Create mysql to remotely connect to the root user

Author: lone fox prodigal son The following statement has the same permissions as the ROOT user. We should have met each other before. The root user's mysql can only be connected locally and the connection is denied. The following method can help

Adobe temporary vulnerability fix

Reposted from mysterious Xiaoqiang & 1943 Recently, a zero-day Adobe Acrobat Reader vulnerability discovered by foreign researchers has become the target of hacker attacks. According to Dr. Shi Xiaohong, a security expert of 360, some specially

Permission expansion problems

  ByYunshu The previous blogs have been written too long. Today, I want to talk about the problem of permission expansion. This problem also exists in the WEB system, but I only pay attention to network issues here.Most companies use Active

System files and registry key values frequently changed by worms and Trojans

Editor: there are too few articles recently. Let's take a look at them. From the development trend of computer viruses, there are more and more worms and Trojans. Unlike common file viruses that infect executable files, such programs usually do not

Multiple Site vulnerabilities expose critical cloud computing Security Vulnerabilities

As cloud computing has become a hot technical trend, more security black holes are gradually exposed. This exposure is the network security expert Russ McRee, he demonstrated how a security defect of a cloud computing service provider puts many of

There are no two identical "leaves" in the secure "Cloud"

There may be two major differences between cloud security: one is the security of cloud computing technology itself, and the other is the security industry's focus on using cloud computing technology to provide security services. The "Cloud Security"

Three moves to improve the security of FTP servers during use

FTP is a File Transfer Protocol. Sometimes we call it "centralized file communication ". The main purpose of the FTP file server is to provide file storage space for users to upload or download the required files. In enterprises, users are often

Local ajax execution permission problems

Xeye Team Recently, our team is conducting security tests on local Ajax submission permissions for several kernel browsers, including mainstream trident, gecko, and webkit. The test data is a lot messy, and the specific technical details are not

Udev, the most dangerous local security vulnerability in linux history

Author:Subaozi I personally think that the udev vulnerability is the most dangerous local security vulnerability in linux history,Kill the N major versions and sub-versions of N Release versions under the X86 and X64 ArchitecturesThe impact is

The latest method for cracking Internet cafe group policies

Cracking a charging system for abnormal Internet cafes Seeing a friend, because after running the Group Policy, you set "run only licensed Windows Applications", and then leave the Group Policy, you cannot execute any unspecified feasible programs,

Use SQL statements to easily enable 3389

Baishen s blog 3389 logon key registry location: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlTerminalServerDenyTSConnectionsThe key value DenyTSConnections directly controls the Enable and disable of 3389. If the key value is 0, the value 3389

How to disable system hiding, share, and ensure security

To facilitate system management, Windows 2000, XP, 2003, and other systems often enable hidden sharing of some special resources after the system is started successfully, for example, C $, D $, IPC $, admin $, etc. These hidden shared resources do

How to quickly clear Trojans IN THE SYSTEM

What hackers need to do after intrusion is to upload a trojan backdoor. In order to prevent the uploaded trojan from being detected, they will try their best to disguise it. As the victim, how can we detect disguise and clear all Trojans in the

Use WindowZones to create a secure virtual environment for browsers

Various viruses, Trojans, hacker software, and other malicious programs on the Internet all threaten the security of the system. Anti-virus software and firewall are not omnipotent. Therefore, the best way is to place network tools such as browsers

Analysis of JS Trojan Attack and Defense

Website Trojans have now become one of the most important ways for hackers to initiate network attacks. Therefore, it is extremely important to prevent Web security threats. This article will introduce some common JS Trojans and how to deal with

To disable USB devices more securely

Target readers: network administrators and employeesPrerequisites: None Script kiddies: Information security has always included a wide range of aspects. We just keep an eye on the Internet. In fact, it also includes wireless data security, physical

Batch Processing simple fuck usb flash drive NTFS permission anti-virus settings

Copyright:Author: zerosoul (zero soul)Posting time:The original post of the blogger moved from the original Blog to Baidu for permanent retention. Indicate the source for reprinting.   Autorun. inf's USB flash drive Virus Immune method has long been

Prevent hackers from intruding into the Windows system you are using

When hackers intrude into a host, they will try to protect their "labor results". Therefore, they will leave various backdoors on the zombie to control the zombie for a long time, the most commonly used is the account hiding technology. Create a

Use Sniffer for DOS attack traffic analysis

1. Introduction to environment and Phenomena The user's network is an IDC network environment, including LAN and Internet access, where Internet access is two Gigabit Ethernet access, the internal LAN is mostly the game server host sent by the game

Webshell export using select into outfile

Create a table first. Then insert a Trojan. Query and export again. After my experiment, you can export files without creating tables.For example, we enter phpmyadmin, click a database at will, click SQL, and then execute select into outfile d:/xamp/

Total Pages: 1330 1 .... 938 939 940 941 942 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.