video<br><a target="_blank" href="http://pythonprogramming.net/dashboard/">http://pythonprogramming.net/dashboard/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>【流量劫持】躲避 HSTS 的 HTTPS 劫持<br><a target="_blank" href="http://www.cnblogs.com/index-html/p/https_hijack_hsts.html">http://www.cnblogs.com/index-html/p/https_hijack_hsts.html</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>MongoDB vs. Elasticsearch: The Quest of the Holy Performances<br><a target="_blank" href="http://blog.quarkslab.com/mongodb-vs-elasticsearch-the-quest-of-the-holy-performances.html">http://blog.quarkslab.com/mongodb-vs-elasticsearch-the-quest-of-the-holy-performances.html</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>BCTF 2015 - weak_enc Crypto challenge<br><a target="_blank" href="http://capturetheswag.blogspot.com.au/2015/03/bctf-2015-weakenc-crypto-challenge.html">http://capturetheswag.blogspot.com.au/2015/03/bctf-2015-weakenc-crypto-challenge.html</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>Introducing Elastichoney - an Elasticsearch Honeypot<br><a target="_blank" href="http://jordan-wright.github.io/blog/2015/03/23/introducing-elastichoney-an-elasticsearch-honeypot/">http://jordan-wright.github.io/blog/2015/03/23/introducing-elastichoney-an-elasticsearch-honeypot/</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>大华监控设备存在弱口令的全网统计报告<br><a target="_blank" href="http://plcscan.org/blog/2015/03/china-zhejiangdahua-dvr-dvs-global-census-report/">http://plcscan.org/blog/2015/03/china-zhejiangdahua-dvr-dvs-global-census-report/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>XCTF联赛—2015_BCTF_Writeup<br><a target="_blank" href="http://www.sigma.ws/?p=210">http://www.sigma.ws/?p=210</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Ad-Fraud Malware Hijacks Router DNS – Injects Ads Via Google Analytics<br><a target="_blank" href="http://aralabs.com/blog/2015/03/25/ad-fraud-malware-hijacks-router-dns-injects-ads-via-google-analytics/">http://aralabs.com/blog/2015/03/25/ad-fraud-malware-hijacks-router-dns-injects-ads-via-google-analytics/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware<br><a target="_blank" href="http://blogs.cisco.com/security/talos/poseidon">http://blogs.cisco.com/security/talos/poseidon</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>这些年做安全的一点心得<br><a target="_blank" href="http://weibo.com/p/1001603823512262446951">http://weibo.com/p/1001603823512262446951</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>机器学习的一些通俗易懂的tutorial<br><a target="_blank" href="http://cn.soulmachine.me/blog/20130327/">http://cn.soulmachine.me/blog/20130327/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>在未越狱的 iPhone 6上盗取支付宝和微信支付的帐号密码<br><a target="_blank" href="http://drops.wooyun.org/papers/5309">http://drops.wooyun.org/papers/5309</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Deep Dive Into Stageless Meterpreter Payloads<br><a target="_blank" href="https://community.rapid7.com/community/metasploit/blog/2015/03/25/stageless-meterpreter-payloads">https://community.rapid7.com/community/metasploit/blog/2015/03/25/stageless-meterpreter-payloads</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>左右互博：站在攻击者的角度来做防护<br><a target="_blank" href="http://www.freebuf.com/news/special/61508.html">http://www.freebuf.com/news/special/61508.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Bypassing Control Flow Guard on Windows 8<br><a target="_blank" href="https://blog.coresecurity.com/2015/03/25/exploiting-cve-2015-0311-part-ii-bypassing-control-flow-guard-on-windows-8-1-update-3/">https://blog.coresecurity.com/2015/03/25/exploiting-cve-2015-0311-part-ii-bypassing-control-flow-guard-on-windows-8-1-update-3/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>IE安全系列：IE的自我介绍 （I）<br><a target="_blank" href="http://drops.wooyun.org/papers/5390">http://drops.wooyun.org/papers/5390</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>dns recon &amp; research, find &amp; lookup dns records<br><a target="_blank" href="http://dnsdumpster.com/">http://dnsdumpster.com/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Unmasked: An Analysis of 10 Million Passwords<br><a target="_blank" href="http://wpengine.com/unmasked/">http://wpengine.com/unmasked/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Flash in 2015 <br><a target="_blank" href="https://www.fireeye.com/blog/threat-research/2015/03/flash_in_2015.html">https://www.fireeye.com/blog/threat-research/2015/03/flash_in_2015.html</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>Adventures in Browser Exploitation: Firefox 32.0 - 35.0.1 RCE<br><a target="_blank" href="https://community.rapid7.com/community/metasploit/blog/2015/03/23/r7-2015-04-disclosure-mozilla-firefox-proxy-prototype-rce-cve-2014-8636">https://community.rapid7.com/community/metasploit/blog/2015/03/23/r7-2015-04-disclosure-mozilla-firefox-proxy-prototype-rce-cve-2014-8636</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Detection of JavaScript-based Malware<br><a target="_blank" href="http://research.microsoft.com/en-us/projects/nozzle/">http://research.microsoft.com/en-us/projects/nozzle/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>从技术细节看美团的架构<br><a target="_blank" href="http://www.infoq.com/cn/presentations/see-meituan-architecture-from-technical-details">http://www.infoq.com/cn/presentations/see-meituan-architecture-from-technical-details</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android 签名验证机制<br><a target="_blank" href="http://riusksk.blogbus.com/logs/272154406.html">http://riusksk.blogbus.com/logs/272154406.html</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>八种最常见Docker开发模式<br><a target="_blank" href="http://cloud.51cto.com/art/201503/469496.htm">http://cloud.51cto.com/art/201503/469496.htm</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android平台的SQL注入漏洞浅析<br><a target="_blank" href="http://security.tencent.com/index.php/blog/msg/79">http://security.tencent.com/index.php/blog/msg/79</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>Cisco 2015 Annual Security Report <br><a target="_blank" href="http://www.cisco.com/web/offers/pdfs/cisco-asr-2015.pdf">http://www.cisco.com/web/offers/pdfs/cisco-asr-2015.pdf</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>Cryptographic Backdooring<br><a target="_blank" href="https://131002.net/syscan.pdf">https://131002.net/syscan.pdf</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>PowerSpy: Location Tracking using Mobile Device Power Analysis<br><a target="_blank" href="http://loccs.sjtu.edu.cn/gossip/blog/2015/03/23/2015-03-23/">http://loccs.sjtu.edu.cn/gossip/blog/2015/03/23/2015-03-23/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>未来 Docker 的安全<br><a target="_blank" href="http://weibo.com/p/1001603824370337349167">http://weibo.com/p/1001603824370337349167</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全专题</strong>
    </div><div class="single">国内NLP相关公司产品<br><a target="_blank" href="https://www.sec-wiki.com/topic/61">https://www.sec-wiki.com/topic/61</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/56">SecWiki周刊(第56期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
