Preface
This article analyzes the linux IP assembly algorithm. Because IP fragments are often used for DOS attacks, I will further describe them in combination with some attack methods. The kernel version is 2.2.16, and some changes in 2.4.0-test3
1. Download broken:A. put some download tools such as thunder and flashget on the QQ network hard drive. One problem is that QQ hard drive cannot be opened in the internet cafe (no hard drive plug-in is available ), at this time, we can switch to
Almost all enterprises have paid more attention to network security. They have successively purchased firewalls and other devices to block security factors from the Internet. However, Intranet attacks and intrusions are still rampant. Facts have
Nowadays, Trojans are increasingly tricky. They often use file bundling methods to bundle Trojans into common files such as images and plain text, then, these files are sent to the victims through QQ, Email, or MSN. Once these files are opened
Nowadays, many home users access the Internet through ADSL or similar broadband provided by other companies. Because of the low cost of broadband, it is a waste of resources for most home users who do not have a large amount of data to download. So
File encryption:
If the system encryption is compared to "locking the door", if the "door lock" is opened by a "thief", everything in our computer will be readily available. However, if we lock the "valuable" items in the computer one by one, it
The login mode of QQ Versions later than 2004 can be selected by the user, while the normal mode is suitable for choosing at home or personal office dedicated computers; the office mode focuses on office environment communication; when you exit in
1. Use win2000 security configuration tools to configure policies
Microsoft provides a set of security configuration and analysis tools based on MMC (Management Console). With these tools, you can easily configure your servers to meet your
1. Disable DirectDraw
This is the requirement of C2 security standards for video cards and memory. Disabling DirectDraw may affect some programs that require DirectX (such as games, playing Starcraft on servers? I'm dizzy ..$%$^ % ^ &??), However,
The full name of a Trojan is Trojan Horse. First of all, you must know the types of Trojans. A Trojan is a type of virus and serves as a function similar to a spyware. There have been many types of Trojans since their birth, and Trojan horses are
Most of the operating systems used by home computers are Win XP and Win2000 pro. (We recommend that you change the OS using 98, why do you still use a system that Microsoft has abandoned ?) So I will focus on the security protection based on these
Generally, insecure passwords include the following:
Type 1: Use the user name/account as the password.
Although this password is easy to remember, its security is almost 0. Because almost all hacker software that uses password cracking as a means
Currently, most of the operating systems used by home computers are WinXP and Win2000 pro (we recommend that you change the OS with 98 friends, why do you still use a system that Microsoft has abandoned ?) So I will focus on the security protection
Analysis on the bundle of horses -- shelling -- unlocking the scam -- learning his technology
The present era .. A bundle of horses becomes a wind, and everything is a bundle of horses. All kinds of methods have come out .. Even a game needs a
SQL server 2000 has many vulnerabilitiesSome time ago, my own server experienced a temporary SQL stored procedure vulnerability.Vulnerability Extension: xp_dirtree Stored Procedure
Beforehand: A recent vulnerability was discovered on the SQL
C: WINDOWSsystem32> net user
\ FUCK User Account
-------------------------------------------------------------------------------Admin Administrator GuestSUPPORT_388945a0The command is successfully completed.
C: WINDOWSsystem32> net1 user
\ FUCK User
1. How to Run asp scripts with the system permission?
Modify the virtual directory corresponding to your asp script and change "application protection" to "low "....
2. How to Prevent asp Trojans?
Asp Trojan Based on FileSystemObject
1. Computer prohibited
Symptom Description: although the network hooligans do not use this trick much, once you make a move, the consequences are really unimaginable! The consequence of browsing a webpage containing such malicious code is: "Shut
For example, I used 3389 to remotely log on to your machine. What method do you usually use to query me? What should you do if I change GUEST to manage permissions? And I will clear the logs ..
"Reply: I intrude into you! How did you find me? "
1.
Serv-U is now the mainstream FTP Server. like Windows, because many users are used, many people are studying and trying to crack it. As a result, many more vulnerabilities are discovered than the G6 FTP Server. I often hear that Serv-U on someone's
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.