How to identify computer viruses by name

Many times, you have used anti-virus software to find out your own machine, such as Backdoor. rmtBomb.12, Trojan. win32.SendIP. 15. Wait for a string of virus names with numbers in English, and some people will be disconnected. How can I know what

Remote Analysis of IIS settings

  When talking about the security of Microsoft's IIS web server, many people will immediately think of the fatal Vulnerabilities: UNICODE, CGI parsing,. ida, idq,. Printer remote overflow, etc. These great vulnerabilities may be my scripts Kidding

IIS Web server security reinforcement steps

IIS Web server security reinforcement steps: Procedure Note: Install and configure Windows Server 2003. 1. Move System32cmd.exe to another directory or rename it;2. As few system accounts as possible, change the

Prevent illegal user intrusion into the system

Prevent illegal user intrusion into the systemStep 1: Screen ProtectionAfter screen protection is enabled in Windows, the system automatically starts the Screen Protection Program as long as we leave the computer (or do not operate the computer) for

Block hacker entry

Since we understand the dangers of hacker attacks, and we cannot "start from the crowd", doing so is too contrary to the "Chivalrous Spirit! The so-called wind and waves, if we block the gap in the system, so that hackers have nowhere to start,

Principles and prevention of sniffer

By: LoveRoot I. What is sniffer.Sniffer: "sniffer", I think everyone has seen "no path", among which Liu Dehua and Liang chaowei are doing what profession? Undercover. sniffer can also be used as a metaphor. It is like an undercover inside the enemy.

Windows Media Player Remote Code Execution Vulnerability and repair

Vulnerability Type: Code Execution Affected Versions: Version: FF 3.5.10 & 3.6.6 with WMP 10 & 11  Vulnerability Description: Remote executable code vulnerability in Windows Media Player Vulnerability test code: (HTML> (HEAD> (/HEAD> (BODY onload =

Old text: SMB series (5) -- LM/NTLM Verification Mechanism

Author: 4th Home: http://www.nsfocus.comDate: 2002-12-02 Directory: ☆Overview☆Challenge/response mode☆L0pht document☆Vulnerability of Windows NT authentication mechanism☆Str_to_key () function☆How to generate LM Hash from plaintext

Simple implementation of Shellcode extraction from assembly code

# Include Unsigned char * asm_code (){_ Asm{Lea eax ,__ codeJmp _ ret} // Put the shellcode assembly code here_ Asm{_ Code:Xor ebx, ebx; test.00405030Push ebxPush 4B435546hMov eax, espPush ebxPush eaxPush eaxPush ebxMov eax, 77E18098hCall eaxMov

Honeypot technology: how to track the activity of attackers?

Many of you may be familiar with the terms "honeypot" and "honeynets. Although, strictly speaking, some people may think of them as tools of security researchers, they can also benefit the enterprise if used properly. In this article, we use the

Countermeasures for server intrusion-Trojan and backdoor detection and removal in the corner

Author: In today's era when wtf is so crazy about script intrusion, the so-called "0-day" of the script system is flying over the sky, and the WebShell is accidentally put on the server. How do I kill webshells that already exist on the server? It

Domain Name Hijacking Technology

Sinhack.com Recently, several domain name hijacking incidents occurred. First, Baidu was hijacked, and T00LS was hijacked twice. Then, Xiao Kai hijacked the Domain Name of the lightning plan.After Xiao Kai hijacked lightning, many friends asked me

Xp_cmdshell 100% restored successfully

SQL query analyzer connection Run: create procedure sp_addextendedproc --- 1996/08/30@ Functname nvarchar (517),/* (owner.) name of function to call */@ Dllname varchar (255)/* name of DLL containing function */AsSet implicit_transactions offIf @

Run path analysis run Path Analysis-search for traces of the kernel Rootkit

Text/Jan K. rutkoski/fahrenheitIn the past few years, many technologies have been developed to hide malicious attacks in the host system. Modern Backdoor programs are unaware of long-standing hiding, and use methods to modify the kernel structure

Multiple vulnerabilities and fixes in Google Chrome versions earlier than 9.0.597.94

Affected Versions:Google Chrome 7.0.548.0-9.0.597.84 vulnerability description:Bugtraq id: 46262 Google Chrome is a Web browser developed by Google. Google Chrome earlier than version 0.597.94 has multiple security vulnerabilities. Remote

Edraw Office Viewer Component V7.4 Control Buffer Overflow Vulnerability and repair

Edraw Office Viewer Component is an ActiveX control used to display and interact with Microsoft Office documents. The control in Edraw Office Viewer Component V7.4Z has a buffer overflow vulnerability, which may cause arbitrary code execution. [+]

Mysql permission escalation prompt can & amp; #39; t open shared library & amp; #39;

For cant open shared library udf. dll I believe that many friends who use mysql to raise permissions should not be unfamiliar with it. It is clearly a root user but they are using udf. this error is prompted when a user-defined function is created

QQplayer Memory resume uption Vulnerability (including repair)

Affected Versions: Vulnerability description:A symbolic extension problem occurs in MP4Splitter. dll. . Text: 10023EFF mov eax, [esi]. Text: 10023F01 push 0. Text: 10023F03 push 20 h. Text: 10023F05 lea ecx, [esp + 40 h + buff]. Text: 10023F09 push

Symantec LiveUpdate Administrator controls Request Forgery Vulnerability and fixes

Affected Versions:Symantec LiveUpdate Administrator 2.2.2.9 Vulnerability description: Deletecs LiveUpdate Administrator provides infrastructure support for the content. Symantec LiveUpdate Administrator has a request forgery control

Registry Key value used for penetration testing

Usually collected-generally, the server reads a small amount of information from the registry if it has little restrictions on the registry. HKEY_LOCAL_MACHINESYSTEMControl001Services # obtain some service informationHKEY_LOCAL_MACHINESOFTWARECat

Total Pages: 1330 1 .... 952 953 954 955 956 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.