Two sides of personal anti-virus software

"Boss, do you want a network administrator ?""What skills do you have ?""I can discover vulnerabilities on your website and ensure that you will not be attacked .""......"Five years ago, this seemingly ordinary conversation may have appeared in the

Analyze the working process and key links of the Linux virus prototype

I. IntroductionThe purpose of this article is to summarize a Linux virus prototype Code recently written, and give a brief introduction to friends interested in this aspect. To read this article, you need to have some knowledge about ELF, read some

How Should common users use firewall software?

As hackers flood, firewall software emerged to prevent malicious attacks. However, we should be able to correctly use the firewall software to truly serve us.Firewalls all define security levels. In order to provide different security control

September 13 virus and Trojan Broadcast

Jiang Min's September 13 virus broadcast: the "little" disguised as a playback software Icon to download malicious programs at will Jiang min reminds you today that Trojan/ASP. WebShell. c "Web thieves" Variants c and TrojanDo Wnloader. Small. mdz

The latest version of the MSN virus has been infected and the computer can be remotely controlled.

This week, the majority of users should pay special attention to the "MSN photo Worm variant D (Worm. Win32.MSNPhoto. d)" virus. According to analysis by rising's anti-virus experts, it is a trojan virus that can run on WIN9X/NT/2000/XP systems.

Experts interpret whether Security 2.0 is also a concept hype

For the IT industry, this is an age of concepts. In such an environment, if security technology, products, and solutions are relatively mature, will it be a conceptual hype to advocate Security 2.0? Guo xunping, Symantec's director of business

Classification and prevention of Linux viruses

Linux users may have heard of or even encountered some Linux viruses. The principles and symptoms of these Linux viruses are different, so the preventive methods are different. To better prevent Linux viruses, we first classify known Linux

Openswan XAUTH remote overflow and Command Injection Vulnerabilities

cve

Release date:Updated on: 2010-09-30 Affected Systems:Openswan 2.6.xUnaffected system:Openswan 2.6.29Description:--------------------------------------------------------------------------------Bugtraq id: 43588Cve id: CVE-2010-3302,

Multiple security vulnerabilities in Google Chrome versions earlier than 9.0.597.84

Release date:Updated on: Affected Systems:Google Chrome 8.xUnaffected system:Google Chrome 9.0.597.84Description:--------------------------------------------------------------------------------Bugtraq id: 46144 Google Chrome is a Web browser

IBM Lotus Domino iCalendar meeting Request Parsing Remote Stack Buffer Overflow Vulnerability

Release date:Updated on: Affected Systems:IBM Lotus Domino Description:--------------------------------------------------------------------------------Bugtraq id: 46232 Lotus Domino is an email and cluster platform that integrates email, document

Isc bind 9 RRSIG Query Remote Denial of Service Vulnerability

Release date:Updated on: Affected Systems:RedHat Fedora 15Description:--------------------------------------------------------------------------------Bugtraq id: 47734Cve id: CVE-2011-1907 BIND is the implementation of a widely used DNS protocol,

Google Chrome floating display Memory Corruption Vulnerability

Release date:Updated on: Affected Systems:Google Chrome Unaffected system:Google Chrome 11.0.696.71Description:--------------------------------------------------------------------------------Bugtraq id: 47965Cve id: CVE-2011-1804 Google Chrome is

Kingsoft Antivirus "KisKrnl. sys" Driver Local Privilege Escalation Vulnerability

Release date:Updated on: Affected Systems:Kingsoft Corp Kingsoft Antivirus 2011.7.8.913Description:--------------------------------------------------------------------------------Bugtraq id: 48867 Kingsoft drug overlord is a widely used anti-virus

Remote Denial of Service Vulnerability in Red Hat Linux Kernel VLAN Packet Handling

Release date:Updated on: 2011-08-02 Affected Systems:RedHat Enterprise Virtualization HypervisorRedHat Enterprise Linux 5 serverRedHat Red Hat Enterprise Linux Desktop 5 clientOpenVZ Project OpenVZ 028stab091. 1OpenVZ Project OpenVZ 028stab089.

Multiple Denial of Service Vulnerabilities and unknown details vulnerabilities in IBM Lotus Symphony

Release date:Updated on: Affected Systems:IBM Lotus Symphony 3.0.0 FP 1IBM Lotus Symphony 3.0.0Unaffected system:IBM Lotus Symphony 3.0.0 FP 3Description:--------------------------------------------------------------------------------Bugtraq id: 489

X. Org X11 local permission escalation and Memory leakage Vulnerability

Release date: 2011-10-06Updated on: 2011-10-10 Affected Systems:RedHat Enterprise LinuxX.org X11R6 6.xX.org X11R6 5.1X.org X11R6 4.0X.org X11R7 7.xX.org X11R7 1.1.1X.org X11R7 1.0.2X.org X11R7 1.0.1Description:---------------------------------------

Novell GroupWise Internet Agent HTTP interface Stack Buffer Overflow Vulnerability

Release date:Updated on: Affected Systems:Novell Groupwise 8.02 HP3Description:--------------------------------------------------------------------------------Bugtraq id: 49779Cve id: CVE-2011-0334 Novell GroupWise is a cross-platform

Unauthorized access to HP TCP/IP Services for OpenVMS

Release date: 2011-11-04Updated on: 2011-11-07 Affected Systems:HP TCP/IP Services for OpenVMS Alpha 5.7HP TCP/IP Services for OpenVMS Alpha 5.6HP TCP/IP Services for OpenVMS 5.7HP TCP/IP Services for OpenVMS 5.6Description:-------------------------

Novell GroupWise Messenger "NM_A_PARM1" tag Heap Memory Corruption Vulnerability

Release date:Updated on: Affected Systems:Novell GroupWise Messenger 2.0.3 HP1Novell GroupWise Messenger 2.0.3Novell GroupWise Messenger 2.0Description:--------------------------------------------------------------------------------Bugtraq id: 52056

Open Handset Alliance Android Browser Remote Code Execution Vulnerability

Release date:Updated on: Affected Systems:Open Handset Alliance Android 2.2Description:--------------------------------------------------------------------------------Bugtraq id: 52177 Android is a project launched by Google through Open Handset

Total Pages: 1330 1 .... 327 328 329 330 331 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.