SYNPROXY: a cheap anti-DoS Solution

DoS attacks are an eternal problem. Although professional firewall and Server Load balancer gateway devices can effectively defend against DoS attacks, however, hackers prefer the combination of x86 + GNU/Linux for the simple reason: cheap enough.  

Cisco Router password reset tutorial

1. The parameters of the terminal configuration software (such as super terminal or secureCRT) are as follows: Speed: 9600bps Check bit: None Data bit: 8 Stop bit: 1 Traffic control: None 2. Restart the vro. Press Ctrl + Fn + Break during the

GlobalSign teaches you how to deploy SSL certificates more securely

Many people often tell me that SSL deployment is becoming easier and easier now, in most cases, you can deploy an SSL certificate on various servers by using a search engine or by reading blogs written by some technical staff. Although SSL and HTTPS

Use GPU to crack wpa/wpa2

Test environment:Win7 SP1 X64/Nvidia 630 MAfter grasping the handbag under Kali, you can crack it in Windows.I used aircrack-ng to crack it, which is about key/s.So I just want to try GPU cracking.1. Convert the cap package to the hccap package of

Batch Modify remote CentOS server passwords

The company now has more than 100 servers. You need to modify the root password in batches for the servers, and create a user for each server. If you modify the root password for each server, it is estimated that I will not be able to do it again in

Implementation of key-based security verification in Centos

Tutorial Background:Xiaonuo has used Linux to build various servers (FTP, DNS, Apache, Sendmail, and Samba), because these servers are placed in a safe place, generally, no one is allowed to access these servers. The company now needs to securely

Hide php, nginx, and apache versions and disguise nginx and apache

Prevent them from cracking, let them disguise themselves, and let them think about it slowly! 1. Hide the php version number Hiding method: Add the following code to vimphp. ini: expose_php = Off 2. Hide the nginx version number Hiding method:

Juniper Platform Construction

When I first learned about Juniper, I really didn't understand anything. I didn't mean that I didn't understand TCP/IP, but simply couldn't configure the Juniper Router. The reasons for this are mainly from two aspects: the simulator was too long to

Configuration Analysis of IOS zone-pair Firewall

The zone-pair firewall divides the interface of the ios router into several regions, and the traffic between different regions cannot communicate. This is similar to the interface type of ASA! Pay attention to the following points: 1. confirm that

Detailed analysis of webshe backdoor EXIF hiding

Demonstration with foreign r57 Series First look at the webshell source code Pay attention to base64 encoding. After decoding, execute php to generate Upload File page, Secure software scanning tools typically Scan System Searches Find webshell

Decompilation of Android APK files

During this time, I was learning about Android Application Development. I was thinking that since it was developed in Java, it should be a good decompilation to get the source code. google is actually very simple. The following is my practical

Password forgotten customs clearance manual helps you reduce unnecessary troubles

Crack the CMOS boot password To use a computer, you must first start the system. Therefore, the boot password is the first one we need to meet. Although there are different types of CMOS, their encryption methods are basically the same. Generally,

Interpreting the misunderstanding of data leakage Protection Technology

The expert group at the RSA meeting pointed out that the deployment of data leakage protection technology has been suspended for many enterprises due to misleading information and incorrect publicity on data leakage protection, they missed the

WordPress cookie Forgery Vulnerability detailed analysis and exp

0 × 00 PrefaceThis article analyzes the cookie Forgery Vulnerability (CVE-2014-0166) fixed by wordpress3.8.2 and provides the corresponding exp.According to the description, WordPress before 3.7.2 and 3.8.x before 3.8.2 are all affected,Install

Low level discovery monitoring redis for zabbix enterprise applications

I have introduced redis using zabbix to monitor fixed port 6379 (article address is http://dl528888.blog.51cto.com/2382721/1361407), there is a bad place that only monitoring fixed port 6379, if it is not port 6379, you need to modify the template.

Web security-SQL Injection

I. SQL Injection SQL injection is a code injection technology that exploits security vulnerabilities at the application database layer. It is usually prone to some scenarios. For example, escape characters embedded in SQL statements are not properly

You can log on to any account for the ESPCMS design defect.

Some design defects (weak verification) in Yisi ESPCMS can be logged on to any user account. Yisi ESPCMS cookie has design defects. I will check the ecisp_home_seccode ecisp_member_username ecisp_member_info parameter in the cookie. Function

Attackers can use SVG to bypass browser XSS auditing.

[Translated From]: http://insert-script.blogspot.com/2014/02/svg-fun-time-firefox-svg-vector.html================================== SVG- element ================ the element in SVG is used to reuse other elements, it is mainly used to connect and

Methods for Elevation of Privilege for dongle

When the permission is administrator, you can directly go to remote control and successfully execute the exe malicious file remote control.Some administrators think that installing a Dongle is safe, but with a keyboard record, this is not like what

Reflection xss exploitation method, bypassing IE xss filter

Reflection xss usage method, bypass ie xss Filter Suppose 1. php Page code: echo $ _ GET ['str']; use IE browser to access this page 1.php? Str = xss fails due to XSS filter rendering. What should we do next? If the site can post, link, and so on,

Total Pages: 1330 1 .... 210 211 212 213 214 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.