Windows Security Configuration Rules

I. Physical Security The server should be placed in an isolated room where the monitor is installed, and the monitor should keep the recording records within 15 days. In addition, the chassis, keyboard, and drawer should be locked to ensure that the

Screen Door warning: Computer "bath" every day to prevent privacy from getting a glimpse

Source: huashang daily Recently, the "yanzhaomen" incident has become a hot topic for many people, and these indecent photos in the "yanzhaomen" are said to be leaked when Edison Chen handed over his laptop to a computer company for repair. In the

How to deal with ARP spoofing attacks

My biggest concern as a company network administrator is the Internet access to employees' computers or servers. After all, many applications and services are built on network connectivity. Network Attacks are also the main cause of network

Use SSH to protect your VNC connection

Translated by Huang yongbing: BKJIAVNC stands for Virtual Network Computing. It is a remote control software, you can use the VNC Viewer on a computer to view and interact completely with another desktop computer on the local LAN or the Internet.

Principles and prevention of Google intrusion (1)

Today, we will share with you another feature of Google: using search engines to quickly search for vulnerable hosts and sensitive data, you can even directly intrude on dummies. Use google for "penetration testing" Today, penetration testers often

Three tricks and two tricks to cleverly prevent computers from being maliciously attacked

Source: CCID After 1990s, human society entered the network age, and information sharing became the most basic feature of the network age. Information security is mainly embodied in network-oriented information security. So what protection should

Attack and defense strategies in LAN

During the informatization process, large and small enterprises have built local networks to meet the needs of sharing resources, collaborative work, and mobile office. Network administrators also pay great attention to network security, but they

Batch Processing self-starting resident simple application

Original starter: hacker alert line Author: Xiaoli I have read an article in the past-"backdoor that will never be scanned and killed", and use batch processing programming. The idea is okay. Every time it takes a while, it will automatically

Principles and defense of ADSL account cracking

Source: CNET China-PChome. net With the popularization of networks, network security has become more and more important. Today, we will introduce a very rare case. I hope you can improve your security awareness! Everyone should know that many cats

Recognize the malicious code on the web page and teach you how to deal with it

On the web page, we often encounter various malicious code. How should we take targeted preventive measures? 1. Computer prohibited Symptom Description: although the network hooligans do not use this trick much, once you make a move, the

How to clear the Trojan horse?

Nowadays, the spread of Trojan viruses is increasingly concealed, making it difficult for many users. Especially for a web game Trojan, if not controlled, it will bring a devastating disaster to this online game. Recently, a trojan was launched for

Five security considerations for end users

Author: Legend: BKJIAYesterday, a friend called me and said that their computer could not be connected to the Internet, and the Administrator was on a business trip these days. After I arrived at their unit, I found that there was no problem with

Summary of common online game account theft Methods

In the online gaming world, a player with the best equipment and an advanced account does not know how much money, effort, or sleep is required. The feelings they pour on cannot be measured by money. Therefore, the most worrying thing for players is

NTFS data streams and web Security

| = -------------------------------- = || = --------- = [NTFS data stream and web security] = --------- = || = -------------------------------- = || = ------------- = [By 80sec] = ------------ = || = ------ = [Xy7@80sec.com & jianxin@80sec.com] = ---

Sany's network administrator browsed confidential information of his colleagues

According to foreign media reports, 1/3 of IT staff members abused the permissions of network administrators to view confidential information unrelated to work, such as colleagues' salaries, personal emails, or board meetings. Cyber-Ark, an

Detailed analysis of hidden trojans on the home page of codoy music + 72 horses

Author: yimikeSource: jianmeng Recently, some friends reported that the home page of codoy music was infected with Trojans. The strange thing is that only when the page is accessed for the first time, the trojan will be reported when the software is

Five manual operations

How can we stand alone in the face of the increasing threat of rogue software? I'm afraid this will be a concern for every online user. It is not ruled out that experienced users will use some well-known anti-rogue software to scan and kill

New tutorial Trojan defense full strategy

Check Registry Has your computer been installed with a Trojan? How to detect? 1) check the registry. Check all the key-value names starting with "Run" under HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ Curren Version and HKEY_CURRENT_USER \

Analysis of common methods for Network Information Risk Assessment

Author: NetlinkingMultiple operation methods can be used in risk assessment, including Knowledge-based analysis, Model-based analysis, and Qualitative) in either case, Quantitative analysis aims to identify the risks and impacts of the

Effective server setting to prevent web intrusion

Since our defense is from the perspective of intruders, we need to first know the intrusion methods of intruders. Currently, the most popular web intrusion methods are to obtain the website's webshell first by looking for program vulnerabilities,

Total Pages: 1330 1 .... 928 929 930 931 932 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.