Spam malware has infected thousands of Linux and FreeBSD system servers
According to the latest 23-page Security Report published by the anti-virus provider Eset, thousands of Linux and FreeBSD operating system-based servers have been infected with
Juniper Junos Security Restriction Bypass Vulnerability (CVE-2014-6383)
Release date:Updated on:
Affected Systems:Juniper Networks JUNOSDescription:Bugtraq id: 72071CVE (CAN) ID: CVE-2014-6383
JunosE is an operating system used in the e-series
Etiko CMS index. php Cross-Site Scripting Vulnerability
Release date:Updated on:
Affected Systems:Etiko CMSDescription:CVE (CAN) ID: CVE-2014-8505
Etiko CMS is a content management system.
The Etiko CMS does not validate the index. A cross-site
IOS security vulnerabilities allow attackers to replace installed Legal applications with malicious applications
Security company FireEye warned on its official blog that a security vulnerability on iOS devices allows attackers to replace installed
Apache Derby security function Bypass Vulnerability and Denial of Service Vulnerability
Released on: 2014-09-04Updated on: 2014-09-05
Affected Systems:Apache Group Derby Description:------------------------------------------------------------------
VLC Media Player "get_chunk_header ()" dual-release Vulnerability
Release date: 2011-12-21Updated on: 2011-12-22
Affected Systems:VideoLAN VLC Media Player 1.xDescription:-----------------------------------------------------------------------------
Use ICMP tunneling technology for ICMP encapsulation and penetration Firewall
0x00 icmp Tunneling Technology
ICMP tunneling technology, also known as Ping tunneling technology, we know that the ping protocol is icmp. When the firewall receives a
How to lock the door to "Cloud" Storage
Recently, Hollywood experienced the most serious "****" storm in the history of the entertainment industry. The 101 Hollywood actresses, including Oscar-winning Jennifer Lawrence, well-known singers bud Haina,
Cracking username and password for LAN ControlMany people share a piece of broadband, and they are most afraid of it. For example, during the peak hours at, when others are dying, they are driving BT download by themselves, for example, if some ARP
Four Common evasion techniques for malware
Malware escaping technology is always evolving. At the RSA Conference last month, the co-founder of Lastline told a picture of evading technology development. This report titled "exposure and deconstruct of
Inventory: Four application scenarios of full disk encryption technology
In this article, expert Karen Scarfone focuses on the advantages of FDE and its application scenarios to help enterprises determine whether this storage encryption technology
Xml file security Parsing
XML eXtensible Markup Language, designed for data transmission and storage. Its diverse forms
1. Document Format (OOXML, ODF, PDF, RSS, docx ...)
2. Image Format (SVG, EXIF Headers ,...)
3. configuration file (custom name,
How to perform penetration testing on mobile devices?
BYOD and mobile devices pose significant challenges to enterprise security. Some enterprise IT cannot effectively control the mobile devices that store company data, applications, and
How can we better implement Web application penetration testing?
The more enterprises rely on network communication and cloud-based data systems, the more likely they are to be attacked and damaged by external attackers. When considering the data
A person's martial arts: analysis of the general idea of penetration testing (1)
Preface
Penetration Testing is both a technology and an art.
This technology (ART) was not made by everyone at the beginning. It is said that no one will walk at birth,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.