Use port scanning tools to ensure Network Security

The port scanning tool is a software used to find open ports on the network host. correct use of the tool can prevent port attacks. Administrators can use it to perform Port Scan tests. Port Scanning on a host means scanning a variety of listening

Analysis on the consequences of insufficient cloud computing security protection

Cloud computing has many benefits, especially cost advantages, which make cloud computing very attractive in the current situation. Cloud computing advantages include: no additional investment is required to access computing resources, reducing data

Explanation of the causes of increasingly serious WEB Application Security Problems

With the increasing popularity of broadband applications, more and more network users transfer their daily affairs to the Internet. For example, you can transfer funds and pay fees through online banking, purchase stocks and funds through the

VoIP Security analysis practices

Author: OrphousV Tianyang ForumThis time I will show the implementation process of several common attack forms.SIPSession Initiation Protocol (ietf rfc 3261) is a widely used VoIP Protocol. SIP is responsible for creating and disabling multimedia

How to check DNS cache poisoning

The other side, the flowers are not open * DNS Server Detection Method:This article focuses on the BIND server. The following experiment targets BIND9 service installed on Solaris10 (Version: 9.2.4 ).The BIND server can detect exceptions in two ways:

Intrusion Detection Based on Wireless Networks

0. Introduction With the development of wireless technology and network technology, wireless networks are becoming a hot spot in the market. However, with the improvement of hacker technology, wireless LAN (WLAN) is under more and more threats.

About the rainbow table

Author: hackest [h.s. T.]Source: hackests blogI. OverviewWhat is a rainbow table?It is a huge set of hash values pre-computed for various possible letter combinations, not necessarily for MD5 algorithms, it can quickly crack various types of

How to become a great developer

Two steps to become a great developerOriginal Author EriC DavisIs an active developer of Redmine.Here I would like to share two steps for me to become a great developer. Being a great developer is a constant process, which I have seen in other great

Gre packet injection attacks and Defense Analysis

The GRE protocol is used to build a channel that passes through the public Internet, so that non-IP traffic based on protocols that cannot publish routes can reach their destination. To attack hosts on the internal network, you need to know the

Exploit Linux Kernel Slub Overflow

Exploit Linux Kernel Slub OverflowBy wzt I. Preface In recent years, the research on kernel exploit has been quite popular. Common kernel Elevation of Privilege vulnerabilities can be divided into several categories:Null Pointer Reference, Kernel

Best security practices for Linux server systems

To maintain an enterprise-level Secure Computing Environment, policies and processes need to be designed to minimize unauthorized access to systems and data. To protect Linux-based computer assets from these threats, like many other security-centric

Build a Subversion server on VPS

Subversion (SVN) is a famous version control software. It is especially suitable for controlling and managing software source code through the Internet in different places. Recently, I plan to work with my colleagues to develop something, so I

Introduction to Remote File Server File encryption

  On the Forum these two days, some netizens asked, "Can you use some simple methods to protect private files/folders on the file server? Because you don't want other users to browse some files in their shared folders! ". To meet this requirement,

Penetration Testing in risk assessment

I have been on a business trip for external projects recently. I have learned a lot in the evaluation project, and I have accumulated some experience. I always want to take some time to sort it out, this is also a summary of my previous work. This

Three major vulnerabilities of openssh in earlier versions, throwing your linux server into the wilderness

I. Vulnerability AnalysisLinux system security reinforcement analysis was recently conducted to scan and analyze vulnerabilities.OPENSSH has three major security vulnerabilities:1: OpenSSH GSSAPI handles Remote Code Execution

Malware Hidden Inside jpg exif Headers

A few days ago, Peter Gramantik from our research team found a very interesting backdoor on a compromised site. this backdoor didn't rely on the normal patterns to hide its content (like base64/gzip encoding), but stored its data in the EXIF headers

Ajax hacking (Monyer)

Author: the light of dreams After I published the "Ajax hacking" in the tenth issue, the following questions about XSS are raised by some netizens. Why is XSS used in Ajax hacking? What is the difference between XSS and traditional XSS? What are

Analysis on the exploitation of cross-site scripting attacks

tld

With the popularization of network applications, cross-site scripting attacks are often released on some security sites. Here I will sort out some ideas on cross-site scripting (XSS). For more information about the errors, see. What is XSS )? The so-

The file extension of moz-binding: url in FF3 is not restricted, leading to the XSS vulnerability.

Emptiness Abstract: In html ">/Article/200906/39552 .htmlSee, FF3 pair Style>BODY {-Moz-binding: url("Http://www.80vul.coom/test.xml#xss")} The domain in the url is restricted. If some web application functions are used together, you can bypass

Analysis of SQL injection vulnerability in Online Shopping System of Wangqu

Author: cnryan @ http://hi.baidu.com/cnryan Wangqu Online Shopping System is a simple, powerful, and most widely used online shopping shop platform. with years of Online Shopping System R & D experience, the Online Shopping System of Wangqu has

Total Pages: 1330 1 .... 161 162 163 164 165 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.