Party A's Security Products

Yunshu Now I don't like blogging very much, especially security-related things. However, we often feel uncomfortable with some things. Let's talk a few times today about Party A's security products, which are mainly customized. Many large Internet

Create and delete folders with dots

Appendix: Create a method that cannot open or delete files Take creating a 6618. folder as an example:1. Enter:Md 6618 ../ 2. You will find that a 6618. folder is built. 3. This folder cannot be deleted even if it cannot be opened by double-clicking

How to cheat hackers

As you know, you can use the Ping and Tracert programs to determine the target host type. The main use of Ping is to check whether the target host can be connected. Tracert uses the TTL value in the ICMP and IP packet headers to prevent data packets

FreeBSD mbuf Local Privilege Escalation Vulnerability and security fix

Affected Versions: FreeBSD FreeBSD 8.1FreeBSD FreeBSD 8.0FreeBSD FreeBSD 7.3FreeBSD FreeBSD 7.1Vulnerability description: Bugtraq id: rj77cve ID: CVE-2010-2693FreeBSD is an open source Unix system that runs on Intel Platform and can be used freely.

Analysis and defense of passing hash intrusion technology

Source: Hack01 @ Live! Cn Preface~~~~~~It is a common topic for security personnel to prevent passwords from being obtained maliciously due to complicated password policies. In this article, I will not describe how to crack the system password

Cain-C sniffers

Cain & Abel is a free password restoration tool developed by Oxid. it for Microsoft operating systems. Called by the poorL0phtCrack. It has powerful functions and supports NetworkSniffing, Network spoofing,CrackingEncryptionPassword, decode the

Oracle reinforcement experience

1. delete or lock an account Alter user username lock; Drop user username cascade; 2. Change the password Alter user username identified by "password" 3. Restrict the remote login of the database super Administrator 1. Set in spfile

The new sogou input method has fixed multiple security vulnerabilities.

[Vulnerability No.]CAL_20100625-1 CAL_20100625-2 CAL_20100625-3 [Affected versions]Sogou_pinyin_50f or earlier [Announcement] Hanhai source code audit lab found multiple high-threat security vulnerabilities in the sogou Pinyin input method, which

Location in the LM registry of the Local Security Policy

Reg query HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa netservices permission Nolmhash REG_DWORD 0x1 The hash value of the LAN Manager is not stored during the next password change. Ox1 is enabled Ox0 is disabled (2003 by default) If

Network security protection for hackers

With the increasing popularity of the Internet, more and more Internet users are facing a fear. How can we protect the security of hackers on the Internet? Is there no way to be helpless in the face of seemingly unparalleled and powerful "hackers?

Listen to hackers telling you about security

In the age when viruses run rampant and horses graze at will, the most talked about by netizens is system damage and viruses invade into the system. To be honest, before each business trip, you should take security measures for the computer of your

Linux kernel 2.6.x KVM Intel VT-x extension NULL pointer reference Denial Of Service Vulnerability and repair

Affected Versions: Linux kernel 2.6.xVulnerability description: Bugtraq id: rj82cve ID: CVE-2010-0435Linux Kernel is the Kernel used by open source operating system Linux. A null pointer reference vulnerability exists when the Intel VT-x extension

Solution to program running failure due to insufficient User Permissions

1. Runas commandYou can use the Runas Command provided by the system to start the program with other user permissions. The disadvantage is that you must manually enter the user password. In this case, this method is not applicable. (Use the "Running

Cross-origin problems caused by CSS like IE8

Yesterday, I heard that twitter was hit by csrf and only effective under IE8, but I never went into details about the cause. After throwing the link to the hi group, I hid in the corner and watched the black pot and discussed it with pz. After a

Kingsoft drug overlord KAVFM. sys Driver IOCTL Processing Kernel Buffer Overflow Vulnerability and repair

Affected Versions:Kingsoft Antivirus 2010.04.26.648 Vulnerability description: Kingsoft drug overlord is a personal computer security protection software. It integrates powerful functions such as virus detection, anti-virus, real-time monitoring,

Be careful! Hackers cannot crack the QQ password.

What are the secrets of MM hidden in encrypted QQ space and QQ photo albums? View with brute force cracking software? It would be dangerous if you think so, because you will introduce drugs into the room ......   Column stealing software How can

What do hackers think about Windows File Server Security?

View Windows file servers with Hacker eyesSecurityWindows File Server plays an important role in the network. They carry sensitive files, databases, passwords, and so on. When the file server goes down, the network is likely to be paralyzed. If they

Novell eDirectory malformed index value Remote Denial of Service Vulnerability and repair solution

Affected Versions:Novell eDirectory vulnerability description:Novell eDirectory is a cross-platform Directory Server. An eDirectory NCP implementation vulnerability exists. Remote attackers may exploit this vulnerability to cause a server crash and

Analysis of Microsoft CFileFind: FindFile function Overflow Vulnerability

Text/Graph==========================================The news about this vulnerability has been coming out for some time. When I heard this news, I still don't know it. I only know that Microsoft's important API has a vulnerability in cloud. In fact,

Detailed introduction to the principles and cleanup methods of system zombie files

A zombie file is a file generated by a computer hacker to attack a large server or a large computer by using a network tool or a self-prepared tool, if a user browses a webpage with the file they have written, your computer will be like a virus.

Total Pages: 1330 1 .... 943 944 945 946 947 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.