Online hacker tracking

1. When I checked one of my machines yesterday, I accidentally discovered that someone had intruded into my machine. In fact, it was my own mistake and I did not patch wuftpd26,Without modifying/etc/ftpusers, the remote vulnerability wuftpd26 was

15 tips for protecting IIS

Generally, most Web sites are designed to provide visitors with instant information access in the most acceptable way. Over the past few years, more and more hackers, viruses, and worms have brought serious security problems that have severely

Norton exposed Security Vulnerabilities arbitrary download and run malicious code

According to a warning issued by the cyber security website, Norton AntiVirus, a well-known software of Symantec, has a security vulnerability, which causes its automatic protection function to be disabled.Norton AntiVirus is an Internet security

Modify the Registry to improve Win2000's ability to defend against DoS Attacks

Starting from a correct view of DoS and DDoSI believe everyone will not be unfamiliar with these two terms. Yes, Denial of Service and Distributed Denial of Service ).The so-called denial-of-Service refers to the fact that after a specific attack,

Prevent SQL command placement attacks

What is an SQL command implant attack?When designing or maintaining websites, you may worry that they will be maliciously attacked by some mean users. Indeed, there are too many discussions about the security of the operating system platform or Web

Build a virtual host from FSO threats

Currently, most virtual hosts disable the standard ASP Component FileSystemObject, which provides ASP with powerful file system access capabilities, you can read, write, copy, delete, and rename any files on the server's hard disk (of course, this

Allow mysql to be remotely connected

1. AuthorizationGRANT select, insert, delete, update ON mydb. * to tan IDENTIFIED by 123456; 2. open the port1) disable the FirewallChkconfig iptables offService iptables stopOr2) modify the/etc/sysconfig/iptables file and add-A RH-Firewall-1-INPUT-

In-depth exploration of Windows Script Technology

Http://www.ph4nt0m.org2004-11-18------------------------------------------------------- To make the Code involved in this article clean and tidy, the PHP tag of the Forum will be used for processing. (No VBS label, code label is not easy to use,

Script attack prevention policies

Author: swordsSource: ColorWolf: Swords Reference: -------------------------------------------------------------------------------- Recently, Web SQL Injection attacks, JS scripts, and HTML scripts appear to be more intense. many websites are

Ten types of passwords cannot be used

In the era when information technology is widely used, passwords have become the main means of identity authentication, but some passwords cannot be used.1. The password is the same as the user name. For example, the username and password are both 12

Some technical knowledge about Linux Intrusion Detection

1. Do not record history after logging on to ssh Unset history histfile histsave histzone history histlog; export HISTFILE =/dev/null; export HISTSIZE = 0; export HISTFILESIZE = 0 2. Some evil uses of sed It is an evil replacement to the logon IP

Case study of Penetration Testing

 A long time ago, when I used the ipc password as the main method, I saw a small manual on the black cover, which contains a very classic article, the general idea is "if it is difficult to crack the ipc password on the xxx website, you can first

MySQL Command for viewing user permissions

If you can use the navicat tool to connect to MySQL, It is very convenient to view User Permissions and modify user permissions. However, in many cases, MySQL only allows access from localhost. In this case, you can only use commands. Previously,

Cross-origin hazards caused by the MHTML protocol in IE

rfc

Author: dark night potential Baidu hi: d4rkwind Email: mere@vip.qq.com Site: http://hi.baidu.com/d4rkwind/ Directory 0 × 00 background... 1 0 × 01 MHTML. 1 0 × 02 Cross-origin POC. 2 0 × 03 security questions... 4 0 × 04 in-depth exploitation... 4 0

Collection and preliminary analysis of malware

Previously, we introduced the basic skills in vulnerability exploitation and reverse engineering, and now we will use these technologies to explore malware. As a moral hacker, sometimes we need to examine malware, identify its dangers, and try to

Necessity and security of Virtualization

Yunshu Many companies are engaged in "cloud computing", but most of them begin With virtualization to reduce risks. Because there are a series of open-source virtualization projects, such as Xen, which can be used as an enterprise-level management

IIS7.0 malformed Parsing Vulnerability kills 0 days and fixes

IIS7.0 malformed parsing 0-Day Killer vulnerability, the same as Nginx's last 0-day vulnerability. Note that iis7.0 is used. Temporary solution: Disable cgi. fix_pathinfo to 0.Nginx seems to have crashed on another 0day. In windows, you can view and

SQL Server 2000 database security tips

1. Use a robust and secure password policyThe passwords of many database accounts are too simple, which is the same as the system password. Do not write the sa account password in an application or script. Robust passwords are the first step to

Find the terminal port under cmd

Terminal:Step 1: Tasklist/SVC lists all processes, system services, and their corresponding PID values!The service name of the terminal is TermService.Step 2: run the netstat-ano command to list the PID values of all ports!Find the port

No JS clipboard hijacking

Pz Bdo Proof of Concept Www.bad.com/lmth.php? /Moc. oof. www //: ptth Browser Support The bdo label can be used to customize the text display direction. However, this attribute is ignored during text

Total Pages: 1330 1 .... 949 950 951 952 953 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.