deep directory ~
This time is busy, no time to test, directly upload the compressed package to the http://www.virustotal.com scan, the results are as follows:
File Name:
Gift .rarSubmission date:
2010-09-16 14:20:36 (UTC)Current status:
Queued Queued Analyzing Finished
Result:
12/43 (27.9%)
Antivirus
Version
Last update
Result
AhnLab-V3
2010.09.16.01
2010.09.16
-
AntiVir
8.2.4.52
2010.09.16
-
Antiy-AVL
/spywareguard.html spyware blaster: http://www.javacoolsoftware.com/spywareblaster.html
Best Anti-Virus Software
Grisoft's AVG is a popular anti-virus software that can be automatically upgraded, scanned in real time, and scanned by email. Another very good software is antivirpersonaledition classic, which has many features similar to the former, but remember that there is a big gap between free software and paid software. ClamWin is also one of the best anti-virus software. It is part of
you really want to avoid using temporary files, and no one except you can log on to your computer, you can also do this:
(echoblahblah;echoblahblah)|pure-pwuseraddjohn-d/tmp/john-uftpuser
Through the introduction and analysis in this article, we have learned how to modify and operate the pure-pw password and pure-pw script! I hope this article will help you!
PureFTPd problem summary
Pureftpd problem set through SSH for FTP
PureFTPd Q A collection
Pureftpd Problem Set firewall
Ch
anonymous user processes.
# PerUserLimits :20
Through the description and analysis of this article, we have roughly understood the Chinese description and code of the PureFTPd configuration. I hope this article will help you!
PureFTPd configuration file Overview
How to integrate ClamAV in PureFTPd
Use Pureftpd for FTP permission and Disk Quota Management
Set up FTP servers for Pureftpd and mysql
Debian5 LNMP compilation and installation pu
Install the Linux anti-virus software Antiviral 15.04 in Ubuntu 0.2
Many people think that Linux is immune to viruses, mainly because of the security genetic lineage of Linux, but it does not mean that it is absolutely secure. Any software system has defects, previously, anti-virus software that supports Linux was launched in 360. Antiviral is a ClamAV interactive interface that simplifies the form of virus scanning by Clam AntiVirus On Linux systems
calendar reminder program. (Sudo apt-get install alarm-clock)
2) time tracking Hamster. This applet can count the time when you operate different programs. (Sudo apt-get install hamster-applet)
Communication Software
1) instant chat with Empathy.
2) Weibo writer Gwibber. It can be used for Twitter, Identi. ca, Jaiku, Facebook, Digg, and so on. (Sudo apt-get install gwibber)
3) QQ and Skype. This is what I added. You can download Linux from QQ. It is good. And Skype.
Security and Privacy
1) On-T
uploaded normal program)Ps/Root/chattr-I-a/bin/ps rm/bin/ps-fYum reinstall procps-yOrCp/root/ps/binNetstat/Root/chattr-I-a/bin/netstat rm/bin/netstat-fYum reinstall net-tools-yOrCp/root/netstat/binLsof/Root/chattr-I-a/bin/lsof rm/usr/sbin/lsof-fYum reinstall lsof-yOrCp/root/lsof/usr/sbinChattr lsattrYum-y reinstall e2fsprogsSs/Root/chattr-I-a/usr/sbin/ss rm/usr/sbin/ss-fYum-y reinstall iprouteOrCp/root/ss/usr/sbinModify the permissions of the following two programs. In this case, some of t
/xinetd. d/krb5-telnet# Default: off# Description: The authenticated telnet server accepts normal telnet sessions ,\# But can also use Kerberos 5 authentication.Service telnet{Flags = REUSESocket_type = streamWait = noUser = rootServer =/usr/kerberos/sbin/telnetdLog_on_failure + = USERIDDisable = no}
After the configuration is complete, restart the xinetd service.
Solaris: Comments the CONSOLE line of this file and takes effect directly.
-Bash-3.00 # cat/etc/default/login | grep CONSOLE# If CONS
Remnux is a Linux-based system for reverse engineering and malicious analysis.Code.
The software installed on remnux includes:
Analyze flash malware: swfttools, flasm, flare, rabcdasmand xxxswf. py
Interacting with IRC bots: IRC server (inspire ircd) and client (epic5)
Observe and interact with network activities: Wireshark, honeyd, inetsim, fakedns, fakesmtp, Netcat, networkminer, ngrep, pdnstool and tcpdump
Decode javascript: Firefox firebug, quickjava and JavaScript deobfuscator ext
this file and also available from:
Http://www.gnu.org/licenses/.
Http://opensource.org/licenses/.
Thank you ClamAV for planning inspiration and for signing this script exploit, without it, this script would probably not exist, or at best, would have very limited value.
Thanks to SourceForge and GitHub for hosting the program document, Spambot security for the hosted Phpmussel discussion forum, and other sources of signature utilized by Phpm
Iredmail is an open-source, free mail server project that is published under the GPL (V2) protocol. Official website www.iredmail.org (domestic not accessible), can be accessed through www.iredmail.com.Iredmail is a good Post Office Server free solution for small businesses, individuals or teams to build internal staff mailbox services;Using Iredmail to build a mail server requires a public network of CentOS hosts. Recommended use of VPS;Iredmail core components and their corresponding functions
old boy One topic per day:2017-3-7 Day content finishing (i) Solution Strategy To the enterprise interview is a number of competitors, so pay attention to the dimensions and height of the answer, we must direct the second to kill competitors, to fix high-paying offer. (ii) solution Tactics Linux web Upload a directory of ways to upload Trojans to linux server, depending on the website from which the malicious person visited the site -- >linux system -->http service --> Middleware servi
(middleware layer), database and other levels of control.3, control the permissions of the upload directory and non-site Directory permissions (Linux file directory permissions +web service layer control).4, after the Trojan file access and execution control (Web service layer + file system storage layer).5, the important configuration files, commands and Web configuration files such as MD5 fingerprint and backup.6, install anti-virus software CLAMAV
+web Service layer Control).
Access and execution control (Web Service layer + file System storage layer) After Trojan file is passed.
important configuration files, commands, and WEB configuration and other files to do MD5 fingerprint and backup.
install anti-virus software ClamAV and so on, regular monitoring of the Trojan horse.
Configure the server firewall and intrusion detection services.
Monitor server file changes, process ch
Virus Description:
Name: Visin
Path: C:\windows\system32\visin.exe
Production company: Microsoft Corporation
Behavior Description: New system Startup Items
Location: Hkey Local Machine\software\microsoft\windows\currentversion\policies\explorer\run
Registry: Hkey Local Machine\software\microsoft\windows\currentversion\policies\explorer\run
A "Visin" appears, please cancel the startup first, (step: Start-run-enter "msconfig"-boot-Remove the "Visin" item) and then reboot, use WinRAR to find Vis
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.