Personal pc privacy protection and security skills

Everyone has some secrets on their computers that they don't want to know. It is certainly a good way to use passwords to protect them. However, some encryption operations are complicated. If you just want to encrypt Word documents in a simple way,

Advanced ARP attack prevention

Some time ago, xiaonuo technology gave a brief introduction to the "ARP virus prevention solution", which attracted the attention and praise of many users and the industry. Recently, technical engineers of xiaonuo technology have gained new

Port · Trojan · Security · scan application knowledge

It may be a bit strange to see this question. How can we put these words together? In fact, we have been talking about ports and Trojans, however, even if there are still many people whose computers have been overwhelmed by shock waves, they have

Disable Scripting Host to prevent black web page users

There are more and more attacks from the network. Some malicious webpages may exploit security vulnerabilities such as software or system operating platforms, supports automatically executed code programs by executing Java Applet applications,

Scripts against external data submission

When submitting a Script, someone may modify the Script to be submitted from the local machine. In this case, there is a problem of secure submission. Therefore, the Script should be submitted from the server disconnected path. Other addresses

CRLF Injection Attack principles and Prevention Measures

CRLF Injection attacks are not as famous as other types of attacks. However, when a CRLF Injection Attack is performed on an application with security vulnerabilities, this attack is equally effective for attackers and can cause great damage to

Icesword concise tutorial

IceSword, also known as an ice knife or blade, IS a powerful tool for system diagnosis and removal by PJF of USTC. There are countless tools to remove rogue software. Why is it the first? There are the following reasons: 1) Do you often have files

Sharing results: Success in killing pandatv and burning incense 100%

Rising's virus database will be able to kill after January 14, and it will be awesome. However, rising programs will be turned off by pandatv.Measure the test taker's knowledge about the specific anti-virus method (100% successful ). Note! You must

Exeroute Trojan clearing method

The last time I had exeroute on the machine, some people know that this backdoor is not bad, and it is also a little abnormal. A total of 14 files and 2 folders are generated. In the Registry, except for one Run and System. ini, the comparison is

Unlock the maliciously locked Registry

The Registry is locked because many users browse malicious websites. You can use the System Policy Editor (Poledit), another powerful tool provided by Microsoft in the system installation disc ), solve this problem easily. In addition, you can also

Use HttpModule to prevent database Injection

Identify whether SQL injection attack code exists through corresponding keywords String SqlStr = "and | exec | insert | select | delete | update | count | * | chr | mid | master | truncate | char | declare "; In the following code, you should refer

Analysis of the operating principles of Trojan and Backdoor programs

Many new users do not know much about security issues, so they do not know how to clear trojans on their computers. Therefore, the most important thing is to know the working principle of the "Trojan", so that it is easy to find the "Trojan ". The

How to effectively prevent the same account from repeatedly logging on to the system

Maintain an Online table and check whether there is a logon. You are not allowed to log on again. You can use Sessionid as the unique identifier. You can also generate a GUID and send it to the COOKIE to distinguish different clients, and add JS, it

Create a password that is easy to remember and secure

Users often forget their passwords. In order not to forget the password, they just use some simple information to create the password, such as using the dog name, son name and birthday, the name of the current month-or anything that helps them

Handling malicious links

After a stroll on the internet, I found that the homepage of the IE browser was changed to a malicious website, and the default search engine of the browser was changed to the search engine of the malicious website. The "Navigator" was attacked by a

Start anti-Trojan attack

For most of my friends, the most troublesome thing they encounter when surfing the internet is when they encounter rogue software. They will be uploaded without knowing it and cannot be deleted if they want to delete it, although there are a lot of

Research on Web Servers

Hello everyone, I'm Zuo Yi.I have a little research on Web servers! This rule controls user capabilities and uploads data to websites. ### Section-Site Upload Rules # This rule is needed to allow upload to the sites SecFilterSelective

Disable the FileSystemObject component

As we all know, the powerful functionality and destructiveness of the FileSystemObject component are the reasons why it is often disabled by free home page providers (who support ASP. First, use RegSrv32/u C: WINDOWSSYSTEMscrrun. dll (win98 path) to

Linux operating system password security issues

Almost all password files of Unix-like operating systems are in the same format, and Linux is no exception. Password security is one of the traditional security issues in Linux. Traditional passwords and shadow passwords /Etc/passwd is a password

Establish a global security system to prevent DoS Attacks

Although numerous network security experts around the world have been developing solutions to DoS attacks for many years, the effect has not been achieved so far, because DoS attacks exploit the weakness of TCP protocol. DoS attacks use relatively

Total Pages: 1330 1 .... 1228 1229 1230 1231 1232 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.