
  <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
      <title>Morphy&#39;s Blog 中文</title>
      <link>https://morphychan.com/zh/blog</link>
      <description>写程序分析、网络分析、代码安全与AI工程实践，也记录一些具体技术问题的拆解。</description>
      <language>zh-CN</language>
      <managingEditor>mchen26@outlook.com (Morphy Chan)</managingEditor>
      <webMaster>mchen26@outlook.com (Morphy Chan)</webMaster>
      <lastBuildDate>Fri, 22 May 2026 00:00:00 GMT</lastBuildDate>
      <atom:link href="https://morphychan.com/feed.zh.xml" rel="self" type="application/rss+xml"/>
      
  <item>
    <guid>https://morphychan.com/zh/blog/taint-analysis-foundations</guid>
    <title>标签如何在代码里流动——Taint Analysis怎么工作</title>
    <link>https://morphychan.com/zh/blog/taint-analysis-foundations</link>
    <description>以SQL注入为切入点，讲清楚taint analysis怎么工作：标签流动、CFG、不动点、多元体系、隐式控制流边界。</description>
    <pubDate>Fri, 22 May 2026 00:00:00 GMT</pubDate>
    <author>mchen26@outlook.com (Morphy Chan)</author>
    <category>static-analysis</category><category>taint-analysis</category>
  </item>

  <item>
    <guid>https://morphychan.com/zh/blog/nand2tetris-02-sum10</guid>
    <title>nand2tetris系列02-sum10</title>
    <link>https://morphychan.com/zh/blog/nand2tetris-02-sum10</link>
    <description>用hack computer汇编计算1到10的累加和，介绍循环和条件跳转的实现。</description>
    <pubDate>Fri, 26 Nov 2021 00:00:00 GMT</pubDate>
    <author>mchen26@outlook.com (Morphy Chan)</author>
    <category>nand2tetris</category>
  </item>

  <item>
    <guid>https://morphychan.com/zh/blog/nand2tetris-01-infinite_loop</guid>
    <title>nand2tetris系列01-实现无限循环汇编程序</title>
    <link>https://morphychan.com/zh/blog/nand2tetris-01-infinite_loop</link>
    <description>用hack computer汇编实现一个无限循环程序，拆解符号、A指令和JMP跳转的工作原理。</description>
    <pubDate>Thu, 18 Nov 2021 00:00:00 GMT</pubDate>
    <author>mchen26@outlook.com (Morphy Chan)</author>
    <category>nand2tetris</category>
  </item>

  <item>
    <guid>https://morphychan.com/zh/blog/understand-zeek-script-to-detect-ssh-brute-force-attack</guid>
    <title>分析Zeek SSH暴力破解攻击检测脚本</title>
    <link>https://morphychan.com/zh/blog/understand-zeek-script-to-detect-ssh-brute-force-attack</link>
    <description>分析Zeek内置的SSH暴力破解检测脚本，理解其检测逻辑和阈值设计。</description>
    <pubDate>Wed, 09 Jun 2021 00:00:00 GMT</pubDate>
    <author>mchen26@outlook.com (Morphy Chan)</author>
    <category>zeek</category><category>dpi</category>
  </item>

  <item>
    <guid>https://morphychan.com/zh/blog/use-zeek-to-analyze-pop3-02</guid>
    <title>使用Zeek解析POP3协议(2)</title>
    <link>https://morphychan.com/zh/blog/use-zeek-to-analyze-pop3-02</link>
    <description>继续POP3协议解析，实现邮件内容的提取和还原。</description>
    <pubDate>Fri, 30 Apr 2021 00:00:00 GMT</pubDate>
    <author>mchen26@outlook.com (Morphy Chan)</author>
    <category>zeek</category><category>dpi</category>
  </item>

  <item>
    <guid>https://morphychan.com/zh/blog/use-zeek-to-analyze-pop3-01</guid>
    <title>使用Zeek解析POP3协议(1)</title>
    <link>https://morphychan.com/zh/blog/use-zeek-to-analyze-pop3-01</link>
    <description>使用Zeek解析POP3协议，探索Zeek API和事件驱动的协议分析方法。</description>
    <pubDate>Mon, 26 Apr 2021 00:00:00 GMT</pubDate>
    <author>mchen26@outlook.com (Morphy Chan)</author>
    <category>zeek</category><category>dpi</category>
  </item>

  <item>
    <guid>https://morphychan.com/zh/blog/fixed-pve-6-cant-access-web-gui-issue</guid>
    <title>修复PVE 6无法访问Web管理界面的问题</title>
    <link>https://morphychan.com/zh/blog/fixed-pve-6-cant-access-web-gui-issue</link>
    <description>PVE 6全新安装后无法访问Web管理界面，排查发现是/etc/hosts配置冲突导致pve-cluster服务启动失败。</description>
    <pubDate>Fri, 19 Feb 2021 00:00:00 GMT</pubDate>
    <author>mchen26@outlook.com (Morphy Chan)</author>
    <category>pve</category>
  </item>

    </channel>
  </rss>
