Alibabacloud.com offers a wide variety of articles about smart security vs internet security, easily find your smart security vs internet security information here online.
Rule 1: Never trust external data or input
The first thing you must realize about WEB application security is that you should not trust external data. External data (outside) includes any data that is not directly entered by the programmer in the PHP code. Any data from any other source (such as GET variables, form POST, database, configuration files, session variables, or cookies) is untrusted until measures are taken to ensure
to obtain data and service. This is the return to the ancient Client-server model. Client-server-based computing model is widely used in various fields of distributed computing, such as Internet, database access and so on. In embedded smart handheld devices, this client-server approach is ubiquitous in order to provide functionality to application developers in a unified mode. Media playback, audio and vid
infected attachments. When it finds a virus, it automatically isolates the infected email before it reaches the user.
Another good way to protect the network is to set the time for users to access the network based on their stay in the company. A temporary employee who usually works during the day should not be allowed to access the network at, unless the employee's supervisor tells you that it is necessary for a special project.
Finally, remember that you need a password when accessing anythin
will be re-played, so this will not be done, seriously, you need to reinstall the system.
Install anti-virus software
Do not use a browser to access the Internet on vps, especially on IE. if you must use a browser to access the Internet, open the Internet Explorer and consider google [we strongly recommend that you do not use the
Topology 2, with NAT, A1,A2 can access B, but B can not access A1,A2. But A,A1,A2 can exchange visits.Figure 23. Use Host-only Networking (using Host network)Description: Using the VMNET1 Virtual Switch, the virtual machine can only exchange visits with virtual machines and hosts. That is, not on the Internet, as shown in network topology 3,With host mode, A,A1,A2 can exchange visits, but A1,A2 cannot access B, nor can it be accessed by B.Figure 3XSS
without logging onto the machine. Speaking of this, does it mean that the operating system has no responsibility at all? In the current Windows login architecture, each IME implementation is responsible for security checks and has determined whether some functions can be activated by users. Is it possible for the operating system to ensure that, if the machine is in the login status, specific functions (such as enabling
.
Wait a moment (if you want to scan a large number of computers, it may take a long time) and the scan results will be listed as if you had scanned a computer before, we only need to solve all the problems represented by Red forks. Because the general steps are similar, we will not talk about them here.
Offline use of MBSA
We can also use MBSA offline when it is inconvenient to access the Internet. First in http://go.microsoft.com/fwlink? LinkId
-virus software to kill all Trojans, because the characteristics of the ASP Trojan Horse can be through a certain means to avoid the killing of anti-virus software.Set port protection and firewalls, delete default sharesIt's all about server protection, and even if you don't have IIS on your server, these security measures are best done. This is the blind area of the arjunolic, probably know the shielding port with local
Original link: http://www.ibm.com/developerworks/cn/web/1012_weiqiang_webattack/
Introduction: WEB Security issues are often overlooked by programmers because they believe that there will be a professional operational staff or security Service team to help them find vulnerabilities and instruct them to modify them. And for small companies, there is no such professional staff and how to do it.
With the development of science and technology, wireless internet technology is more and more mature and popular, and WiFi coverage point is more and more, I like to do a weekend thing is, came to the café, bubble a cup of coffee, open Win7 computer, connect Wi-Fi, enjoy the world in the network roaming.
The so-called Wi-Fi, is a personal computer, handheld devices (such as PDAs, mobile phones) and other terminals to connect to each other wireless te
even if completely done; Of course, in order to ensure the success of encryption, you had better before burning, with a professional virtual CD-ROM work, to test the CD password, set whether the success. This kind of optical disk encryption method is not very simple, practical ah!Iv. the application of encryption technology in network CommerceThe application of encryption technology is multifaceted, but the most widespread or in the application of E-commerce and VPN, the following are respectiv
providers, which are placed in front of the SUNJCE provider to use them.The default SUNJCE provider provides the following features:
Implement the SSL3.0 and TLS1.0 protocols.
Implements the ssl/i ' LS state machine (sslengine), which allows the processing of buffer data to generate ssl/i ' LS encoded data(J2SE 5.0 and later).
Implements the key factory and key generator used to support the RSA algorithm.
Implement the most common SSL and TLS cryptographic algorithm suite t
configuration criteria
Ensure that all administrator accounts are updated according to policy. The default password setting should not exist on a specific device. For those who have sufficient default account and password resources, the information is very rich. There are some security accounts, whose account name is the password, which is simply trouble. It is also important to set the duration of a password, and it is also
list.Task scheduler allows programs to run at a specified time.Routing and Remote Access... the remaining full text>How can I set vps security? Centos5 System
1. disable unnecessary services.This should be easy to understand. All services that are not required by our system are closed,One advantage is to reduce memory and CPU usage, and the other advantage is to improve security. Which services must be ret
necessary permissions should be granted to the user;
13. Use the specific 'escape characters' function in each programming interface (C ++ PHP Perl Java JDBC, etc;
When using MySQL (the best combination with PHP) databases over the internet, we must use less plaintext data for transmission, and use SSL and SSH encryption for data transmission;
14. Learn to use tcpdump and strings tools to view the MySQL security
browsers, and wireless network clientsProgramThese must be upgraded in real time to reduce attacks caused by their own defects.
7. Protect any sensitive information
The personal information retained on the web page will become very useful for hacker attacks. Therefore, some encryption tools can be used if conditions permit.
8. Use encryption technology to surf the Internet
This is important when no virtual personal network or virtual personal
the database, and only a few necessary permissions should be granted to the user;
13. Use the specific 'escape characters' function in each programming interface (C ++ PHP Perl Java JDBC, etc;
When using MySQL (the best combination with PHP) databases over the internet, we must use less plaintext data for transmission, and use SSL and SSH encryption for data transmission;
14. Learn to use tcpdump and strings tools to view the MySQL
Iptables IntroductionIptables is an IP packet filtering system integrated with the latest 2.6.x version of the Linux kernel. If a Linux system is connected to an Internet LAN, a server, or a proxy server that links the LAN and the Internet, the server facilitates better control over IP packet filtering and firewall configuration on Linux systems.Neitfilter/iptables IP packet Filtering system is a powerful t
download it.
This is the most popular method on the Internet to enhance Access database security, and there is also a powerful "theoretical basis ".
Because ". mdb files are not processed by the IIS server, but are directly output to the Web browser. asp files are processed by the IIS server. The Web browser displays the processing result, not the content of the ASP file.
However, we ignore a very importan
Niu Yi learning ---- Web programming security questions, ---- web security questions
In web programming, security is a matter of constant attention. The SQL injection Prevention operation that you encounter when you hit the bull's nest. operations such as md5 conversion to plaintext and password to dark are all raised to address web programming
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.