Yunshu
Now I don't like blogging very much, especially security-related things. However, we often feel uncomfortable with some things. Let's talk a few times today about Party A's security products, which are mainly customized.
Many large Internet
Appendix: Create a method that cannot open or delete files
Take creating a 6618. folder as an example:1. Enter:Md 6618 ../
2. You will find that a 6618. folder is built.
3. This folder cannot be deleted even if it cannot be opened by double-clicking
As you know, you can use the Ping and Tracert programs to determine the target host type. The main use of Ping is to check whether the target host can be connected. Tracert uses the TTL value in the ICMP and IP packet headers to prevent data packets
Affected Versions:
FreeBSD FreeBSD 8.1FreeBSD FreeBSD 8.0FreeBSD FreeBSD 7.3FreeBSD FreeBSD 7.1Vulnerability description:
Bugtraq id: rj77cve ID: CVE-2010-2693FreeBSD is an open source Unix system that runs on Intel Platform and can be used freely.
Source: Hack01 @ Live! Cn
Preface~~~~~~It is a common topic for security personnel to prevent passwords from being obtained maliciously due to complicated password policies. In this article, I will not describe how to crack the system password
Cain & Abel is a free password restoration tool developed by Oxid. it for Microsoft operating systems. Called by the poorL0phtCrack. It has powerful functions and supports NetworkSniffing, Network spoofing,CrackingEncryptionPassword, decode the
1. delete or lock an account
Alter user username lock;
Drop user username cascade;
2. Change the password
Alter user username identified by "password"
3. Restrict the remote login of the database super Administrator
1. Set in spfile
Reg query HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa netservices permission
Nolmhash REG_DWORD 0x1
The hash value of the LAN Manager is not stored during the next password change.
Ox1 is enabled
Ox0 is disabled (2003 by default)
If
With the increasing popularity of the Internet, more and more Internet users are facing a fear. How can we protect the security of hackers on the Internet? Is there no way to be helpless in the face of seemingly unparalleled and powerful "hackers?
In the age when viruses run rampant and horses graze at will, the most talked about by netizens is system damage and viruses invade into the system. To be honest, before each business trip, you should take security measures for the computer of your
Affected Versions:
Linux kernel 2.6.xVulnerability description:
Bugtraq id: rj82cve ID: CVE-2010-0435Linux Kernel is the Kernel used by open source operating system Linux. A null pointer reference vulnerability exists when the Intel VT-x extension
1. Runas commandYou can use the Runas Command provided by the system to start the program with other user permissions. The disadvantage is that you must manually enter the user password. In this case, this method is not applicable. (Use the "Running
Yesterday, I heard that twitter was hit by csrf and only effective under IE8, but I never went into details about the cause. After throwing the link to the hi group, I hid in the corner and watched the black pot and discussed it with pz. After a
Affected Versions:Kingsoft Antivirus 2010.04.26.648
Vulnerability description:
Kingsoft drug overlord is a personal computer security protection software. It integrates powerful functions such as virus detection, anti-virus, real-time monitoring,
What are the secrets of MM hidden in encrypted QQ space and QQ photo albums? View with brute force cracking software? It would be dangerous if you think so, because you will introduce drugs into the room ......
Column stealing software
How can
View Windows file servers with Hacker eyesSecurityWindows File Server plays an important role in the network. They carry sensitive files, databases, passwords, and so on. When the file server goes down, the network is likely to be paralyzed. If they
Affected Versions:Novell eDirectory vulnerability description:Novell eDirectory is a cross-platform Directory Server.
An eDirectory NCP implementation vulnerability exists. Remote attackers may exploit this vulnerability to cause a server crash and
Text/Graph==========================================The news about this vulnerability has been coming out for some time. When I heard this news, I still don't know it. I only know that Microsoft's important API has a vulnerability in cloud. In fact,
A zombie file is a file generated by a computer hacker to attack a large server or a large computer by using a network tool or a self-prepared tool, if a user browses a webpage with the file they have written, your computer will be like a virus.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.