If the WIN2000 SERVER is correctly installed, the system still has many vulnerabilities and requires further configuration.
1. Port:A port is a logical interface connecting a computer to an external network and the first barrier of a computer.
The following is a reference clip:Time/t> IIS-Scan.logFind/I "character to be searched" C:/WINDOWS/system32/LogFiles/Httperr/*. *> IIS-Scan.log
The above Bat can easily find the intrusion data in the IIS 6.0 log file.We all know that IIS on
Hxdef is a backdoor that hides processes, registries, links, and files. After running Hxdef, you cannot use the task manager to view the processes and registries.The author also introduced the golden version of Hxdef, which is said to be able to
The Penetration Test (Penetration Test) fully simulates possible attack technologies and vulnerability discovery technologies used by hackers. It thoroughly detects the security of the target system and finds the most vulnerable part of the system.
As a Linux administrator, the first step in security defense is to know which services are running in the system. The Administrator's important responsibilities should include checking whether the service is authorized and identifying services that
Nowadays, more and more viruses are spreading through the automatic playback function of the system. If the automatic playback function of the system is disabled, a transmission path of the virus Trojan is cut off.
1. Use the Group Policy Editor
Yesterday, I encountered a computer where many exe files could not be opened, but anti-virus software and many normal exe files could not be opened.Then, each disk contains an English-digit hidden exe and an autorun. inf. Even if it is deleted, it
Allowing Web users to access the database is a very fine-grained task and requires careful consideration.
TechRepublic member E Spigle recently raised the following question on Q & A forum of TechRepublic Technical:
We are working on a job to
What are the characteristics of the most hidden system backdoors?
First, the system must be powerful and fully controlled. Second, the system should be concealed. Attackers can bypass antivirus software. Are there any such backdoors? The answer is
Microsoft has established a flexible and powerful security management mechanism that comprehensively manages the security of user access to the SQL Server system and database. As described in this article, you can create a flexible and manageable
Source: LoveshellWell, there are too many things... the previous questions about xsrf and portscan are ignored silently. Yesterday I saw a very interesting one. Hey, can you detect the installed software? By the way, the res protocol is used to
The encryption system has three basic deployment directions: storage, transmission, and authentication. Because the Internet is not a trusted transmission channel, there may be various threats, such as listening, interception, and malicious
Manual cleanup: Before cleanup, set "show all files" and "Hide protected operating system files" in the folder options ".
(1.exe clear svchost.exe
Svchost.exe in windowssystem32is a normal system program. If svchost.exe is found in the Windows
Currently, the biggest criticism of IDS is false positives. Technically, false positives mean that detection algorithms treat normal network data as attacks. However, what users think is false positives is false alarms. Typical Case of IDS false
I. Cryptographic
Give the database a random and complex name to avoid being guessed to be downloaded. This method is popular in the past, because everyone is confident in their own code. However, with the error message indicating that the database
By: CaiThis security check has been around for a while, and it has no time to write a manuscript. The specific environment may be forgotten, but the entire process and ideas are still very clear. Because I work in the school's Network Studio after
Intrusion deception is a more active security technology than traditional intrusion detection technology. It mainly includes two types: Honeypot (Honeypot) and honey net (Honeynet. It attracts attackers with unique features, analyzes various attack
To better protect the network from hacker attacks, you must have an in-depth and detailed understanding of the hacker's attack methods, attack principles, and attack processes, only in this way can we provide more effective and targeted active
1. Locate the source of ARP attack
Active locating: because all ARP attack sources have their own features-the NIC is in the hybrid mode. You can use tools like ARPKiller to scan which machine's Nic is in the hybrid mode, this machine may be the
It can be said that if you have a free email, you will have a high chance of receiving spam. In addition to the joint efforts of all parties to deal with spam, for common users, note the following points to prevent spam:① Do not respond to
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.