Technical Principles and suggestions of Network Security Scanning

Abstract: With the rapid development of the Internet, network intrusion is becoming increasingly serious, and network security has become a concern. Network security scanning technology is one of the important technologies in the network security

The local area network is completely protected against lightning attacks.

High efficiency and security are one of the main theme of LAN device operation. However, when talking about LAN security, most people will focus on network anti-virus and network attack prevention, few consider that lightning strikes or inductive

Protect privacy and enable mainstream chat tools to achieve encrypted chat

Source: Skynet A piece of news came out a few days ago. A white-collar person from a bank in Shanghai was forced to resign from his job with a monthly salary of more than 30 thousand yuan because his colleagues knew his privacy during the chat. This

Clone account FAQs

FAQs and answers:1. When using ca, why does connect **. **... Error occur?A: ca and cca need to enable ipc $ for the target. Please confirm that you can establish ipc $ with the target. See "about ipc $ and NULL connections"2. When using ca, why

Introduction to password cracking and defense methods

Source: Skynet Let's study some solutions to analyze how attackers initiate attacks and how to stop or prevent them. I will first describe two solutions involving internal attacks (that is, attacks initiated within the Organization), and then study

Network Management note-Please completely modify port 3389

Many network administrators who manage servers on Windows platforms know that maintenance servers need to be executed remotely. Some use pcanywhere, and some use 3389 remote connectors provided by Microsoft. However, after using the modified port,

No administrator password, serious consequences

Few people may have noticed this. The system has internal and user-created accounts. take WinXP as an example. During system installation, the installer creates two accounts, Administrator and Guest. The previous account has the maximum permissions

Password cracking speed: 6-digit minimum security Disclosure

LockDown.com recently announced a "time list" for obtaining passwords using brute force letter cracking ". The list contains the password length, number of combinations of passwords, and attack mode. From the list, we can see that if you use a dual-

Reject DDOS attacks

Author: no double badOn the evening of New Year's Eve, some well-known technical sites in China were unable to enter, and some people were rumored to have been suffering DDOS attacks. I am not very clear about the specifics. Now this article serves

Four tips to learn Security

Compared with LAN users, General dial-up Internet users are often at a disadvantage in preventing hacker intrusion. A stolen account can be used by hackers as a springboard to engage in network damage activities. The following methods help dial-up

Discussion on security scanning software

Security Scanning detects the security of computer systems or other network devices to identify security risks and vulnerabilities that can be exploited by hackers. Obviously, security scanning software is a double-edged sword. Hackers use it to

Description of Logon verification problems caused by severe mysql compilation Vulnerabilities

Www.2cto.com: published in MarchTwo days ago, mysql cracked a serious issue of compilation vulnerability login verification.Affected Versions:All MariaDB and MySQL versions up to 5.1.61, 5.2.11, 5.3.5, 5.5.22 versions. MariaDB versions from 5.1.62, 5

An accidental "anti-Black" Experience

In the morning, I received a call saying the server was hacked and sent spam. The first thing that comes to mind is that the server password is cracked and then sendmail is called to send an email. For guesses: 1. First, locate port 25 and disable

Penetration-password cracking (password cracking methods in password cracking)

Preface: Recently, I have been busy with projects. I have said that I am tired of serving Party A. In a word, If Party A is satisfied with the smooth payment of the contract, it is the final goal. Just now, a project is coming to an end, the user

In windows, you can simply set it to prevent illegal users from logging on to terminal 3389.

1. Open the xp Security Tab Method 1: 1. Click start, and then click my computer ".2. On the Tools menu, click Folder Options, and then click the view tab.3. In the "Advanced Settings" section, clear the "use simple file sharing (recommended)" check

How to save Host ids ossec log files to MYSQL

OSSEC as a hostIDSWithROOTKIT check, exception detection, automatic response, file tampering prevention and other important functions, and open source, free of charge. OSSEC is now available in version 2.7.1RC. For more information, see WWW. OSSEC.

Netease temporary server intrusion detection and repair solutions

The test was inspired by port 123.125.48.57 443, which is a front-end controller of Huawei HMM Web 1.0. 1. First, the default account and password logon attempt failed. 2. The SSH port 22 was opened, and the brute-force password was weak. root qwer12

Linux/Centos server ssh Security Settings

The Internet is very dangerous. As the door to the server, ssh must be well configured for security. I have tested that A VPS enables the ssh service to listen to the default port 22. A few days later, the secure diary split up more than 10, the

Personal insights on mobile app security

For mobile application security, we recommend you read the latest carbon matrix summary ppt: http://www.bkjia.com/ebook/201212/35836.html. This article is a systematic perception of some personal amateur studies.I. AboutAndroidDecompilation of

IOS security defense (I): Essential commands and tools for Hack

HackEssential commands and tools  Your application is being reverse engineered, tracked, and operated by other competitors! Is your application still bare-handed without defense?I solemnly declare that we know how to defend against attacks.

Total Pages: 1330 1 .... 913 914 915 916 917 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.