On social engineering

Author: lost blog: lost.cq.cn from www.2cto.com reprinted please indicate the source Respect others and respect yourself. Please do not trample on your personality because of a small article in the district. Thank you for your support, understanding,

Discussion on public SMS interface Security

A long time ago, this kind of stuff was written by the author. The combination of theory and practice is a good article. /Empty heart Websites send text messages to users, which is already a popular element. Almost all major portal websites have the

Comprehensive defense against SYN Attacks

Abstract: This chapter only introduces some main aspects of hacker attacks at the basic layer, such as understanding the types and methods of hacker attacks, port and vulnerability scanning, and the TCP protocol for DoS attacks in Windows

DenyHosts blocks SSH Brute force cracking

RainyFox My server has countless SSH failure attempts every day, and some boring people keep scanning. These people are really boring, and they are full of food, I have been looking for some software to scan the website, so we need to remember to

Development and Future: cloud security technology Decomposition

For computer users, the threat of viruses is becoming more and more serious, especially when the Internet is becoming increasingly popular. More seriously, the growth of viruses and malware on the internet is astonishing, according to the latest

How to Prevent Windows from saving in Active Directory and local SAM Database

Windows 2000-based servers and Windows Server 2003-based servers can authenticate users connected to computers running all earlier Windows versions. However, in versions earlier than Windows 2000, Kerberos is not used for authentication. For

Security experts: URL vulnerabilities cannot be ignored

Some time ago, the public security department cracked a case where a program of a network company was stolen and analyzed that the main problem was the URL Vulnerability. Test whether the program has a URL Vulnerability. The simplest method is to

Delphi --- Virus. Win32.Induc. a [Anti infection solution]

; Delphi --- Virus. Win32.Induc. a [Anti infection solution]; By: ZzAge; BBS: http://www.52pojie.cn; Blog: http://hi.baidu.com/zzageRecently, this virus has ignited. A lot of formal software written by delphi won the prize ....Infected with the

High-risk cases caused by IIS startup

In windows hosts, we generally pay more attention to iis security. For example, this is the door in our room. Most of the incoming and outgoing requests are from here. Here we describe the security issues of iis startup users. In a secure web site

3389 terminal port operation command

1. query the terminal portREG query HKLMSYSTEMCurrentControlSetControlTerminal "" ServerWinStationsRDP-Tcp/v PortNumber 2. Enable the XP & 2003 terminal serviceReg add HKLMSYSTEMCurrentControlSetControlTerminal "Server/v fDenyTSConnections/t

In the past 25 years, hackers have used four methods to crack passwords.

51cto Of course, we will try our best to protect the security of passwords, such as increasing the length of passwords, using complex syntaxes, and special characters. This will indeed help increase the security of passwords, these methods often

Five things you should know about security in Windows 7

Microsoft said that Windows 7 is the safest version ever developed by the Windows operating system. This is no big deal, right? I'm pretty sure that in the past 15 years, Microsoft has claimed this for every Windows version. Of course, this is also

Use BackTrack to check Linux Security Vulnerabilities

Whether you have used the Bastille UNIX tool to manually harden your Linux system or want to take a snapshot of the current system status, you need to use BackTrack. This is a Slackware-based Linux version that runs by starting a CD or a virtual

Cold-eye cloud detection and removal

Note: Sometimes, the law of conservation of physical energy also applies to today's new network technologies. Note: Reprinted please indicate copyright http://a1pass.blog.163.com/A1Pass   With the free anti-virus concept launched in 360, the cloud

Penetration sniffing in Linux

In terms of attacks, Intranet penetration tends to be a combination of social engineering and conventional Vulnerability Detection. In order to understand the setting of protection measures within the network, it is achieved through step-by-step

7 server security maintenance skills

Is there any important data on your server that cannot be made public at will? Of course? Recently, servers have suffered a particularly high risk. More and more viruses, malicious hackers, and commercial espionage all target servers. Obviously,

Windows + apache Virtual Host Security Settings

Windows:1. Enable the security mode. You can disable functions such as exec () and system ().2. Use php_admin_value open_basedir in httpd. conf to restrict PHP access directories.3. In php_admin_value open_basedir, do not forget to add the php

Network Architecture and Access Control

I have always hoped to learn something from others' lessons and try to avoid falling in the place where others have fallen. Today I have gained a long understanding. A company's O & M management has done a good job. It has built a management private

Put a stable and complete disk restoration code 2k-win7 (plus Analysis)

Author: dbgger  After N changes, it has been very stable. To the person on use, put it in the hard disk, it will only make him long hair.Detailed introductionHttp://www.dbgger.com /? T = project > 2000 xp 2003 vista win7> Do not generate any

How to handle Sniffer attacks with ease

Sniffer attacks are based on network sniffing technology. These attacks are favored by hackers because of their strong concealment. If an Sniffer attack is successfully applied, the harm to the enterprise is very high. Enterprise information data

Total Pages: 1330 1 .... 942 943 944 945 946 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.