Personal Operating System Service Security Configuration

Source: Firefox Technology Forum Author: lvhuanaFirefox has been around for a long time. Due to its own food, you cannot publish some original vulnerabilities (learn as much as possible in the future .........), I can only publish some articles

Use NetShare to clear default sharing risks

Users who use Windows 2000/XP may encounter a problem, that is, the default Management Sharing. Although the user has not set share, each drive letter is automatically shared by Windows. The share name is followed by a symbol $. In general, in

Experts recruited three high-risk users for computer security during the New Year's Day holiday

New Year's Day holiday is approaching. long holidays are often the peak periods when people use computers and access the internet. During this period, computer viruses are high. Rising anti-virus expert Cai Jun warned that the three most vulnerable

Some applications related to arp.exe

Arp.exe is a program for managing the underlying physical addresses of NICs. Each Nic has a unique physical address in the world.When accessing the internet, the dynamic IP address is shot according to this physical address.There are two network

Integrated gateways gradually become mainstream

IDC pointed out in a new report that the integrated security gateway will replace the low-end and Middle-end firewall products with a single function and become the mainstream in the industry. & NbsP; the current network environment is facing more

Detects and prevents system attacks in Linux

Source: CCID 1. When a Linux system is installed on a PC, you have a powerful, advanced, and multitasking network operating system. However, the system is somewhat more powerful. Some released versions start many services by default (such as rlogind,

Use DESKTOP. INI and folder. htt to automatically run the program

Source: http://grayhat.512j.com/ Set the desktop in the c: winnt directory. ini and folder. htt (Note: desktop in different directories. ini and folder. htt files are different, so it must be in the winnt directory .) Copy the file and use NotePad

How to determine whether traffic attacks have been detected

Q: My online check software warned me that I found a DDoS attack. What does this mean? The machine is a LAN. Is it related to this? How should I determine whether I have been attacked by traffic? A: DDoS is short for Distributed Denial of Service,

Lan telnet!

When telnetis not enabled, mmc.exe must be used to add computer management and remote enabling. Operation: "run" input mmc.exe --> console --> "Add/delete Management Unit" --> Add --> Computer Management --> another computer --> browse, of course,

Microsoft Excel Heap Buffer Overflow Vulnerability (MS11-021) and repair solution

Affected Versions:Microsoft ExcelMicrosoft Office Vulnerability description: Microsoft Excel is a trial table software written and run by Microsoft for Windows and Apple Macintosh operating systems. Microsoft Excel has a heap buffer overflow

Arp spoofing-breaking through ipsec

In the past few days, all the servers that run into it use windows security policies. For example, 3389 and 1433 can only access specific ip addresses. Even if the machine in the same network segment is completed, it cannot connect or scan some

Linux penetration and Security Section 1-vi

Author: JulietFrom: XI ke Information Technology hacker operation camp: {Silic Group }:::Site: http://blackbap.org In fact, I am not very familiar with Linux penetration, and almost all the things I will learn from Tom, although I have learned a lot.

Brute-force penetration technology based on "password retrieval"

BlAck. Eagle [B. H.S. T] We are familiar with brute-force cracking techniques, but I have found brute-force cracking based on "Password Reset ".There are not many technologies, so I will introduce them in this article and describe the technologies

Anti-DDOS settings in Linux

Modify sysctl Parameters$ Sudo sysctl-a | grep ipv4 | grep syn The output is similar to the following: Net. ipv4.tcp _ max_syn_backlog = 1024Net. ipv4.tcp _ syncookies = 0Net. ipv4.tcp _ synack_retries = 5Net. ipv4.tcp _ syn_retries = 5   Net.

Privilege Escalation for Windows and Linux Local Users

Both Windows and Linux systems are based on permission control, and their strict User Levels and permissions guarantee system security. Is such strict User Permissions insurmountable? Next, I will test the Elevation of Privilege in Windows and Linux.

Disable the specified doscommand

Disable the specified doscommandThe basic principle of this method is to restrict dangerous DOS commands to prevent unauthorized use of these commands to destroy hard disk data. The specific method is as follows:Use NotePad to open the Autoexec file

Use PAM to enhance Linux Server Security

    Server System Security is indeed a headache for most users: how to ensure that the users who use applications or services in the system are indeed users themselves? How do I specify a time period for these users to restrict access to the service?

Linux Server Security: How to Prevent SSH attacks

  When your Linux server is exposed to the Internet, it will be sniffed by scanning software on the Internet and tried to guess the SSH Login Password. You will find that there are multiple SSH logon Failure records every day. Scan tools pose a

Five application tips: How do new users maintain server security?

  Whether it is an increasing number of viruses, malicious hackers, or business theft, servers are the main attack targets for obtaining information. Obviously, server security issues cannot be ignored.   Nowadays, protection of important data is

Use fail2ban to prevent brute-force cracking of FTP/SSH and Other Services

  Introduction Recently, my blog has been brute force cracking FTP passwords by others. Although it fails, the system load is high because the system constantly authenticates users during brute-force cracking, resulting in slow access to blogs. I

Total Pages: 1330 1 .... 1246 1247 1248 1249 1250 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.