Ever since the emergence of pandatv, there have been more and more viruses that can damage security software on the Internet, especially on holidays. When a system problem occurs, the first reaction is anti-virus. However, anti-virus software in the
"White and black" is a popular term for DLL hijacking technology. Nowadays, many malicious programs use this hijacking technology to bypass the active defense of security software to load themselves, it is currently a fire-free method. This article
1. Hide Processes On mac osx, the context and context of each process are stored in the proc structure, and the proc structure pointer of all processes is saved in the allproc linked list, the proc structure of the corresponding process can be
In our daily network life, we often encounter such problems, especially when the organization uses some materials to copy excel files from the computers of superiors or colleagues. As a result, a problem occurs when we put them in our own computers,
Author of this series: Zi Ming Source: BKJIA
When it comes to reverse thinking, more people consider that since it is reverse, we should push the reverse or vice versa. In fact, this is not the case. Here we will talk about a more in-depth study of
1. Understand the EBP register
There are many registers in the register, although their functions and use are no different, but in the long-term programming and use, in programmer habits, each register has been given a special meaning by default.
CCProxy 6.2 is a very useful proxy software, but the unregistered version only allows three users to use, so I tried to crack it. Here, cracking is not our ultimate goal. After the program is started, it will be marked on the system tray. We also
Question: [original] Syser Debugger v1.92 CRACKING PROCESSAuthor: xeeTime: 2007-07-29,21: 15Chain: http://bbs.pediy.com/showthread.php? T = 48741
After reading the introduction of this software, I felt quite good. I started to contact v1.6 and tried
Zero customerDream
This shell is very simple. I just need to look for IAT myself. The software is TrashReg, and it's not good. Why can't I understand it ..Peid in-depth shell query to obtain Crypto-Lock v2.02 (Eng)-> Ryan ThianOD loading ..00412DEC>
Text/figure HokkienMany of my friends take it for granted that brute-force cracking is very simple. In fact, it is not that easy to achieve simple and elegant blasting. So today we will discuss how to optimize the brute force cracking.The flag
Random function as keyDirect encryption of Random Functions refers to using the value generated by random functions as part of the key or key to encrypt files. We know that as long as a seed is set for a random function, a new function value can be
SQL injection attacks are designed to attack the system by exploiting vulnerabilities. If user input data is not filtered when SQL statements are dynamically generated, the SQL injection attacks will be successful.For example:Use the following SQL
The cause of the vulnerability is not too much. If you are interested in phpcms/api. php files, you can dig more phpcms holes.
Main utilization process:
Step 1: register a user
Http://www.wooyun.in/index.php? M = member & c = index & a = register &
Although SQL injection is not as common as before, it still exists in some small and medium websites. For example, a URL of the websiteThe simplest way to detect the SQL injection vulnerability is to add a single quotation mark (') after the
Today, I was hard-working in the group, and everyone talked about my sister paper. The group owner said that some of their school's Japanese sister paper came from a Japanese school: Kyoto gay club University http://www.bkjia.com/(alternative site)I
Our server has another intrusion accident. Some customers have inserted a Javascript script at the bottom of their html webpage. As a result, when a visitor opens the webpage, the antivirus software warns the website of malicious code. This is a
The target site is www.2cto.com, an independent server. There are two sites on the server, one main site, one blog, and one bbs. The Blog uses 0 blogs. It is estimated that the attempt to identify the vulnerability is unsuccessful. So start from the
Recently, the company organized a PHP security programming training, which involves some of the content about Mysql's "set names" and mysql_set_charset (mysqli_set_charset): Speaking of, try to use mysqli_set_charset (mysqli: set_charset) instead of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.