Security O & M Philosophy)

Dr. Li Yang's defense line was bought some time ago. After reading this line for a long time, he has benefited a lot and has been focusing on Enterprise Security. 1. Know yourself and know what you are doing It is not dangerous to know the enemy or

Hidden risks of IIS write permission

  Test environment:A virtual machine that has been installed with windows server 2003 and has activated IIS and an XP client. Note: Only IIS components are installed on the server. No site is configured currently. Default NTFS security settings are

Detailed analysis of snort source code

Some time ago, due to work relations, I did a careful research on the snort intrusion detection system. At first, I basically searched for information on the Internet. For the application, principle, architecture, and configuration of the snort

How can I deploy a firewall correctly?

FirewallIn the actual application deployment process, it is often deployed at the gateway location, that is, it is often deployed at the "Intermediate Separation Point" inside and outside the network, in such a deployment environment, there are also

Transmission of WebShell text in txt format!

Author: Vic Today, we will demonstrate how to convert WEBSHELL to txt for transmission. The demo process is as follows:     Find a weak MYSQL password host with port 3306 enabled. Let's choose this one for demonstration. We use MYSQL for

Automatically blocks DDOS attacks using SHELL scripts

A very practical iptables script that automatically rejects suspicious IP addresses and sends alarm emails and text messagesLinux :~ # Cat iptables#! /Bin/bashTouch/root/back_bad_ip.txtTime = 'date + "% Y-% m-% d % H: % M: % S "'Ar = 'wc-l/root/back_

Focus on Virtualization security: "No proxy anti-virus" (video)

Some vendors in the industry have introduced the "No proxy anti-virus" technology, but the industry has always heard different voices about whether such solutions are reliable. What do people think about such solutions? For example, does "no proxy

VPN Series 5: detailed configuration of multipoint Gre Over Ipsec

VPN Series 5: detailed configuration of multipoint Gre Over Ipsec     650) this. width = 650; "border =" 0 "alt =" "src =" http://www.bkjia.com/uploads/allimg/131227/0J2543P0-0.jpg "/>   Routerios version: 650) this. width = 650; "border =" 0 "alt ="

PowerShell tries ssh Login

The previous article introduced how to log on to ftp through PowerShell. This article will show you how to try Linux SSH Logon Through PowerShell. Because most Linux logins are performed in SSH mode, during penetration testing, port 22 is scanned

Practice: View Trojans through established sessions

View Trojans through established sessions Check the suspicious session to check whether the trojan is in progress. An exception occurred recently on the server of a certain organization. The Network Administrator felt that someone was operating on

1 minute to solve system password cracking

Password crackingThe method is described as follows: The password cracking method described in this article is simple, secure, and has a success rate of 100%. It makes you look at the system without forgetting the system password! Startup, there

How to embody encryption and decryption steps

Data Encryption and leakage prevention software DLP) import work, for the company's CIOs, is generally the first time encountered. During the import phase, the system will encounter usage and System Operation settings problems. How can we make the

Network listener technology Overview

In the network, when information is transmitted, you can use tools to set the network interface in the listening mode to intercept or capture the information being transmitted in the network, to launch attacks. Network listening can be implemented

Anti-Spam Overview

Almost every Internet user who has used an email address is subject to SPAM ". All kinds of spam are like a group of stinks, which are annoying but lingering. Now, if you have mastered the following tips, it can greatly reduce the troubles caused by

Theory and implementation of page attacks

Page attacks can be divided into two categoriesOne is to use browser vulnerabilities to write malicious code on access pages to attack visitors. Here we can understand the server's attack on the client. On the other hand, visitors attack servers by

A collection of CGI vulnerability attacks in the network security series (Part II)

42. exprcalc. cfm ● Type: attack type ● Risk level: low ● Description: if the Web directory contains:

A collection of CGI vulnerability attacks in the network security series (I)

The following are some famous CGI vulnerabilities collected and sorted out, and some security suggestions and solutions are provided. If these vulnerabilities are not fixed in time on the server, each vulnerability may be exploited by intruders,

Firefox upgrade: security considerations for System Administrators

Mozilla Firefox is widely recognized as a good browser with a high security factor. Many organizations that have used Internet Explorer or ActiveX technology are ready to switch to Firefox for their security and ease of operation.High Security does

Various content filtering modes of the firewall

1. OverviewContent filtering is already a basic function of various firewalls. This article summarizes the content filtering modes of various firewalls.Content filtering is mainly used to process content information of upper-layer protocols of TCP

139 email worm compiling example

139 email worm compiling example Author: [sh0wrun], [woyigui] Date: 2009-09-09 Disclaimer: the vulnerability has been reported and repaired. Do not use it for illegal purposes. Principle Analysis: We often use mail.139.com, which is prone to xss

Total Pages: 1330 1 .... 645 646 647 648 649 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.