How to prevent others from using ipc $ NULL connections and default shared intrusion

Null connection and ipc $ (internet process connection) are different concepts. An empty connection is a session established with the server without trust. In other words, it is an anonymous access to the server. Ipc $ is a named pipe open for inter-

Fully sniper against RM malicious pop-up window

Author: GarfieldAt present, the most popular media format is RM. Although RM is not clear in quality, it is very small in size and only a fraction of normal media, so it is favored by everyone. But sometimes, when you watch the RM file, and every

OllyDbg shortcut command

Author: anonymous author: win the worldThe following command applies to the quick command bar plug-in of OllyDbg (displayed above the program's status bar)Collect wind and rain (Clone)20030210==========================================================

Use the DOS command to crack the remote NT Password

If you know an NT account and password, you can useNet use \ host ipc $ "password"/user: "user"Establish a connection with a remote host. This is a method that every hacker or friend who wants to become or is trying to become a hacker knows. I even

Protect your network

Source: Anhui Hotline What effective measures should hackers take to prevent intrusions? As the saying goes: It's not too late to make up for it. Human society is always moving forward in the constant struggle of evil forces. There is always a way

Implement effective security log analysis and make full use of security logs

Source: E-generation time This is the first part of a series of lectures on security log analysis. The first part below discusses the importance of log monitoring and analysis. The second part will help you understand the log data and use the data

ASP + ACCESS prevention

Hello everyone. Today's course: ASP + ACCESS prevention Author: David Source: China Network Security Association-http://chinansa.com -----------------------------------------------Today, I am bored. I found ASP security in Baidu, But I found N

Create your own honeypot to capture intruders

Author: Virgo [E.S. T] (Shuang Feng [E.S. T])Source: evil baboons Information Security Team (www.eviloctal.com) An old article, but I think it is a relatively successful one. Published in hacker online 3rdFull Version (with diagram):

Four universal tricks for Windows to deal with bundled Trojans

[Introduction]Nowadays, Trojans are increasingly tricky. They often use file bundling methods to bundle Trojans into common files such as images and plain text, then, these files are sent to the victims through QQ, Email, or MSN. Once these files

Virtual Host Security Configuration and Optimization

Recently, as a system administrator in a network company, we will perform security configuration and Optimization for Win2000 Servers Based on our own experience and environment. The following are the operating systems and server software of my

Do not fall into dangerous file traps

Suitable for readers: Intrusion lovers and common netizensPrerequisites: None Do not fall into dangerous file traps Text/figure Peng Wenbo Even without warning, we opened a batch of readme.txt files or a. bat batch file. Can you ensure that these

Attackers can bypass addslashes and preg_replace functions under magic_quotes_gpc = off.

    According to some documents published by PHP6 (currently mainstream PHP5 and PHP4), register_globals, magic_quotes_gpc, and safe_mode will no longer exist. Official practices such as this will take into account PHP portability issues. With the

Improve your skills with the help of hacker

  As enterprises use e-commerce, security is no longer a trivial matter, and it has begun to become an important issue. However, most computer users do not know much about security. Most books devoted to computer security only involve some basic

I'm not sure what to do with port 3389

  Unknown remote login Port It's too confusing to execute netstat-. What should we do? Read the registry and set HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Terminal Server \ Wds \ rdpwd \ Tds \ tcp PortNumber. The PHPshell does

Android security-intent

1. Introduction to intentIn the android environment, intent is mainly used for information transmission. If intent uses the implicit method (setaction) to identify the intent message, the receiver uses this action to receive information.If intent

SQL Server Encryption

Brief Introduction encryption refers to the process of fuzzy processing of data by using a key or password. In SQL Server, encryption cannot replace other security settings, such as preventing unauthorized users from accessing the database, the

One O & M, a Linux Trojan

In the last month, multiple servers in the data center were infected with Trojans, and customer websites were attacked by DDOS attacks. The company's O & M services were all in an exciting state, even my projects were stopped by the Department boss

Windows Password local cracking common method

Windows Password local cracking common method in fact, this method is known to many people, but the latest win7 64 attack has been tried recently and still found to be valid. Please share your thoughts with friends who do not know about it. narrator.

Nginx vulnerability exposed by foreigners

Last night, the black pot posted a foreigner-exposed Nginx vulnerability on Weibo, and few people started to pay attention to it. I tested and verified the installation environment, I tried two websites on the Internet and verified the vulnerability,

10 Security omissions that can be easily solved

No matter how much effort we make, end users, or even the enterprise's IT department, will still ignore the security omissions that are easily corrected. This article will discuss with you 10 Security omissions that can be avoided and tell you how

Total Pages: 1330 1 .... 1251 1252 1253 1254 1255 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.