As we all know, Mysql users cannot read files through Load_file or write files through into dumpfile or into outfile without the File Permission, but occasionally find a small trick on a website, that is, you can use load data infile to read local
The number of internal and external visitors of an enterprise is constantly changing, which increases the security threats it faces, and the boundaries of internal and external access are gradually blurred. If an organization adds insecure systems
At work, you sometimes need to compare whether the files are consistent. You can use the following script (relatively simple): share it and hope to help friends who have the same requirements ~#! /Bin/bash# Compare to whether files on the server are
It runs continuously through the background, and restarts if any problem is detected. There are few script codes, the statements are very simple, and the consumption of system resources is very low. You can try it.It seems stupid, but it is
Recently, I checked the mysql database server log and found the ERROR log with Table damage. For example: 120724 7:30:48 [ERROR]/data/soft/mysql/libexec/mysqld: Table '. /blog/wp_links 'is marked as crashed and last (automatic ?) The repairfailed is
This script has been tested on ubuntu and centos. The script is as follows:
#! /Bin/bashLine = '============'# Linux release nameIf [[-f/usr/bin/lsb_release]; thenOS = $ (/usr/bin/lsb_release-a | grep Description | awk-F: '{print $2}' | sed's/^ [\ t]
Method for creating random numbers
1 ~~~~
/Dev/urandom
In Linux, a device/dev/urandom is used to generate a random number sequence. With this device, we can generate random strings as needed.
For example, if we want to generate a random password
Use shc to encrypt Shell scripts to improve the security of shell script files.Introduction: When the shell script we write contains sensitive information such as the account and password, we want to enhance the security of the script, and do not
1. wordpress permissions have a great impact on the installation and use of theme: Permission errors will affect theme installation: theme cannot be installed, theme can be modified, or theme can be deleted.
Related settings:
Chmod4 755
The web server avoids unnecessary troubles and does not display apache and php version information.
Hide Apache version information
/Etc/apache2/apache2.conf or/etc/httpd/conf/httpd. conf
ServerTokens ProductOnlyServerSignature Off
Restart apacheNow,
Preface:
Server operation suggestions
1. Operate servers in strict accordance with directory specifications
2. remote servers cannot be shut down
3. Do not run high-load commands during server access peaks
4. Do not force yourself out of the server
First, this is the php backdoor, Which is unquestionable.
As follows:
This is the case.
First, understand the linux grep command
Linux grep command
1. Role
In Linux, The grep command is a powerful text search tool that uses regular expressions to
Can you introduce the problems found in the RC4 encryption algorithm recently? In this regard, what security risks do HTTPS network connections face? How should enterprises ensure that they are not attacked by this vulnerability?
Michael Cobb: RC4
It can be said that SSL encryption has always been controversial in network security.
Privacy advocates believe that the inspection of SSL encrypted data packets, such as Web mail, infringes the trust of end users in several major aspects. On the
A major advantage of Linux is that you can implement the same thing in hundreds of ways. For example, you can generate a random password in dozens of ways. This article describes ten methods to generate a random password.
These methods are
0x00 background
Many websites now allow users to upload files, but they are not aware of the trap of allowing users (or attackers) to upload files (or even legitimate files.
What is a legal file?
Generally, determining whether a File is legal
I. background
We are familiar with the same-source browser policy. Client scripts in different domains cannot read and write resources of the other party. However, there are some scenarios in practice that require cross-origin read/write, so there
As a hard-lived civilian Commissioner who wrote various reports every day before graduation, I will record my work notes here to get rid of the boring days. I will sort out the fun activities I have encountered every day and share them with you.
1.
1. Introduction
If the HttpOnly flag is set for the cookie, you can avoid JavaScript reading the cookie when XSS occurs. This is also the reason why HttpOnly is introduced. But can this method defend against attackers? The HttpOnly flag prevents
0 × 01 ASP introduction:
ASP is a server-side scripting environment that can be used to create and run dynamic Web pages or Web applications. ASP Web pages can contain HTML tags, common text, script commands, and COM components. Using ASP, you can
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.