Ensure IIS security
IIS secure installation
To build a secure IIS server, you must fully consider the security issues during installation.
1. Do not install IIS on the system partition.
2. Modify the default installation path of IIS.
3. Install the
1. Advantages and Disadvantages of multiple services sharing a svchost.exe ProcessWindows system services are divided into two types: independent processes and shared processes. In windows nt, only the Server Manager scm(services.exe) has multiple
If you know an NT account and password, you can useNet use \ host ipc $ "password"/user: "user"Establish a connection with a remote host. This is a method that every hacker or friend who wants to become or is trying to become a hacker knows. I even
Xiao Kan Wireless Network Security (2)Author: [I .T. S] LeiGAs mentioned in the previous post, the key mechanism in wireless networks, especially ad hoc networks. today, we focus on security at the physical layer and link layer. first, let's give an
The network security caused by changing conditions and changes has left people concerned about it. Database, reminds us of the powerful ORACLE, ms SQL. Microsoft has the most vulnerabilities. Today, SQL injection is used to make ms SQL work well for
Author: Builder.com
The Internet brings your business to the world, but when you use the Internet, how do you prevent adverse effects from external sources?
Wayne Weisse, sales director of Network Associates high-tech solutions, believes that
Author: dudu from: blog Park
In February March 8, there was a problem that the homepage did not display content, because the. Text program did not perform script filtering on the User display name .. Text. In fact, script filtering is required for
Source: Hacker defenseThe technical principles involved in this article are not new and have little value for researchers,However, it is a new method for engineering personnel to respond to emergencies.[Understanding attack vectors]The first two
Profiling StackAuthor: qingapple studio CompilationThis section discusses some common concepts of stacks. The characteristics of a stack depend on the type of the CPU platform, the compiler used to generate the program, and the way the code is
Ziqi |
Google Groups has entered the Beta stage. Currently, Google Groups is accessible in mainland China via http://groups-beta.google.com.After trying it out, you can log on directly with the Gmail account. The initial feeling is not much
VLAN-based attack methods are used by hackers Based on VLAN technology. How can they take effective preventive measures in the face of these innovative attacks? In this article, we will introduce the hacker's attack methods and the defense measures
I. IntroductionWith the popularization of personal computers and the development of the Internet, more and more people are accessing the Internet to obtain knowledge and information. However, the network is not so calm. Viruses and Trojans are
Lie to people, that is, the so-called "social engineering", and also include policies (the offending hacker Kevin Mitnick has been specifically implemented ), for example, assume you are an employee of a company so that you can exchange company
It is proved by mathematics that there is an encrypted password that will not be cracked if used correctly, but there is no chance to use it now. This is the one-time key (one-time pad) introduced by the author ).
From our experience, a certain
1. attackers will first access www.networksolutions.com, a network solution company, and enter the domain name to be queried through the make changes function provided on the company's homepage, obtain the domain name registration information in abc.
Text/figure Liu Zhisheng's ARP Spoofing Attack and Defense Technology are both mature. previous articles in the magazine also described in more detail, so I will not go into detail here. This article focuses on how to do not use ARP spoofing for
1. What is a rainbow table?
Rainbow table (Rainbow Tables) is a large set of hash values pre-computed for various possible letter combinations. It is not necessarily for MD5 algorithms, but for various algorithms, it can quickly crack various types
Create an administrator user that can never be deleted
Procedure:1. Create a. txt file on your computer.2. Enter content in it
@ Echo offNet user xixi 123456/add Note: The first xixi is the user name and the second 123456 is the password;Net
Affected Versions:Linux kernel 2.6.x
Vulnerability description:Linux Kernel is the Kernel used by open source Linux.
In Linux Kernel Netfilter, "ipt_CLUSTERIP.c" has a buffer overflow vulnerability. A local attacker can use this vulnerability to
MD5 or HASH value is an irreversible algorithm. If you need to restore the ciphertext to plain text, symmetric and asymmetric reversible algorithms are required.
First, we will briefly introduce these two types of algorithms. Figure 9-1 is a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.