In-depth introduction to social engineering

Skilled social engineering users are good at collecting information, and many seem First, skilled social engineering users are good at collecting information, and many seemingly useless information will be exploited by these people for penetration.

Eight tips for protecting XP Network and file security

Source: Skynet Are your computers shared with others? If yes, you will be worried about the security of your personal files. If you are using Windows XP, then you can use some simple and efficient settings provided by Windows XP to maintain your

Disable hard disk Autorun to prevent hacker intrusion

Enter Regedit in "run" in the "Start" menu, open the Registry Editor, expand to the HKEY_CURRENT_USERSoftwareMicrosoft \ Windows \ CurrentVersion \ Policies \ Exploer primary key, and find "NoDriveTypeAutoRun" in the right pane ", this key

Cross-database query of Access

You still remember mssql's cross-database query. In fact, cross queries between two data items can be implemented in access. Next I will introduce the cross-database query of access. First, let's take a look at how to query the mdb File in access.

MD5 password direct query

Today, I saw a post on the neworder. box. sk Forum, attracting my attention. The post claimed to be an MD5 cracking research team, mainly because he established an MD5 search database. First go to his query page Http://www.md5lookup.com /?

Attack and Defense against huge media file Trojans

Nowadays, the most popular types of media files are RM and RMVB files and WMV and WMA files, which are well supported by streaming media, these two media file formats are used for almost all media files such as movies and music on the network.

Full security check process: from uploading webshells to breaking through TCP/IP screening to logging on to 3389 Terminals

1. Obtain webshellIn a small test this evening, because I am too fond of food, I will not be able to learn more advanced technologies. I can only do this ..........Everything has passed and there is no way to make up the picture. I hope I can

Analysis of DLL hijacking attacks

Copyright (c) 2010 Czy Invicta All rights reserved.   In this article, I will talk about the possibility of some defects becoming DLL hijacking. We hope to determine whether the application is vulnerable in the future and take measures to ensure

Linux Security System Study NOTE 4: OpenSSL source code analysis (3)

  BIO is an encapsulation of IO operations. The BIO abstract interface of OpenSSL can be used not only for the I/O of SSL connections, but also for non-encrypted network connections and file I/O. The source code of BIO is in the crypto/bio folder.  

MS11-092 -- Arbitary Memoray Write 2 NULL bytes!

I received several ZDI vulnerability bulletins that day, one of which is MS11-092. Due to the recent interest in file format vulnerabilities, PatchDiff2 compares the patch files. After comparison, the thief did not want to check whether there is a

JailbreakMe! Jailbreak tutorial

Www.2cto.com: If you think the text image is not intuitive, you can watch the video: JailbreakMe is a perfect jailbreak for iPad 1 generation, iPad 2, iPhone 4, iPhone 3GS, iTouch 3, and iTouch 4 iOS4.3.3 firmware ~ It's so powerful! I'm not so

Automatic security check for large-scale win servers

A company has a large number of win servers. It takes a long time to manually check or run scripts for each login if reinforcement is performed. So I want to log on to the host by writing a program, run the script, capture insecure configurations,

Basic configuration and usage of SELinux

[1] SELinux boot configuration file/etc/sysconfig/seLinux SELINUX = Enforcing (default) Disabled: Disable The SELinux function Permissive: displays only warning information, does not block Enforcing: enforce the SELinux function to generate the

A few tips to find evidence of linux intrusion

To find evidence of linux system intrusion, you can start from the following aspects:1. last and lastlog commands can be used to view the recently logged-on account and time2. for/var/log/secure,/var/log/messages log information, you can use the

Source IP address blocking script

The script to block the source IP address when the website is subject to abnormal connections from a large number of hosts. #! /Bin/bashTouch allFor I in 'seq 1 100 '// controls the loop of the scriptDoSleep 1 time controlIp = 'Tail-30/var/log/. log

Wmiprvse.exe is forbidden, so that others' PR cannot be elevation of permission.

Prohibit elevation of PRFirst, analyze the principle of PR elevation from the source code.Some of the source code is as follows:Pr is obtained by searching wmiprvse.exe to obtain the SYSTEM permission.Execute any command to add a user.Method 1Load K8

Linux script reinforces System Security

Today, a friend shouted in the Linux Group that he needed to write a script to implement unified security configuration for more than 100 Linux systems, and then asked someone to write the script. I have nothing to worry about. They are all very

Key Points of apache Security Settings in windows

As we all know, in windows, when Apache is installed as a service for the first time, it will run with the user "System" (Local System account. If all the resources of the web server are on the local system, this will have fewer problems, but it

Improved ipsec Security configuration script in win2k3

As we all know, although the basic firewall in Windows is robust, it has a single function and is more powerless to actively send packets. ipsec is a good supplement, but the operations in the ipsec graph are very clumsy, most of the ipsec Security

Applicable environment for udf Privilege Escalation

I only met windows + mysql, so I always thought it was only applicable to this environment. Thanks to some reminders, it was found that udf Elevation of Privilege is not limited to this environment, but is applicable to both windows and linux

Total Pages: 1330 1 .... 450 451 452 453 454 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.