Discussion on Hidden Communication Between Trojan client and server

A successful Trojan must implement a reliable communication solution that is not easy to be detected by the host. The following describes the implementation methods and reliability of various solutions in my knowledge, security is discussed. There

Be alert! Worms intrude into windows through Skype voice chat

People who love to use "Skype" to talk about the sky should note that a "worm" is pervasive through skype and users need to be vigilant.The Skype Worm (Worm. IM. Skype) can infect operating systems such as Win9X, 2000, and XP. It sets the online

Prevent re-virus during system reinstallation

Many people think that the virus can be completely cleared if the operating system is re-installed. However, I do not know that after the operating system is re-installed, due to security settings and patch installation failure, the virus is most

How to identify the authenticity of Microsoft Security emails

Generally, if Microsoft publishes a security notice, it will notify the subscriber of the reminder service by email. However, it has been found that many malicious people use spoofed methods to forge Microsoft's Security Bulletin emails. Some emails

"Gray pigeon" turns into "Black pigeon" specifically targeting the virus of the stockholders

Trend Micro recently said that, for three consecutive years, it has been accused of the top ten viruses of the year and the most dangerous backdoor program called by anti-virus experts as "gray pigeon ", another variant of "black pigeon" appeared

Delete stubborn Trojan viruses in the system

1. Start with the virus directoryFirst, we need to start with the directory where the virus is located. If the virus has its own directory like a normal software, we can smile a little-the virus is weak. Check the Directory Creation Time to know

Security: no small issues, be careful about the damage to system hardware by viruses

CIH virus once put everyone in fear and caused a lot of waves. In the past, various viruses could only damage hard disk data, but CIH could intrude into Flash BIOS on the main board and destroy its content to decommission the main board. The CIH

Experts talk about the theft of confidential information through five channels of computers

In movies, stealing and stealing internal information in the office is no longer the main channel for information leaks. As more and more people use networks to transmit and exchange information data, including customer information, technical

A netizen's experience in preventing hackers

It is easy for hackers to scan the server. Once a problem is found on the server, the consequences will be serious. This means that the network administrator should avoid hackers scanning the server. In this section, I will talk about how to protect

Latest news: New Trojan viruses steal user information on recruitment websites

A new Trojan Horse virus was found on a foreign online recruitment website. It successfully attacked the recruitment website and obtained a large amount of personal user data. The researchers learned from Symantec and SecureWorks that the new

QQ account theft Trojan production online full batch exposure (figure)

QQ is used by countless people every day. People often focus on attacks such as QQ tail viruses and QQ Trojans, however, few people have noticed that the QQ group and QQ space we often visit have hidden greater security risks, which are far more

Trojan viruses are the greatest threat to the Internet

A few days ago, rising released a report: a total of 83119 Trojan viruses were intercepted in the first half of this year, accounting for 62% of the total number of viruses during the same period. Viruses with Trojan Behavior Characteristics, it

This week, netizens need to be highly vigilant against the virus spreading by USB flash drives.

On July 6, October 15, the anti-virus monitoring center issued a weekly (10.15-10.21) virus warning. During this week, the majority of users should be highly vigilant against the "auto usb flash drive serial number" (Win32.TrojDownloader. autoRun)

Use caution to prevent random trojans from generating virus files in the system

Recently, users need to pay attention to a random trojan that monitors Kaspersky. the random Trojan will generate a virus file in the system and create a registry service project. Automatic Updates and downloading of Trojans are prohibited

Multiple Remote Vulnerabilities in Dlink DPH 150SE/E/F1 IP Phones

Release date:Updated on: Affected Systems:D-Link DPH 150SED-Link DPH 150F1D-Link DPH 150EDescription:--------------------------------------------------------------------------------Bugtraq id: 48894 Dlink DPH 150SE/E/F1 is a desktop IP Phone.

HTTP Server Buffer overflow vulnerability in multiple Fujitsu Interstage Products

Release date:Updated on: Affected Systems:Fujitsu su Interstage 9.xDescription:--------------------------------------------------------------------------------Bugtraq id: 63929 Fujitsu Interstage is a modular software component for enterprise

Cisco NX-OS BGP Message Denial of Service Vulnerability

Release date:Updated on: Affected Systems:Cisco NX-OSDescription:--------------------------------------------------------------------------------Bugtraq id: 64670CVE (CAN) ID: CVE-2013-6982 Cisco NX-OS is a data center-level operating system that

FreePBX 'usersnum' Parameter Remote Command Execution Vulnerability

Release date:Updated on: Affected Systems:FreePBX 2.xDescription:--------------------------------------------------------------------------------Bugtraq id: 65756 FreePBX is an open source Web PBX solution. FreePBX 2.x and other versions have the

Hitachi JP1/File Transmission Server/FTP Security Restriction Bypass Vulnerability

Release date:Updated on: Affected Systems:Hitachi JP1/File Transmission Server/FTPDescription:--------------------------------------------------------------------------------JP1/File Transmission Server/FTP is an FTP-based File transfer Server

Lighttpd 'mod _ mysql_vhost.c 'SQL Injection Vulnerability (CVE-2014-2323)

Release date:Updated on: Affected Systems:Lighttpd lighttpd 1.4.xLighttpd lighttpd 1.3.xDescription:--------------------------------------------------------------------------------Bugtraq id: 66153CVE (CAN) ID: CVE-2014-2323 Lighttpd is a

Total Pages: 1330 1 .... 393 394 395 396 397 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.