September Security Symposium:
Internet Security Hot Topic-how to detect and guard against compromised websites
The following technologies (which can be customized related technologies) are proposed for discussion and technical research, and you are welcome to participate in:
(1) Website intrusion log file analysis
(2) Packet capture analysis intrusion behavior and patch vulnerability
(3) Security protection from the rules
(4) Online monitoring of Webshell and other malicious acts
(5) Website Security Reinforcement Combat
(6) Technical strategies and measures for intrusion response
(7) Forensic analysis
The above environment requires general user rights in Linux.
You are welcome to provide clues, data and information for hacker tracking and forensics.
Registration to participate in QQ Group: 647359714, Verification Please indicate research study, others do not pass.
51cto Forum Discussion Address:
Http://bbs.51cto.com/viewthread.php?tid=1512645&extra=page%3D1&frombbs=1
This article is from the "Simeon Technology column" blog, please be sure to keep this source http://simeon.blog.51cto.com/18680/1965915
Internet Security Hot Topic-how to detect and guard against compromised websites