ISCC赛后总结

博主首次参加ISCC线下赛与队友获一等奖,但比赛体验不佳。上午选择题和部分原题得分不错,下午AWD赛环节,因技术不足,起初打不动自己的服务器,摸索到方法后仍有不死马无法删除,被攻击40多次。博主意识到需提升自身实力。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

第一次参加ISCC线下赛就和队友一块拿了一等奖,真的很开心。

不过回想起比赛过程,又觉得比赛体验很不好,揪其原因还是自己的技术太菜了。

整个比赛中,上午的比赛还行,由于我们有选择题的题库,所以我们的选择题拿了850分左右。misc题,reverse题和mobile题又都是原题,虽然只被我们拿下了两道,不过一道题就1000分,所以我们拿的分也不低。但下午就不行了,下午开始打AWD,当时我们对线下赛的还不是很了解,就知道拿下自己的服务器就可以上高地,还可以打别人的服务器。但前提是拿下自己的服务器啊,菜的一批的我们刚开始连自己的服务器都打不动,也不知道该怎么打。直到比赛进行几个小时后我们才摸索到一些方法,拿下了第一台服务器,但这时我们已经被打了几十次了。连上服务器后,我们赶紧把该删的后门都删了,可是还有两个不死马怎么都删不掉。比赛过后我们从学长那里听说只要重启服务器就可以清除不死马,但这时我们并不知道这个方法,还以为是因为自己的技术菜才删不掉不死马,所以就没举手。说实在的还是自己太菜,一下午一共被打了40多次。

看来以后还是得不断的努力来提高自己的实力。

03-18
### ISCC (International Standard Content Code) Overview The International Standard Content Code (ISCC) is a standard designed to uniquely identify digital content objects, facilitating their management and distribution across various platforms. Unlike the **International Symposium on Computer Architecture (ISCA)**[^1], which focuses on advancements in computer architecture research, ISCC serves as an identifier system for multimedia assets such as audio, video, images, and text. #### Purpose of ISCC The primary purpose of ISCC is to provide a standardized method for generating unique identifiers that can be used to track, manage, and protect intellectual property rights associated with digital content. This ensures interoperability between different systems while maintaining consistency in metadata representation[^2]. #### Components of ISCC An ISCC code typically consists of four components: 1. **Header**: Identifies the type of media being encoded. 2. **Descriptor**: Contains descriptive information about the content. 3. **Fingerprint**: A cryptographic hash derived from the file's binary data, ensuring uniqueness even when files are altered slightly. 4. **Metadata Hash**: Represents additional attributes like authorship or licensing details. These elements work together to create comprehensive yet concise representations suitable for both human readership and machine processing purposes. #### Applications of ISCC Some common applications include copyright protection schemes where creators attach licenses directly linked via these codes; search engines utilizing them during indexing processes so users find exact matches more efficiently than traditional keyword searches alone would allow; also within blockchain technologies enabling decentralized storage solutions without losing traceability over time due to network changes etcetera. ```python import hashlib def generate_iscc_fingerprint(file_path): sha256_hash = hashlib.sha256() with open(file_path,"rb") as f: # Read and update hash string value in blocks of 4K for byte_block in iter(lambda: f.read(4096),b""): sha256_hash.update(byte_block) return sha256_hash.hexdigest() file_name = 'example.mp4' print(f"Fingerprint for {file_name}: {generate_iscc_fingerprint(file_name)}") ``` This Python snippet demonstrates how one might compute part of an ISCC fingerprint by hashing a given input file using SHA-256 algorithm—a widely accepted practice among developers implementing similar standards today.
评论 3
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值