Although we cannot completely stop attacks, some security work must be done. In Linux, you can configure Iptabels to enhance server security. It is complicated to configure Iptables. However, it is not difficult to configure Iptables step by step
Author: Arctic fox, watching the snow Forum
Linux has few software that requires crack, so it is always entertaining recently. The software you write is just fun with yourself, but it doesn't mean anything because you know your means. I really want
Riusksks blog
I have nothing to worry about recently. I have to do with mine clearance plug-ins, so it is reverse.
00401000>/$68 24334000 PUSH plug-in for mine clearance. 00403324;/Title = "mine clearance"00401005 |. 6A 00 PUSH 0; | Class = 0004010
Author: combojiangTime: 2007-12-: 09Chain: http://bbs.pediy.com/showthread.php? T = 56328
Statement: This post reference site: http://ourworld.compuserve.com/
[1] basic knowledgeComponent Object Model (Com) is widely used in windows operating
Text/figure dfPE file, the full name of Portable Executable file, is a common format for Windows system Executable files, such as EXE, DLL, OCX, and even SYS files that we usually contact belong to the scope of PE files. To easily reference other
After a type of data commonly used on the Internet is maliciously parsed, xss details: an xml file can contain an xml-stylesheet tag, which is used to specify an xsl file to format and output the xml file. Any html code, including the label, can be
Our Java website has encountered some problems today and requires a quick solution to protect the website against malicious cross-site scripting (XSS) attempts. I'm not saying this is a perfect solution, but it is easy to implement and correct
Recently, I talked about the method of multi-star out-of-stock elevation. Recently, I encountered a process of combining the station with some ideas of Daniel! The target is that the phishing site is very annoying, and it is safe without 0-day
0x00 Information Collection
I accidentally discovered an injection link. I don't know how to find it. It's not a scan.
Http://www.bkjia.com/xxxxxx? Id = 12
Google finds the background
Site: f4ck.edu. cninurl: admin
Http://www.bkjia.com/xxx. php
0x01
Zabbix can be used to add monitoring items and run commands. You can understand the following things. The main purpose of this hole is to remind everyone that zabbix should pay attention to the next struts vulnerability and slave (root) gid = 0
Today, a friend threw me a background and said he couldn't take the shell. I just decided to go and check it out ~
After reading about the background, I had a database backup, and it hurt me. Why can't he take it?
When I saw a database backup,
This is just a small test to verify your ideas.
A long time ago, I encountered a situation where the server did not allow POST.
At that time, I did not think deeply because of my busy schedule. I encountered another time yesterday when I executed an
The end of the term is approaching. There are various assignments .. Computer learning cannot afford to hurt .. It is very interesting to say that we have a course called hacker attack and defense. The final assignment is the hacker station. I
A few days ago, the website had just changed its directory, and the server had also reinstalled the system without performing security configuration.Unfortunately, it was suddenly discovered that the remote host login password of the server was not
On Weibo the day before yesterday, I saw the most popular group buying day issued by chuangyu. I checked the source code the night before. The analysis was incomplete because it was only for Weibo. First look at the page :. /include/library/DB.
Register, log in, retrieve the password, enter the new password, cut off the http post data, change userid to the userid of another account, f12 can directly see the userid on the website pageAfter the modification is submitted successfully, the
The log storage XSS of the personal network can load external JS, get Cookies, and automatically send logs to spread XSS code. Worms are tested in a small scale. The damage is serious.When a log is published, HTML code is directly edited through the
Message book injection. Get the account password. Make sure that you know the source code of the program. In insert. Construct another SQL statement. And read the account password. $ Ifqqh = $ _ POST ["ifqqh"]; no filtering ....... $ SQL = "insert
Recently, I have been sorting out information about JavaScript code security. When I checked the information about JavaScript Hijacking, I found that there was very little Chinese information about it, so I specially sorted it out.
I. Principle of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.