Deny hackers from spying on IPC. $ uncover the Vulnerability

I often hear people talk about the IPC vulnerability on the Internet. What is the IPC vulnerability? How do network hooligans exploit this vulnerability? With such a problem, let's take a look at the author's wonderful articles! What is an IPC

How to identify true and false Microsoft Security emails

Generally, if Microsoft publishes a security notice, it will notify the subscriber of the reminder service by email. However, it has been found that many malicious people use spoofed methods to forge Microsoft's Security Bulletin emails. Some emails

Port collision technology makes open ports more secure

All ports opened on firewalls and routers are a security risk. This is also the value of port knocking. Port collision technology is a technology that allows access to firewall services with pre-configured "Collision. The so-called collision is

How to determine whether your users are actually attacked by hackers

If you implement end-user support in an organization, you will probably be familiar with saying "I think I am hacked!" when your computer cannot be started or a problem occurs !". Some of these situations are true and need immediate response, but

Architecture-safe Solaris System

Source: hacker Base The rapid development of the Internet brings great convenience to people, but the network security problem is becoming increasingly serious. Although the Solaris system is widely used, it cannot avoid security issues. The

Burning Trojans thoroughly teaches you how to prevent Trojans

"I think we should burn this thing ." More than 3000 years ago, in the face of the huge Trojan horse suddenly left by the Greek on the ruins of the battlefield, the little prince of the kingdom of the Trojan said to his father. Because of his

VMware Tools Command Injection Vulnerability

VMware is a virtual PC software that allows two or more Windows, DOS, and LINUX systems to run simultaneously on one machine. VMware Tools is a set of utilities provided by WMware. It can improve the performance of virtual machine operating systems

Ie 0day exp-Windows WordPad HTML Help File Remote Execution Vulnerability

The chm help file can be called through ActiveX controls for information exchange. When we load the Help File abnormally, this vulnerability may occur.Let's take a look at the simplest, safest, and most widely used Microsoft built-in program Notepad.

Penetration in the domain environment

Intranet penetration, especially in a relatively large network environment, is likely to encounter a special network environment such as domain, intranet penetration in the domain environment will be another day.First, let's take a brief look at the

Security Detection and reinforcement policies based on the Solaris Xeon 5.8/5.9 System [II]

Translator: Ghost [S.S. T] Install important data packets! Dsniff SMCdsniffDsniff is a tool set for network detection and penetration testing, such as dsniff, filesnscarf, mailsnscarf, msgsnscarf, urlsnscarf, and webspy (passively monitoring the

Security Configuration for Linux System Security

As a system administrator, it is very important to perform a comprehensive security check on the system on a regular basis. Recently, some friends wrote that some inexplicable problems have occurred, for example, the biggest problem is that the

Chrome & amp; ie xss filter bypass first wave 0day

  A few days ago, knownsec sogili found that the ie xss filter is an interesting bypass, which is also caused by a difference. This is a problem with the server language. In addition to this, ie also has a feature that determines whether the origin

Risks arising from the development environment of Android Application Security

By SuperHei_at_www.80vul.com I. Preface in the document "penetration test under WEB2.0" last year, we mentioned that in the 2.0 era, the attack methods of attackers are changed to the target identity of the attack. For developers, security issues in

Manually add custom suffix ing in iis/6.0/iis6. In addition to aspx, add extension ing.

The default Suffix of asp.net is. aspx. However, we can see that the suffix of many websites is very special, such as Microsoft. mspx. The following describes how to change the webpage suffix to mspx.Methods in ASP. NET 1.1:1. IIS ing (IIS-> default

Use yum plugins to create linux Backdoors

The redhat series linux users must have used yum to upgrade the system kernel and install software. It is impossible for each system administrator to manually install each package and handle complicated package dependencies, therefore, once a

IE9 Self-XSS black box protection function Bypass

It's boring to get bored... turn a post and think it's fun.-_-English is not very good. translation is not very good. Don't blame me... you can understand it. The source is

Ten ways to improve the security of Windows OS servers

Security is more important than anything else. Your company must have run important functions or saved important confidential files on Windows servers. How can we ensure their security? So don't put the data in a relaxed state of security measures.

TUNet DoS Vulnerability

Size_t _ thiscall sub_4015C0 (void * this, int a2, char a3, int a4) {void * v4; // esi @ 1 SOCKET v5; // ebx @ 2 const char * v6; // eax @ 4 unsigned _ int32 v7; // eax @ 4 u_short v8; // dx @ 4 size_t v9; // ebp @ 6 char * v11; // eax @ 9 char * v12

Caution: Fraudulent Websites steal sensitive user information

At four o'clock P.M. on June 23, October 12, a survey report released by a security lab showed that the number of fraudulent websites that defraud users to provide daily security data, credit card information, and other confidential information is

[Defense notes] SQL Server injection overview and defense

SQL Server is a widely used database for Small and Medium-sized websites. Due to its powerful functions, it also breeds many security problems. SQL injection attacks have become popular in China for a long time, as a result, SQL Server intrusion

Total Pages: 1330 1 .... 309 310 311 312 313 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.