Secure without passwords! Jinshan authorized protection Technical Guide

To protect the security of office documents, we usually use the encryption function of office software. However, there are a large number of password cracking software on the Internet. As long as there is enough time, there is almost a hundred

Experience in using firewalls

As hackers flood, firewall software emerged to prevent malicious supply. However, we should be able to correctly use the firewall software to truly serve us. Below I will introduce some experiences in the use of firewall software to you. I. Security

Network Firewall is not omnipotent in the face of hacker attacks

Firewall alone is no longer enough to protect online assets. Today, hackers and their attack strategies are becoming more and more savvy and dangerous. One of the major threats is application-layer attacks, which can sneak into the firewall until

Modify Registry Permissions to prevent Trojans

I. Question proposal Most Trojans and some viruses are automatically started by using the self-startup items or files in the Registry or by using system services. For details, see Windows auto-start mode. is there a way to prevent Trojans or viruses

Ten misunderstandings about using anti-virus software

Almost everyone who uses computers has ever experienced computer viruses and antivirus software. However, many people still have misunderstandings about viruses and anti-virus software. Anti-virus software is not omnipotent, but it is never a waste.

Detailed analysis report on virus 8749 virus of rogue software

8749 virus is a typical virus-based rogue software. In the 8749 virus, the typical phenomenon is that the home page is lockedWww.8749.com. In just a few days, the 8749 virus has appeared in several variants. According to the appearance speed of

"Mushroom" virus solution

Virus symptoms:The virus file with the icon "mushroom" found in each disk sending area is displayed in the title bar of the program during running. To save the trouble, combine the two images provided by customer service into one.Similar symptoms of

Four methods for detecting viruses on Hard Disks

To carry out the infection, there will inevitably be traces (there will be marks when it passes through ). The same is true for biomedical viruses. To detect computer viruses, you need to go to the virus parasitic site to check for abnormal

Blind injection ideas and solutions for online order by statements in Zhongguancun

Blind Injection Based on order by contentDetailed description:For http://active.zol.com.cn/diy/bisai.php? Mont_h = 2009-05 & id = 12 & type = 15 & order = zj_vote + desc for security detection.Failed to try numeric injection.However, if you see

Phpmywind message board xss & amp; csrf vulnerability and repair

I also posted this vulnerability on the French forum. Condition for exploits Message code   The next step is to wait. This is a new cms administrator who will definitely read the comment and visit case. php every day.  

A somewhat violent SQL Injection script

Rem Copy Right by Samy http://www.bkjia.comCall SafeRequest Sub SafeRequestIf Request. QueryString <> "ThenKll_inje (Request. QueryString)If Request. Form <> "" ThenKll_inje (Request. From)If Request. Cookies <> "" ThenKll_inje (Request. Cookies)End

WAF and SQL anti-injection bypass Methods

Generally, the following keywords are used to filter strings:And | select | update | chr | delete | % 20 from |; | insert | mid | master. | set | =The most difficult thing to handle here is the select keyword. How can we break through them? Although

DOYOcms local File Inclusion Vulnerability

This is a set of CMS, which is very simple... $ Handle_controller = syClass ($ __controller, null, $ GLOBALS ['G _ DY '] ["controller_path"]. '/'. $ __controller. ". php "); Next let's look at it. Here, $ sdir is not filtered out. Then, let's

CSRF vulnerabilities on Sohu Weibo

A csrf vulnerability in Sohu may cause worms to spread. Weibo is published without the user's consent.Detailed description:When receiving the POST and GET information, the Referer is not verified, and the token is not added to the POST information

How to use the anti-leech system to fix IIS6.0 resolution Vulnerabilities

Websites must be truly secure and involve a wide range of things, mainly because there are too many ways of penetration ...... I didn't talk so much about it this time. I found that there seems to be no one on the internet talking about IIS6.0.The

Virtual Host Privilege Escalation experience

This time, the target is a virtual host and the data of one of the forums is required. The target station is discuz x2.5, and the last few 0-day attempts have been made, and the passwords of several logon ports have been tried again, without any

Sina mail text storage type XSS, empty bytes can be uploaded and cross-site

When talking about 00, we should be most familiar with upload truncation, % 00 and so on.00 usually indicates that the string ends. \ 0 is used in C, and \ u0000 is used in JS.About the application of \ 0 in XSS, it seems not to be a lot of it, the

DB_OWNER permission for separating websites from databases to obtain the mssql Server IP Address

Now, Yafei is injected. there are a lot of tools. In the past, the manual injection era no longer exists. instead of nbsi hdsi ah d injection tool .. and so on. it is also a favorite of many cainiao. even nothing. I don't know anything. just a few

Xheditor default upload. php Malformed File upload Vulnerability

The file upload code uses the whitelist mechanism, which is relatively safe, but the problem occurs in the whitelist mechanism verification.Here we use regular expression matching to obtain a shell by using the iis parsing feature. Verification Code:

Another O & M, malicious js Script Injection, access to pseudo-random domain names

Our server has another intrusion accident. A js script is inserted at the bottom of an html webpage,As a result, when a visitor opens a webpage, the anti-virus software warns of malicious code on the website. This is a common method in black chain

Total Pages: 1330 1 .... 1087 1088 1089 1090 1091 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.