Use the Chroot mechanism to secure servers

Source: emotional network The so-called "prison" refers to modifying the root directory that a process can see through the chroot mechanism, that is, limiting a process to a specified directory, ensure that the process can only act on the files in

He Rensi medical book (2)

He Rensi medical book (2) He Rensi   On June 23, July 20, he started to equip my computer with a firewall after installing patches for the operating system again. He reness said that there are many ways and means for new users to

Introduction to Logcheck, a common log analysis tool in Linux

For Linux systems with a large number of accounts and BUSY systems, their log files are extremely large, and a lot of useless information will overwhelm the information worth noting, this makes log analysis inconvenient. There are some tools

Server Security Settings (4)

2. Do not Display the Don't Display Last User Name string in the HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsNTCurrentVersionwinlogon item to 1, so that the system will not automatically Display the Last User Name. Set the server registry HKEY_LOCAL _

Change Win2k registry to resist Denial of Service

Starting from a correct view of DoS and DDoS I believe everyone will not be unfamiliar with these two terms. Yes, Denial of Service and Distributed Denial of Service ). The so-called denial-of-Service refers to the fact that after a specific attack,

Elementary test of an intrusion detection system

Author: Nan Ye Xie Yu This is a note taken after a LIDS initial test. Due to some content being deleted, the content is a bit confusing. If there are any deficiencies, please criticize and correct them. This LIDS test mainly involves three aspects:

Install denyhosts in Ubuntu to prevent brute-force SSH cracking.

You can refer to the related articles at the end of this article. Scanning the Internet is a frequent issue. To prevent brute force cracking of ssh accounts and passwords, you can use denyhosts to enhance system security.  1. InstallSudo apt-get

MYSQL user administrator ROOT Weak Password Attack

1. Connect to the MYSQL server of the other partyMysql-u root-h 192.168.0.1  The mysql.exe program is in the BIN directory where you have installed MYSQL. 2. Let's take a look at some databases on the server. Mysql> show databases; By default, MYSQL

Break through ACL table Filtering for Elevation of Privilege

One day, I got a website permission from a friend and asked me to raise the permission. After reading the information, drive C and drive d have the read-only permission. Drive C: Documents and SettingsAll UsersDocuments can be written. No FTP

Redescribe DLL hijacking Technology

Author: xuser @ fsafeA recently written program involves just one part of this article, and then asked phthegreat about the subsequent article. The DLL hijacking mentioned in this article actually existed very early. However, some people may not

Use the Registry to change port 3389 to prevent hacker intrusion

The Remote Terminal Service in Windows 2000 and 2003 systems is a very powerful service. It also becomes a channel for intruders to stay on the host. Intruders can use some means to obtain the Administrator account and password and intrude into the

Ten factors for server security check

Introduction: This article will introduce the elements and precautions for security checks when evaluating and checking server security in the application of Microsoft Windows OS servers. My intention is to improve the security awareness of Chinese

Penetration caused by Citrix password bypass and 8 Security Settings

SimeonThe Citrix system has never been really operated before. The research on the Citrix system comes from communicating with Micky, a friend. Later, I have made some research on it, I will share with you the article.1. Citrix IntroductionCitrix is

Travel 2 Browser Remote Code Execution Vulnerability and repair solution

Brief description: The compatibility of library files in IE6, 7, and 8 scenarios is not considered in browser 2, which leads to a low-level DLL library loading error and eventually leads to a serious Remote Code Execution Vulnerability.Detailed

Differences between ipfw and iptables and Research on established

  Form: http://hi.baidu.com/x13ky I have been familiar with linux before. Whether it's the redhat series or debian series, its firewalls are all iptables, which is quite familiar. I recently came into contact with freebsd and found that ipfw was

Clear the SQL database Trojan code

  Declare @ delStr nvarchar (500) -Set @ delStr = '' Set @ delStr = '' /*************************************** */   ************/ Set nocount on   Declare @ tableName nvarchar (100), @ columnName nvarchar (100), @ tbID int, @ iRow int, @ iResult

Hydra with Nessus passwd safe

This time, the environment is on BT5, so you can directly apt-get install nessus and then register nine lines. Remember to install"Apt-get install aptitude install libpcre3-dev libssl-dev libncp-dev libpq5 libpq-dev libssh2-1 libssh2-1-dev

Perl & quot; decode_xs () & quot; and & quot; File: Glob: B

  Affected Versions: Perl 5.14.1 Vulnerability description:   Perl is a high-level, general, literal, and dynamic programming language.   Perl's "decode_xs ()" and "File: Glob: bsd_glob ()" functions have a remote code execution vulnerability.

Iptables default security rule script

The default script only enables ports 80, and 22 of the conventional web server.  # Vi default_firewall.sh #! /Bin/bash######################################## ################################### File: default_firewall.sh# Description:# Language:

Hardware technology that actively defends against buffer overflow attacks

Claim for rights 1. The processor instruction encoding can be redefined by replacing the pre-defined instruction encoding definition of the processor with the custom instruction encoding definition so that the processor can decode and execute the

Total Pages: 1330 1 .... 500 501 502 503 504 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.