Use VBScript to modify the Windows Registry

Have you heard of the well-known WSH? It is short for Windows Script Host, and WSH is a Script command on Windows platform. It has powerful functions, in addition to modifying the Registry described in this article, it uses the JScript and VBScript

Using a mental retardation tool to play with "black and black" ------- KFSENSOR (IDS) Introduction

Original: demonalex EMAIL: demonalex@163.com QQ: 17627441   This is a shared IDS + HONEYPOT software named KFSENSOR. This is a very powerful IDS, but unfortunately it is a shared version .................:( If you have any mistakes in this article,

What if I find a virus?

Event Michael uses a computer to Process office files, send and receive emails, and browse webpages. He occasionally communicates with his friends via QQ, so there are few problems until one day a friend sends a link, michael clicked without

Use the Home Page space to send anonymous emails

Do not use any software; an ie can be used as an anonymous email. Sometimes we do not want the recipient to know my email address on the Internet, or we want to use some personalized email addresses to send emails to others, for example, to your

Terminal Service Log monitoring

There is a reason to separate the log monitoring of the Terminal Service (Terminal Service). The Terminal Service provided by Microsoft Win2000 Server is a tool based on the Remote Desktop Protocol (RDP, it is fast and stable, and can be a good

Guard of NT System-SAM

Author: Xiaojin from: chip Friends who have used the NT kernel Windows operating system know that the management mechanism of the system password of the NT kernel is much stronger than that of the Windows operating system of the Win32 kernel, thanks

Instance parsing searches for ARP spoofing through traffic detection

ARP spoofing attacks are a common form of attacks. The Intranet of the attacked organization may slow or even stagnate the network due to ARP spoofing attacks. This article describes how to find out ARP spoofing attacks through network traffic

Security profiling of CMOS Data

Text/SuperVirus I wonder if you have written some prank or little "virus" experiences? I used to play this thing before and never thought about how to contribute and earn living expenses. However, after reading several articles, I feel that no one

Overflow programming skills in WINDOWS

Once accused by cnns of being plagiarized, see blind tone for specific events.     Overflow programming skills in WINDOWSAuthor: Yuan Ge After reading some overflow programs in WINDOWS, I felt that they were not uniform and perfect. I decided to

Remote heap buffer overflow vulnerability in Mozilla Firefox 3.5/3.6

Mozilla Firefox is a remote heap buffer overflow vulnerability.Successful attacks allow attackers to run arbitrary code in the user Context of the application.A failed attack may cause a denial of service condition. Test method: This problem is

Analysis of a Trojan sample

It's free. Let's take a look.ODLoad directly as follows: 00414000> $ E8 00000000 call 0041400500414005 $ 5B pop ebx // locate the code00414006.81EB05024000 sub ebx, 00400205 // The code segment length, followed by a variable0041400C. 64: 8B3D 3000000

Linux system backdoor + Log clearing

1. setuid# Cp/bin/sh/tmp/. sh# Chmod u + s/tmp/. shAdding suid to shell is simple but easy to find 2. echo "hack: 0: 0: // bin/csh">/etc/passwdThat is, add an account with the id 0 (root) to the system without a password.But the Administrator will

Seven Ways to prevent Anonymous attacks

The hacker organization Anonymous uses a series of simple technical methods and social engineering to attack the network of the security technology company HBGary Federal, many of the network technical issues covered here are worth the reference of

No need to restart or change the remote port of the server

The server permissions are successfully obtained through the bypass + elevation of permissions, and then the SQL command adds the USER ADMIN to enable 3389After successfully logging on to the server, I thought about how to use the remote port of the

Technical Summary and defense against ARP attacks

1. arp ddos attacks2. ARP returned packet spoofing3. ARP request Spoofing4. ARP full-network request Spoofing5. ARP man-in-the-middle spoofing6. ARPIP address conflict7. ARP gateway Spoofing8. ARP switch port forwarding spoofing (the most powerful,

Convert the EXE file to "service"

System Security Open the command line program cmd.exe (or command line window ).Enter: c:> instsrv "service name" c: winntsrvany.exe enterRun registry program regedit.exeCreate a subitem of HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServices "service

Cross-domain security problems caused by DNS suffixes

We all know that the DNS suffix of the client can be set in dhcpd. For example, if we set the DNS suffix to "sb.com", when we access www.sb.com, all clients will use the DHCP server and try the following sequence for resolution.  Note: The following

P2P-Worm.Win32.Palevo.cjkl Analysis

English name: P2P-Worm.Win32.Palevo.cjklVirus length: 100,779,160 bytesVirus Type: WormHazard level:★★★Affected platform: 2008 win7 and vista XPMD5 verification: 70f012b8b2ec6b8b39f7c67be6d4d1a7 It is written in advanced languages and processed by

Security Audit of hacker intrusion prevention technology

Security Audit is a monitoring mechanism that simulates social activities on the network. It monitors, records, and puts forward security opinions and suggestions on activities of the network system. Security audit can be used to record, track, and

Prevent DoS attacks on Apache servers

Apache server's defense against DoS attacks is mainly implemented through the Apache DoS Evasive Maneuvers Module. It is an alternative to mod_access and can defend against DoS attacks. The software can quickly reject repeated requests from the

Total Pages: 1330 1 .... 499 500 501 502 503 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.