Security Configuration NT/2000 SERVER (IIS)

If the WIN2000 SERVER is correctly installed, the system still has many vulnerabilities and requires further configuration. 1. Port:A port is a logical interface connecting a computer to an external network and the first barrier of a computer.

Use the Bat file to customize the intrusion detection script

The following is a reference clip:Time/t> IIS-Scan.logFind/I "character to be searched" C:/WINDOWS/system32/LogFiles/Httperr/*. *> IIS-Scan.log   The above Bat can easily find the intrusion data in the IIS 6.0 log file.We all know that IIS on

No fear of hackers using security restart to delete Hxdef Backdoor

Hxdef is a backdoor that hides processes, registries, links, and files. After running Hxdef, you cannot use the task manager to view the processes and registries.The author also introduced the golden version of Hxdef, which is said to be able to

Attack and Defense in penetration testing

The Penetration Test (Penetration Test) fully simulates possible attack technologies and vulnerability discovery technologies used by hackers. It thoroughly detects the security of the target system and finds the most vulnerable part of the system.

Use Netstat to check who is playing tricks in my Linux

As a Linux administrator, the first step in security defense is to know which services are running in the system. The Administrator's important responsibilities should include checking whether the service is authorized and identifying services that

Computer Security Basics Disable Windows automatic playback

Nowadays, more and more viruses are spreading through the automatic playback function of the system. If the automatic playback function of the system is disabled, a transmission path of the virus Trojan is cut off. 1. Use the Group Policy Editor

IFEO hijack (image hijacking)

Yesterday, I encountered a computer where many exe files could not be opened, but anti-virus software and many normal exe files could not be opened.Then, each disk contains an English-digit hidden exe and an autorun. inf. Even if it is deleted, it

How to securely access databases for Web users

Allowing Web users to access the database is a very fine-grained task and requires careful consideration. TechRepublic member E Spigle recently raised the following question on Q & A forum of TechRepublic Technical: We are working on a job to

Protect your computer and hide your account.

What are the characteristics of the most hidden system backdoors? First, the system must be powerful and fully controlled. Second, the system should be concealed. Attackers can bypass antivirus software. Are there any such backdoors? The answer is

Create SQL Server2000 security policies

Microsoft has established a flexible and powerful security management mechanism that comprehensively manages the security of user access to the SQL Server system and database. As described in this article, you can create a flexible and manageable

Role of img tags in Security

Source: LoveshellWell, there are too many things... the previous questions about xsrf and portscan are ignored silently. Yesterday I saw a very interesting one. Hey, can you detect the installed software? By the way, the res protocol is used to

Introduction to common encryption systems

The encryption system has three basic deployment directions: storage, transmission, and authentication. Because the Internet is not a trusted transmission channel, there may be various threats, such as listening, interception, and malicious

Trojan defense techniques-Wincfg and Svhost backdoor Removal

Manual cleanup: Before cleanup, set "show all files" and "Hide protected operating system files" in the folder options ". (1.exe clear svchost.exe Svchost.exe in windowssystem32is a normal system program. If svchost.exe is found in the Windows

Resolve false alerts, false alerts, and security management of IDS

Currently, the biggest criticism of IDS is false positives. Technically, false positives mean that detection algorithms treat normal network data as attacks. However, what users think is false positives is false alarms.    Typical Case of IDS false

Four security methods for Access Database

I. Cryptographic Give the database a random and complex name to avoid being guessed to be downloaded. This method is popular in the past, because everyone is confident in their own code. However, with the error message indicating that the database

[Attack and Defense notes] One twists and turns Security Detection

 By: CaiThis security check has been around for a while, and it has no time to write a manuscript. The specific environment may be forgotten, but the entire process and ideas are still very clear. Because I work in the school's Network Studio after

Anti-Black blocking Intrusion Detection-Honeypot and honey Network

Intrusion deception is a more active security technology than traditional intrusion detection technology. It mainly includes two types: Honeypot (Honeypot) and honey net (Honeynet. It attracts attackers with unique features, analyzes various attack

Hacker attack features and counterattack Technology

 To better protect the network from hacker attacks, you must have an in-depth and detailed understanding of the hacker's attack methods, attack principles, and attack processes, only in this way can we provide more effective and targeted active

How to locate ARP attacks?

1. Locate the source of ARP attack Active locating: because all ARP attack sources have their own features-the NIC is in the hybrid mode. You can use tools like ARPKiller to scan which machine's Nic is in the hybrid mode, this machine may be the

Anti-Spam technology: Nine Ways to say goodbye to spam

 It can be said that if you have a free email, you will have a high chance of receiving spam. In addition to the joint efforts of all parties to deal with spam, for common users, note the following points to prevent spam:① Do not respond to

Total Pages: 1330 1 .... 654 655 656 657 658 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.