15 tips to improve server security

Comments: I always worry about server security, but I don't know where to start? How can we prevent attacks? How is routine server security maintenance secure? I have to submit a ticket or make a phone call for a few things. Isn't it enough time and

Centos 6.5 yum quick upgrade and repair OpenSSL heartbleed Vulnerability

The OpenSSL Heart Bleed vulnerability has been confusing for the past two days. Please read this article to analyze and diagnose the OpenSSL Heartbleed Bug. Currently, we can see that the versions that can exploit this vulnerability are:OpenSSL 1.0.1

How to find IP address conflicts in Linux

You all know what an IP address is, right? They are assigned to devices on the network to represent them. They are allocated through the DHCP server and change frequently. There are two types of IP addresses. The dynamic one will change frequently

Retrieve the phone number that has been lost for half a year

I lost my mobile phone for half a year, so I found it back. The process was tortuous and I could write a story. There are many security-related things, hoping to inspire everyone. Samsung mobile phones have such a good function called "urgent help".

Network Programming-flood attack of Tcp SYN flood

Introduction TCP can establish a connection only after three handshakes: (From wiki) As a result, there was an attack on the handshake process. The attacker sends a large number of FIN packets, and the server responds to the (SYN + ACK) packet, but

Simple Idea of forging an AP (win7 + linux)

Win7 I have seen a friend using backtrack software to forge an ap and then wait for it. However, that system is still difficult for new users who have not used linux. So we should use win7, there is a function that can still meet this requirement.

Shell scripts used to collect hardware information

First, we will introduce a script that yahoo once used to collect hardware information. You can view and download hwconfig here. It is executed on one of my systems as follows:View Code BASH 12345678910111213141516171819 [root@jay-linux

Set iptables rules for Centos Web server security

Recently, due to the problem of a centos website server, you have been constantly searching for centos security information. Below is a common iptables rule: IPT = "/sbin/iptables"$ Ipt-delete-chain$ Ipt-flush$ Ipp-input DROP #1$ Ipt-p forward

Check which ip addresses crack your ssh password and the number of times

On the Internet, there are always boring people who constantly guess the passwords of others' servers every day! As the administrator of a linux server, we should know which IP addresses are constantly scanning our SSH ports to try brute force

Shd_config ssh Security Settings

1. allow only one IP address to log on and reject all other IP addresses.Write in/etc/hosts. allow:Sshd: 1.2.3.4Write in/etc/hosts. deny:Sshd: ALL iptables can also be used:Iptables-a input-p tcp -- dport 22-j DROPIptables-a input-p tcp -- dport

Six tricks to easily reinforce your CentOS System

Redhat is currently the most popular type of Linux in enterprises, and more hackers are attacking Redhat. How should we reinforce the security of such servers? I. account Security 1.1: run the command # cat/etc/passwd # cat/etc/shadow to check the

Ruby OpenSSL Private Key forgery script

Some time ago, openssl heartbleed surprised us for a few days.  From user data leakage to products around OpenSSL, from server to client, from https Private Key leakage to openvpn, openssh, sftp and other private key leakage. We can't do anything in

Injection and repair of bypass filtering somewhere in Thinksaas

The filtering of added tags is lax. Today, I got the latest version of thinksaas and looked at the security issues after xfkxfk burst. However, many of them are still not filtered. Xfkxfk blew up app/tag/action/add. php. I saw the vulnerability file

Write abnormal PHP backdoors (non-alphanumeric)

In this article, I will show you how to write a PHP backdoor with non-alphanumeric characters. When writing such PHP backdoors, we first need to understand some basic knowledge: (1) Understanding PHP (2) to understand curl or other tools that can

Use the H2 database management system to perform HQL blind injection on REST APIs

H2 is a short and lean embedded database engine. Its main features include: free, open-source, and fast embedded database servers. It supports clusters (Subject: I don't know who will use such databases as clusters) provides JDBC and ODBC access

Information of users/employees on the free network under the chain home is completely leaked

One interface has no permission control and can obtain all information of any employee or tenant. All information includes email, mobile phone number, ID card number, home address, marital status, job (employee), company, security questions, and

Sina saepythontip execution without using the sandbox mechanism causes code Leakage

In the online execution of pythontip, you can obtain the program source code and program configuration. pythontip online programming does not shield many functions in the OS module, nor prevent open from reading file content, leading to source code

Password modification for some users of Huawei online storage

Some users of Huawei online storage can modify their passwords for users bound with mobile phone numbers (users can bind mobile phones in their settings after registration). This attack does not need to know the target mobile phone number, you only

SSH penetration Techniques

Use tips as the rookie administrator. 1. After the intrusion is obtained by SHELL, the firewall of the other party has no restrictions and wants to quickly open an SSH port that can be accessed Execute on Broilers  mickey@vic:~# ln -sf

Xss fragmentation Guide

This article is my two-day study notes shared and shared with you. Knowledge is scattered, but for people with a certain JS base, every small knowledge will help broaden your Hack perspective. First, I declare that this article is only the tip of

Total Pages: 1330 1 .... 879 880 881 882 883 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.