Three methods to ensure IIS security

Ensure IIS security IIS secure installation To build a secure IIS server, you must fully consider the security issues during installation. 1. Do not install IIS on the system partition. 2. Modify the default installation path of IIS. 3. Install the

Create a service principle and practice called by svchost.exe

1. Advantages and Disadvantages of multiple services sharing a svchost.exe ProcessWindows system services are divided into two types: independent processes and shared processes. In windows nt, only the Server Manager scm(services.exe) has multiple

Use the doscommand to crack the remote NT user password

If you know an NT account and password, you can useNet use \ host ipc $ "password"/user: "user"Establish a connection with a remote host. This is a method that every hacker or friend who wants to become or is trying to become a hacker knows. I even

Xiao Kan Wireless Network Security (2)

Xiao Kan Wireless Network Security (2)Author: [I .T. S] LeiGAs mentioned in the previous post, the key mechanism in wireless networks, especially ad hoc networks. today, we focus on security at the physical layer and link layer. first, let's give an

Squeeze the last drop of MS SQL

The network security caused by changing conditions and changes has left people concerned about it. Database, reminds us of the powerful ORACLE, ms SQL. Microsoft has the most vulnerabilities. Today, SQL injection is used to make ms SQL work well for

Don't forget to close the backdoor when the network door is opened.

Author: Builder.com The Internet brings your business to the world, but when you use the Internet, how do you prevent adverse effects from external sources? Wayne Weisse, sales director of Network Associates high-tech solutions, believes that

How to filter malicious scripts in. Text

Author: dudu from: blog Park In February March 8, there was a problem that the homepage did not display content, because the. Text program did not perform script filtering on the User display name .. Text. In fact, script filtering is required for

Use gdb in Linux to detect the kernel rootkit

Source: Hacker defenseThe technical principles involved in this article are not new and have little value for researchers,However, it is a new method for engineering personnel to respond to emergencies.[Understanding attack vectors]The first two

Exploring IIS Log File analyzer ReadLogs (4)

Profiling StackAuthor: qingapple studio CompilationThis section discusses some common concepts of stacks. The characteristics of a stack depend on the type of the CPU platform, the compiler used to generate the program, and the way the code is

Google Group Beta has been launched

Ziqi | Google Groups has entered the Beta stage. Currently, Google Groups is accessible in mainland China via http://groups-beta.google.com.After trying it out, you can log on directly with the Gmail account. The initial feeling is not much

Common VLAN attack Parsing

VLAN-based attack methods are used by hackers Based on VLAN technology. How can they take effective preventive measures in the face of these innovative attacks? In this article, we will introduce the hacker's attack methods and the defense measures

Personal computer intrusion and defense

I. IntroductionWith the popularization of personal computers and the development of the Internet, more and more people are accessing the Internet to obtain knowledge and information. However, the network is not so calm. Viruses and Trojans are

Analysis of ARP cache infection attacks

Lie to people, that is, the so-called "social engineering", and also include policies (the offending hacker Kevin Mitnick has been specifically implemented ), for example, assume you are an employee of a company so that you can exchange company

The highest level of encryption: passwords that cannot be cracked within one hundred years

It is proved by mathematics that there is an encrypted password that will not be cracked if used correctly, but there is no chance to use it now. This is the one-time key (one-time pad) introduced by the author ). From our experience, a certain

Domain Name Hijacking

1. attackers will first access www.networksolutions.com, a network solution company, and enter the domain name to be queried through the make changes function provided on the company's homepage, obtain the domain name registration information in abc.

No ARP spoofing sniffing Technology

Text/figure Liu Zhisheng's ARP Spoofing Attack and Defense Technology are both mature. previous articles in the magazine also described in more detail, so I will not go into detail here. This article focuses on how to do not use ARP spoofing for

Use a rainbow table to crack complex encryption passwords such as MD5 and LM Hash

1. What is a rainbow table? Rainbow table (Rainbow Tables) is a large set of hash values pre-computed for various possible letter combinations. It is not necessarily for MD5 algorithms, but for various algorithms, it can quickly crack various types

Several backdoor skills

Create an administrator user that can never be deleted Procedure:1. Create a. txt file on your computer.2. Enter content in it @ Echo offNet user xixi 123456/add Note: The first xixi is the user name and the second 123456 is the password;Net

Linux Kernel Netfilter ipt_CLUSTERIP.c buffer overflow vulnerability and repair

Affected Versions:Linux kernel 2.6.x Vulnerability description:Linux Kernel is the Kernel used by open source Linux. In Linux Kernel Netfilter, "ipt_CLUSTERIP.c" has a buffer overflow vulnerability. A local attacker can use this vulnerability to

Security Article 2: application scenarios of symmetric encryption

MD5 or HASH value is an irreversible algorithm. If you need to restore the ciphertext to plain text, symmetric and asymmetric reversible algorithms are required. First, we will briefly introduce these two types of algorithms. Figure 9-1 is a

Total Pages: 1330 1 .... 405 406 407 408 409 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.