8. Hide your computer on the network neighborNet config server/hidden: yesNet config server/hidden: no is enabled
9. Several net commandsA. The net view of the current workgroup server list is displayed. When you use this command without the
From: http://blog.csdn.net/godttj/
A few days ago, when I was in the company, I ran to a meeting without locking the computer keyboard. When I came back, I saw that people in the IT department sat down with me and changed my administrator account
Build an E-mail line of defenseIn the security defense of E-mail, we can also use the strategy of "false ignorance, we have built a security line for E-mail from the system, anti-virus, anti-Black, and other aspects ...... Analysis on security
Extract attack fingerprints from NT web server logs
(QQ: 550669) the addition of technology will never pass the black site .)When you browse a famous foreign hacker website, you will find that the steps have become the focus of debate by
With the improvement of people's security awareness, the survival of Trojans has become increasingly a problem. Of course, Trojan growers are unwilling to detect trojans. Therefore, they have come up with many ways to disguise and hide their own
Author: Kevin Beaver Source: TechTarget
If you conduct information security assessment-penetration test, vulnerability assessment, or a wider range of hacker attack simulation testing-there is a test tool that is essential to you.
Google is one of
Q: What do I mean when I see Phishing?
A: Phishing is Phishing. "Phishing" is pronounced the same as "Fishing" and is a common online fraud. Generally, you can use an email to lure users to a disguised website to obtain users' personal data, such
If there are Trojans and unauthorized remote control software in the computer, other people will not only be able to get all your privacy information and account passwords, but also take control of the computer at any time, this article describes
ARP Overview
ARP is the abbreviation of Address Resolution Protocol. In the LAN, the actual transmission is frame, and the frame contains the MAC address of the target host. In Ethernet, to directly communicate with another host, you must know
1. select an appropriate installation.
Only install the required software package.This example is solaris9.
2. Install System Patches
Download the patch from sunsolve.sun.comUnzip 9_Recommended.zipCd 9_Recommended./Install_cluster
3. Minimize
After the TCP/IP parameters of the workstations in the LAN are modified at will, it is easy to cause IP address conflicts, which will bring great trouble to the management work. Is there any way to protect your network from unauthorized IP address
Currently, information security companies and researchers around the world are trying every means to discover the latest security vulnerabilities of IE, developers of Firefox browser are quietly adding new features and new security to their products-
Windows 2000/XP/Server 2003 users must have heard of or been in contact with EFS. However, due to its complexity, data may be lost if it is difficult to do so. Therefore, many people do not use it. In fact, EFS is not as difficult as we think. The
1. LILO Security Settings
Vi/etc/lilo. conf. anaconda // modify the LILO file ==================================== ==================
......
Restricted // join this line
Password = 111111 // Add this line and set the password to 111111
......
===
When using ssh to log on to a remote host (suse linux), the following problems occur:
Ssh_exchange_identification: Connection closed by remote host,
This problem is caused by SSH security restrictions. Although it is a good solution, it is
Microsoft's. NET component has a severe overflow vulnerability. Any operating system installed with the. NET component will be affected by this vulnerability. That is to say, Windows XP, Windows 7, Windows 2003, and Winodws 2008, which are the
Role of Domain Server
1. centralized security management and unified security policies2. Centralized software management limits all machines to run only necessary office software according to company requirements.3. centralized environment
1. Buffer Overflow In a simple explanation, the buffer overflow is mainly because the submitted data length exceeds the normal requirements of the server, causing the server to check the code error. Overflow methods can be divided into stack-based
1. Download and install# Wget http://cdnetworks-kr-2.dl.sourceforge.net/project/fail2ban/fail2ban-stable/fail2ban-0.8.4/fail2ban-0.8.4.tar.bz2 # Tar xvfj fail2ban-0.8.4.tar.bz2# Cd fail2ban-0.8.4# Python setup. py install# Cd files# Cp./redhat-initd/
When multiple users share access to the virtual machine, the VMware administrator should consider limiting the virtual machine configuration and updating functions. This avoids unexpected or malicious changes to virtual machines. It is easy to set
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.