I wrote this article when the heart is very not practical, always afraid to say wrong will be mistaken for other people's things. Oh, here we go.
This article is more focused on the prevention of ASP vulnerabilities, so the server black and other
If the compressed dynamic file (php,asp,aspx) does not need to, because its page is dynamically generated every time, after the compression is discarded. Then in IIS Manager, the right key to the Web site-Properties, not one of the following sites,
This article is more focused on the prevention of ASP vulnerabilities, so the server black and other aspects of the explanation may be slightly too little.
Basic server security Settings
Install Patches
After installing the operating system, it
Suddenly found oneself Blog FCKeditor can't use, good surprise! Incredibly optimistic about the Pjblog will have no time. Look online and Copy some of the main things. The following are the main elements
FCKeditor's official website:
1, CAT/ETC/PASSWD did not find unknown users and suspicious root rights users.
2, NETSTAT-ANP View all process and PID number, no abnormal connection found.
3, last view recently logged in user, no exception found
4, Cat/etc/profile View
xml| Server | data | issues
With XMLHTTP through Proxy server from the service to extract data, such as from WebService, ASP, aspx extract data, I used to have some unknown problems, often not pass agent certification. After many groping, and
Windows2003 has been around for a long time, now for the server operating system Windows2003 networking technology, security configuration technology and many users are not very familiar with, here, I will introduce you to Windows Server 2003
Below the web, let's look at how to build and deploy one of the simplest Web services
Setting up a Web service
1. Create a directory called WebService in the Wwwroot directory.
2. Establish a document such as the following:
Using System;
Using
Q: IIS installed, how ASP files cannot be opened
I'm not connected to the Internet for the time being. I have IIS installed, but the ASP file on the local machine is not open. Tip To select a program, but no IE is missing. Open IE, with the file
one.%0 0 truncation%00 truncation is a very classic gesture commonly used in upload vulnerabilities, and can be used to bypass SQL injection. In the WAF layer, after receiving the parameter ID, encounter%00 truncation, only get to id=1, unable to
Basic preparation--command tamper-proof and command loggingMany hackers invade the operating system, will do two common operations unset history and replace the command file (or the corresponding link library file), for these two points to do a
Original use of the official JavaScript image browser from ImageSee: visit the "imagesee.htm URL +? Pic = image URL & page = URL of the image-related webpage ", where the page parameter can be ignored.
About ImageSee:
ImageSee is an open-source web
The following is a piece of NGINX configuration code, which has a simple comment.Everyone should remember the principle that the directory that can execute php programs must not allow read and write permissions, but the directory that can read and
This article mainly introduces destoon's use of Rewrite rules to set website security. For more information, see destoon security settings, this article uses Rewrite rule settings to increase website security as an example:
Rule 1:
Blocking
On September 6, September 20, the anti-Virus center of Jiangmin technology intercepted a webpage receiver Virus that was spread on a fake Microsoft website. autorun. dr), the virus will infect web files, insert malicious website connection to it,
Jiang min reminds you today that in today's Virus, the Virus. Autorun. dr "U disk parasite" variants dr and TrojanDownloader. VB. rg "video baby" variants rg are worth noting.
Virus name: Virus. Autorun. dr
Chinese name: "U disk parasite" variant dr
I. Using VS to build a Web siteGeneral principles of website operation:1. All Web programs need one thing to run: Web Server Software.2.web Server Software functions: Receives requests, responds to requests. Passive-no response is not
Here's how to modify it:Added in the httpruntime tag in the Web. config methodRequestvalidationmode= "2.0" Depth:Validaterequest= "False" is to turn off authenticationBut what does it mean to have one more Requestvalidationmode in 4.0?The
New utility of php dos Vulnerability: CVE-2015-4024 Reviewed
0x01 how WAF is bypassedAccording to the principles of the php dos Vulnerability, when the multipart_buffer_headers function resolves the value corresponding to the header, there are n
Example of three methods (including two types of Ajax) in the JavaScript call background, javascriptajax
Method 1: directly use call (ASPX page)
The front-end JS Code is as follows:
The code for the background method is as follows:
Public static
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.