"Mobile Phone undercover" trojan monitors your call Information

It is said that the flood of Trojans called "Mobile Phone undercover" has become a social hazard. Experts said the gaps in legal supervision and huge market demands have led to "Mobile Phone undercover. Some of the users who buy "Mobile Phone

My close contact with viruses and Trojans

A Trojan is actually a spy quietly running on your computer. It secretly controls your computer and steals your information. Poor people will make your system slow or even paralyzed. How do I install it on your computer? There are three main

Completely block system sharing Vulnerabilities

Since Windows 98, sharing has brought endless troubles to many Internet users. At the same time, sharing is a powerful tool for hackers to attack others' computers. How can I completely disable the sharing vulnerability between Windows 2000 and

Shinmu Ma intrude into Windows XP and steal the credit card Password

Security company Symantec researcher said recently that Microsoft Windows registered users may be locked by the latest phishing attacks. According to vnunet reports, Symantec said the latest trojan virus can intrude into the Microsoft Windows XP

(Worm. AutoIt. c) the Worm attacks resources and slows down computer operation

There is a new Worm-(Worm. AutoIt. c) disguise using the folder icon: If you are not viewing the file extension, you may be tempted. Then, your system will become very slow. A virus occupies a high amount of system resources. 1. After the virus

Web page Monitoring allows you to easily set up surfing on the Internet.

Recently, some users reported that after the KV "Web page monitoring" was enabled, browsing the Web page was often suspended. Therefore, many users disabled web page monitoring and even uninstalled the excellent anti-virus software such as KV2008,

Linux system security configuration details

System security is critical to users, and Linux users are no exception. I have summarized some tips for enhancing Linux security protection based on my own Linux experience. I will introduce it to you here. 1. Add a boot password for LILO Add

Linux security knowledge

My comments:This book describes all aspects of linux security and provides a clear line of thinking. This document providesMany helpful security tips are a reference for Linux system maintenance personnel. Through this book, you can learn about

Linux Kernel DE4X5_GET_REG request Kernel information leakage Vulnerability

cve

Release date:Updated on: 2010-09-17 Affected Systems:Linux kernel 2.6.xDescription:--------------------------------------------------------------------------------Cve id: CVE-2010-3295 Linux Kernel is the Kernel used by open source Linux. Drivers/

Oracle Spatial UI Infrastructure component Remote Security Vulnerability

Release date:Updated on: Affected Systems:Oracle Oracle11g Standard Edition 11.2.0.1 R2Oracle Oracle11g Standard Edition 11.1.0.7Oracle Oracle11g Standard Edition 11.1. 7Oracle Oracle11g Standard Edition 10.2.0.4Oracle Oracle11g Standard Edition 10.

Remote vulnerability in Oracle E-Business Suite shared application components

Release date:Updated on: Affected Systems:Oracle E-Business Suite 11i 11.5.10.2Oracle E-Business Suite 12 12.xDescription:--------------------------------------------------------------------------------Bugtraq id: 45870,45861Cve id: CVE-2010-3589,

OrangeHRM "path" File Inclusion Vulnerability

Release date:Updated on: Affected Systems:OrangeHRM 2.xDescription:--------------------------------------------------------------------------------OrangeHRM is a comprehensive human resource management (HRM) system. It implements some important HR

PHP "php5-common.php5.cron.d" competitive Condition Vulnerability

Release date:Updated on: Affected Systems:PHP 5.xUbuntu Linux 9.xUbuntu Linux 8.xUbuntu Linux 11.xUbuntu Linux 10.xDescription:--------------------------------------------------------------------------------Bugtraq id: 46928Cve id: CVE-2011-0441

Postfix SMTP Server Cyrus SASL supports Memory Corruption Vulnerability

Release date:Updated on: Affected Systems:Wietse Venema Postfix 2.xUbuntu Linux 8.xUbuntu Linux 6.xUbuntu Linux 11.xUbuntu Linux 10.xUnaffected system:Wietse Venema Postfix 2.8.3Wietse Venema Postfix 2.7.4Wietse Venema Postfix 2.6.10Wietse Venema

Multiple vulnerabilities in phpMyAdmin

Release date:Updated on: Affected Systems:PhpMyAdmin 3.xDescription:--------------------------------------------------------------------------------Cve id: CVE-2011-2505, CVE-2011-2506, CVE-2011-2507, CVE-2011-2508 PhpMyAdmin is a PHP tool used to

CUPS "gif_read_lzw ()" GIF File Heap Buffer Overflow Vulnerability

Release date:Updated on: Affected Systems:Easy Software Products CUPS 1.4.8Description:--------------------------------------------------------------------------------Bugtraq id: 49323Cve id: CVE-2011-3170 CUPS is a standard open-source printing

Quassel Core CTCP Remote Denial of Service Vulnerability

Release date: 2011-09-08Updated on: 2011-09-08 Affected Systems:Quassel IRC Team QuasselDescription:--------------------------------------------------------------------------------Bugtraq id: 49526 Quassel is a cross-platform distributed IRC

Google Chrome WebKit engine Ruby tag discard Pointer Vulnerability

Release date: 2011-10-07Updated on: 2011-10-07 Affected Systems:Google Chrome Description:--------------------------------------------------------------------------------Google Chrome is a Web browser developed by Google using the WebKit design

Apple Mail. app mail DoS Vulnerability

Release date: 2011-11-01Updated on: 2011-11-01 Affected Systems:Apple Mac OS X 10.7.2Apple Mail 5.1Description:--------------------------------------------------------------------------------Mail. app is a self-contained email program in Apple's Mac

AbsoluteFTP LIST Command Response Handling Buffer Overflow Vulnerability

Release date: 2011-11-14Updated on: 2011-11-15 Affected Systems:VanDyke Software AbsoluteFTP 2.xDescription:--------------------------------------------------------------------------------AbsoluteFTP is an FTP File Transfer tool of VanDyke Software.

Total Pages: 1330 1 .... 625 626 627 628 629 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.