Close the nasty BackDoor-eliminate NetBIOS risks

NetBIOS (Network Basic Input Output System) is an application interface (API) used to add special functions for LAN, almost all LAN computers work on NetBIOS. In Windows 95, 99, or Me, NetBIOS is bundled with TCP/IP, which is very dangerous!

How to build a security line for your computer network?

Many people complain that there are too many Windows vulnerabilities, and some even worry about one vulnerability after another. To this end, this article briefly introduces how to build a network security defense line. First line of Network

Professional terms in network security

Access Control List (ACL) Access Control List Access token Account lockout account Blocking Account policies Accounting Policy Accounts account Adapter Adaptive speed leveling adaptive speed level adjustment Address Resolution Protocol (ARP) Address

Create an enhanced Windows System Configuration Utility

In the past, when we opened "Internet Protocol Configuration" "Internet Options" "Registry Editor" and other options, we often achieved this through different mouse operations. Think about how to combine these commonly used configuration options,

Resolve security risks caused by remote control

In Windows XP, the software provides users with multiple simple remote control functions. Remote Desktop is one of them. You can use it to control remote computers over the network. After control, you can access all applications, files, and network

URL spoofing-secure encryption

URL Structure Let's take a closer look at URLs and its related security meanings. A "funny" method of URL exploitation has been discovered by spam advertisers for a long time, but now the "KB" (Knowledge Base) Spoofing and the article published in

Web Server Security Guide for Unix systems

Today, with the increasing popularity of computer networks, computer security not only requires the prevention of computer viruses, but also increases the system's ability to resist illegal hacker intrusion and the confidentiality of remote data

Easily retrieve lost Forum passwords

A friend's computer system is running very slowly because it has been used for too long. At the weekend, he helped him reinstall a system. After all the patches, anti-virus software, and firewall are installed, my friends can't wait to connect to

Hiding IP addresses does not allow attackers to exploit this vulnerability easily.

Generally, hacker attacks start with IP addresses. First, obtain an IP address, and then analyze and test the IP address accordingly. If a vulnerability is discovered from this IP address, then you can launch the attack. If you hide an IP address,

Network Attack Analysis and Prevention Policy

I. Preface In the ever-changing world of networks, security vulnerabilities in networks are everywhere. Even if the old security vulnerabilities are replaced, new security vulnerabilities will emerge. Network Attacks use these vulnerabilities and

Quick Search for peer IP classic tips

When transmitting data with a friend over the network, you sometimes need to know the IP address of the Peer computer before establishing an information transmission channel with the peer.How can I find the IP address of the other party? You may

ARP detect: explores the ARP attacker's footprint

ARP attacks are common in LAN, and IP address conflicts may occur in attacked regions. If the gateway has already bound an IP address and a MAC address, it is easier to query, otherwise, it is indeed difficult to find a hacker to attack itself in a

Powershell: Get-HttpStatus Function

Little sister DT said that this year, a lot of powershell stuff has emerged, and a lot of it is found in a search.Get-HttpStatus FunctionThis is good and fun. Of course, he will not be so bored. The Set: Windows7 Bypassing using Powershell from the

Summary of Web Service parsing vulnerabilities such as IIS 6.0/7.0/7.5, Nginx, and Apache

[+] Microsoft IIS 6.0 Directory resolution:/xx. asp/xx.jpg can be replaced with any text file (e.g. xx.txt), and the text content is the backdoor code IIS6.0 parses xx.jpg to an asp file. Suffix resolution:/xx.asp;.jpg/xx. asp:. jpg (you need to

OSSEC Series II-write your own DECODE (Elementary)

Previous:Http://www.bkjia.com/Article/201211/166547.htmlOSSEC:OSSEC is an open-source multi-platform intrusion detection system that runs on Windows, Linux, OpenBSD/FreeBSD, MacOS, and other operating systems. Including log analysis, comprehensive

Android has no permission to forge text messages

0x01This was discovered by the famous professor Jiang. The principle is simple and interesting.0x02 code implementationJava code package com. smstrick; import java. io. byteArrayOutputStream; import java. io. IOException; import java. lang. reflect.

Solution for windows users having no remote login permission

Windows does not have the remote login permission Remote connection to the target machine:   Cause: the logged-on user may not be added to the administrators group, because the default permission of the administrators group is: start-management

FreeFTPD 'sftp 'authentication mechanism Bypass Vulnerability and temporary solution

Affected System: freeFTPd 1. x Description: FreeFTPd is a free FTP + SSL/SFTP Server Based on WeOnlyDo FTP/SFTP. The SFTP authentication mechanism of FreeFTPD 1.0.11 and other versions has an error. Attackers can bypass the authentication process

Install and configure ModSecurity in Apache

1. install LAMP and the compiling environment # Apache 2.2.5 # Mysql 5.1.6 # install apache + php + mysql # yum-y install httpd php mysql-server php-mysql environment # yum install gcc make # yum install libxml2 libxml2-devel httpd-devel pcre-devel

Must iPhone mail be encrypted through SSL?

Mike Chapple, CISSP, IT security expert from the University of Notre Dame. He worked as an information security researcher at the National Security Agency and the U.S. Air Force. Mike often writes for SearchSecurity.com and is the technical editor

Total Pages: 1330 1 .... 402 403 404 405 406 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.