Improvements to the Windows Server PKI that administrators should know

Public Key Infrastructure promotes various departments in the security industry to maintain and improve all aspects related to PKI technology. From the root certificate authority to the X.509 certification, it proves the success in protecting the

How to configure safe php environment parameters in PHP. ini

Security Configuration 1 (1) enable the Security Mode of php is a very important embedded security mechanism that can control some php functions, such as system (), at the same time, many file operation functions are subject to permission control,

Ou Peng's mobile browser is not strictly restricted, leading to leakage of sensitive user data

When sending a request to the openg browser to open a page, you can obtain all the data under the openg browser, including cookie information, without being root. after stealing the information, you can send it to a remote server. You can use an app

Learn how to perform penetration test VPN and Vlun VPN

The author of VulnVPN has created http://www.rebootuser.com/, which is a very good tool. Our goal is to obtain root access to the VPN Server. This article will take you through every step of the entire process. Set VulnVPNAnd Backtrack VulnVPN

Some practical methods for Iptables

In our daily O & M work, Iptables is often used to set IP information packet filtering and firewall configuration. First, the Iptables configuration file is/etc/sysconfig/iptables, all rules must be written to this file. Otherwise, it will become

Chatting about bypass AV

Kid paper. Don't worry about AV ~ The AV mentioned here is AntiVirus. That is, kill software. (These days the exam is heavy and even less ..)This article briefly introduces the commonly used kill-free tools and their usage ~0x00 HyperionFirst, let's

Network security without compromise-Comparison Test of CNW evaluation lab NGFW

This next-generation firewall horizontal test, designed by the testing lab of the online world, aims to verify whether the next-generation firewall can not compromise security and performance after several years of development, effectively protects

'9day' backdoor virus Behavior Analysis

This virus is a virus that users need to pay attention to as mentioned in the rising Website Security weekly. This article analyzes the behavior of this virus in detail. The virus is bound to a malicious Word file. After the virus runs, it modifies

Malicious sample search

By Kungen @ CyberSword To search for a malicious sample, you must first know the basic information required to search for the sample, includingVirus name,Sample file name,HASH Value. For the latest detected virus,SECURELIST,VirusTotalThe website

Break through the 8 Signs Firewall pony

The server is equipped with the 8 Signs Firewall. PHP, ASP, and ASPX cannot be used by many pony horses. Therefore, BS horses are recommended here... Pony receiver :-------------------------------------- ---------------------------------------------

TrueCrypt usage experience [4]: usage and precautions for hiding volumes

A while ago, I was very busy and had some things during the 11 th holiday. As a result, I did not send a blog post or reply to the reader's message for more than 10 days. Many enthusiastic readers thought I was cross-province. Today, I quickly

New kitchen knife Modification

Step 1: Shell check The compiler and the compressed file are UPX shells.Step 2: ShellingTake off the tool directly.Step 3: Load olldbg1. Go to the data window in the lower right corner. Right-click-search-paste base64_decode ($ _ POST [z0]) to the

[Hdusec ctf] Reverse Analysis Final

This is a tough topic in the information security competition (hdusec ctf) of Hangzhou University of Electronic Science and Technology. After running the program, the computer is automatically shut down. If the computer is directly tested on a real

Cracking and repair of a college campus card amount Verification Algorithm

The primary card is a Mifare Classic card, not an original card. Its encryption is simple and all card keys are the same. You can modify the amount by using this vulnerability and consume it on campus !! You can use the mobile phone as the read key

Protection of public documents based on watermarks and electronic signatures

By Suikaly Hanzi Leo @ CyberSword Two tools: Office 2010, Adobe Acrobat Pro X (Acrobat ReaderNo) Two steps: (1)InDOCAdd a watermark and an electronic signature to the document.DOCSavePDF (2)SetPDFAccess permission I.Add a watermark and an electronic

Discuz! A full version of chicken ribs CSRF

I didn't expect that Discuz still had the csrf quota. During the test, I found that basically all requests had parameters such as token to prevent csrf, but I still found one and shouted. Rewards for general purposes! Kill all versions !~ I have to

Fluxbb has PHP local file inclusion

File: install. php // If we've been passed a default language, use it$install_lang = isset($_REQUEST['install_lang']) ? pun_trim($_REQUEST['install_lang']) : 'English';// If such a language pack doesn't exist, or isn't up-to-date enough to translate

[Penetration note _ guangwai Security Group] (5)

The penetration test notes are mainly short but excellent penetration tips, designed to share your learning experience with your friends. To ensure quality, each article contains about 20 pieces of penetration notes. 1. A little trick to keep your

Establishment of a simple automated code audit Platform

How can I build an automated code audit task in a short time? The quickest and most effective way to think of it is to find an existing best open-source callable tool for secondary development. My former colleague mm card tried all the code auditing

How can I find the available input points?

This is not an article about technology, but an attempt of open thinking. It mainly focuses on how to find available input points when filtering input. In essence, to perform xss attacks, you only need to find an unfiltered Input Point. The input

Total Pages: 1330 1 .... 888 889 890 891 892 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.