Server Security Settings (1)

Many people now think that Microsoft has too many things and vulnerabilities, and Microsoft's system security is very poor. However, I have summed up some experience during the security configuration of various systems, we share this with you. In

How to ensure the security of network servers

This article is a summary of my experiences in terms of server network security. It is basic knowledge and suitable for entry-level server administrators, I hope I will not smile in front of technicians with old qualifications. First, we can analyze

How to make open ports more secure

Source: techrepublic.com.com All ports opened on the _ blank "> firewall and vro are a security risk. This is also the value of port knocking. Port collision technology is a technology that allows access to _ blank> Firewall Services with

Anti-DDOS attack practices

Author: ccpp0 System: freebsd First round of attack:Time: around fifteen o'clock P.M. Suddenly found that the company's web server could not be accessed, attempt remote login, unable to connect, call the idc to restart the server. Immediately after

Web script attack Prevention Strategy (I)

Recently, Web SQL Injection attacks, JS scripts, and HTML scripts appear to be more intense. Many websites are plagued by such attacks. They are not immediately repaired as they do with host vulnerabilities. WEB attacks make us very inconvenient to

The eight advantages of VBS scripts in System Security

Source: xiaoxin Technology Network The prevalence of VBS script virus has given us a new understanding of VBS features, and now everyone has begun to pay attention to it. VBS code is locally interpreted and executed through Windows Script Host (WSH.

Transmission Method under CMD ----- convert EXE to BAT Method

Let's talk about the principle first. Convert the EXE file to the BAT file and BAT (if I have read the BAT special series, I should have understood it) Let's open this BAT file in notepad, HOHO, a bunch of source code, OK, copy and copy !! Copy

Software downloads are also remotely controlled.

Software downloading is a common practice for Internet users. Some friends even never go to the market to buy software, even if the Windows system installation files of hundreds of MB are downloaded from the internet and then a dial, we are so

DLL Trojan secrets

I believe that friends who often play Trojans will know the characteristics of some Trojans and have their favorite Trojans. However, many friends still do not know what the "DLL Trojan" has emerged in recent years. What is "DLL Trojan? What is the

Leave a backdoor using the cpl file of the control panel in xp

Author: lcx This is the case when I use restorator to open nusrmgr. cpl. What do you see? Was it surprising that the "User Account" option in the control panel in xp was actually made in html. In fact, the panel of many components of Microsoft is

Transcript of the third Sichuan information security technology competition

This is also the last time I participated in the provincial competition. After all, the future competition opportunities will be reserved for children's shoes in lower grades ~ Bytes -------------------------------------------------------------------

Restore the account password in the OutLook 6 IAF File

Author: LengF Date: 2011-06-26This article describes how to crack the mailbox account and password in the IAF file exported from OutLook 6. The premise is that you have exported the iaf file of account information. Environment: OutLook Express 6Step

Brute force cracking solution based on NTLM plaintext authentication

Example:Brute force cracking solution based on NTLM plaintext authenticationThe cause should be that a tool party authenticates through NTLM via TELNET, and the server responds to the request to crack the server's password.Solution:By disabling NTLM

Top 10 PHP best security practices

 Www.2cto.com is an old article for your reference.PHP is widely used in various Web development scenarios. When the script configuration on the server is incorrect, various problems may occur. Today, most Web servers run in Linux environments (such

Using two cases to get a preliminary understanding of the working mechanism of selinux in Linux

  Using two cases to get a preliminary understanding of the working mechanism of selinux in Linux SELinux is a MAC system provided in Linux kernel 2.6. For the currently available Linux security module, SELinux is the most comprehensive and fully

Capture 64-bit windows HASH

I have seen many discussions on 64-bit Hash crawling in Windows. We all know that Lm Hash is no longer saved in Windows Vista. All well-known Hash capture tools, such as PwDump, Gsecdump, WCE, and Gethash, are invalid. This is not a tool problem,

Archlinux x86-64 3.3.x-3.7.x x86-64 sock_diag_handlers [] Loc

// Archer. c // 2012 sd@fucksheep.org // Works reliably against x86-64 3.3-3.7 arch. /// Tested against: /// Linux XXX 3.3.1-1-ARCH #1 smp preempt Tue Apr 3 06:46:17 UTC 2012 x86_64 GNU/Linux // Linux XXX 3.4.7-1-ARCH #1 smp preempt Sun Jul 29 22:02:

Build a recovery toolkit

Introduction All security guides recommend you shoshould have a security audit toolkit (or forensic toolkit or recovery toolkit ). this toolkit is constituted by a set of static-linked binaries (grep, w, netstat, ls, nc, strace, ps... Etc). The

Include () Local File Inclusion Vulnerability

By RyatHttp://www.wolvez.org2008-2-22Reference:The local file inclusion vulnerability is a common vulnerability in PHP, as shown in the following code: Include (inc/. $ _ GET [a]./global. php ); This is a typical File Inclusion Vulnerability, but to

Anehta -- Boomerang (rollback): how to convert reflected XSS into persistent XSS: on cross-origin cookie acquisition

Author:Thorn AnehtaThere are many creative designs,Boomerang,Return ModuleIs one of them. The role of the rollback module isObtain local cookies across domains. Boomerang ModuleDedicatedFor IEDesigned. You can use the xcookie module for Firefox,

Total Pages: 1330 1 .... 264 265 266 267 268 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.