
  <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
      <title>Morphy&#39;s Blog English</title>
      <link>https://morphychan.com/en/blog</link>
      <description>写程序分析、网络分析、代码安全与AI工程实践，也记录一些具体技术问题的拆解。</description>
      <language>en-US</language>
      <managingEditor>mchen26@outlook.com (Morphy Chan)</managingEditor>
      <webMaster>mchen26@outlook.com (Morphy Chan)</webMaster>
      <lastBuildDate>Fri, 26 Nov 2021 00:00:00 GMT</lastBuildDate>
      <atom:link href="https://morphychan.com/feed.en.xml" rel="self" type="application/rss+xml"/>
      
  <item>
    <guid>https://morphychan.com/en/blog/nand2tetris-02-sum10</guid>
    <title>nand2tetris Series 02 - Computing Sum of 1 to 10</title>
    <link>https://morphychan.com/en/blog/nand2tetris-02-sum10</link>
    <description>Computing the sum of 1 to 10 in hack computer assembly, demonstrating loops and conditional jumps.</description>
    <pubDate>Fri, 26 Nov 2021 00:00:00 GMT</pubDate>
    <author>mchen26@outlook.com (Morphy Chan)</author>
    <category>nand2tetris</category>
  </item>

  <item>
    <guid>https://morphychan.com/en/blog/nand2tetris-01-infinite_loop</guid>
    <title>nand2tetris Series 01 - Implementing an Infinite Loop in Assembly</title>
    <link>https://morphychan.com/en/blog/nand2tetris-01-infinite_loop</link>
    <description>Implementing an infinite loop in hack computer assembly, breaking down how symbols, A-instructions, and JMP work together.</description>
    <pubDate>Thu, 18 Nov 2021 00:00:00 GMT</pubDate>
    <author>mchen26@outlook.com (Morphy Chan)</author>
    <category>nand2tetris</category>
  </item>

  <item>
    <guid>https://morphychan.com/en/blog/understand-zeek-script-to-detect-ssh-brute-force-attack</guid>
    <title>Analyzing Zeek&#39;s SSH Brute Force Detection Script</title>
    <link>https://morphychan.com/en/blog/understand-zeek-script-to-detect-ssh-brute-force-attack</link>
    <description>Analyzing Zeek&#39;s built-in SSH brute force detection script, understanding its detection logic and threshold design.</description>
    <pubDate>Wed, 09 Jun 2021 00:00:00 GMT</pubDate>
    <author>mchen26@outlook.com (Morphy Chan)</author>
    <category>zeek</category><category>dpi</category>
  </item>

  <item>
    <guid>https://morphychan.com/en/blog/use-zeek-to-analyze-pop3-02</guid>
    <title>Using Zeek to Analyze POP3 Protocol (2)</title>
    <link>https://morphychan.com/en/blog/use-zeek-to-analyze-pop3-02</link>
    <description>Continuing POP3 protocol analysis — extracting and reconstructing email content.</description>
    <pubDate>Fri, 30 Apr 2021 00:00:00 GMT</pubDate>
    <author>mchen26@outlook.com (Morphy Chan)</author>
    <category>zeek</category><category>dpi</category>
  </item>

  <item>
    <guid>https://morphychan.com/en/blog/use-zeek-to-analyze-pop3-01</guid>
    <title>Using Zeek to Analyze POP3 Protocol (1)</title>
    <link>https://morphychan.com/en/blog/use-zeek-to-analyze-pop3-01</link>
    <description>Using Zeek to parse POP3 protocol, exploring Zeek&#39;s API and event-driven protocol analysis.</description>
    <pubDate>Mon, 26 Apr 2021 00:00:00 GMT</pubDate>
    <author>mchen26@outlook.com (Morphy Chan)</author>
    <category>zeek</category><category>dpi</category>
  </item>

  <item>
    <guid>https://morphychan.com/en/blog/fixed-pve-6-cant-access-web-gui-issue</guid>
    <title>Fixed PVE 6 Can&#39;t Access the Web GUI Issue</title>
    <link>https://morphychan.com/en/blog/fixed-pve-6-cant-access-web-gui-issue</link>
    <description>After a fresh PVE 6 installation, the web GUI was inaccessible. Root cause: conflicting /etc/hosts entries preventing pve-cluster from starting.</description>
    <pubDate>Fri, 19 Feb 2021 00:00:00 GMT</pubDate>
    <author>mchen26@outlook.com (Morphy Chan)</author>
    <category>pve</category>
  </item>

    </channel>
  </rss>
