Security knowledge: Exploitation of Trojans

Today, hackers have begun to deviate from the technology itself, and even those who only target Windows 98 vulnerabilities, and use the simplest Trojan tool to attack others have begun to claim that they are hackers. The hacker has actually

Obstacles for hackers: Network Security Trilogy

Basic settings I. Four misunderstandings about online security The Internet is actually a world that comes and goes. You can easily connect to your favorite site, while other people, such as hackers, can easily connect to your machine. In fact, many

Deep security reinforcement for Linux systems

/* Starting from 2003/10 */Author: ayazero drdos@163.comPersonal web -- http://overflow.nease.netTeams site -- http://ph4nt0m.netNote: The following content may not apply to some occasions. Please check your account1. Installation and upgradeUse

/Xp: the fastest way to disable ports 136, 137, 138, and 445

Prohibit others from accessing shared files in your "Network Neighbor"/disable common trojan portsWe don't all want others to share their resources online...Not to be disturbed by Trojans...You only need to do the following work to prevent others

Parsing attacks from the Autorun. inf file

Author: junzilan Source: Tianji Software Recently, AutoRun. the inf file enables all the hard disks of the other party to be fully shared or the Trojan. the Application of inf files in hacking technology is still rare, and there are not many related

Precautions for linux Security Settings

Author: Flame [E.S. t vip]Source: evil gossip Security Team Server Security (it is much better to prevent vulnerabilities than fixing vulnerabilities after intrusion. Once an intrusion occurs, when you find that your level is at the level of a

Universal Trojan scan and Removal Methods

During May 100%, our company's computer seemed to have had a lot of Trojans, the system was running slowly, and the CPU usage was. I used a lot of methods and it was not completely effective. Is there any better way to check and kill? All-Around

Code encryption/Decryption Protection

Text code protection is a headache. As you learn more about it, more protection methods mean more vulnerabilities.Let's talk about my experience. If you have better methods, please contact QQ: 17789897. [-Method for retrieving the original code-] 1:

Summary and experiences of Security Vulnerabilities (2)

Know chuangyu Previous please see here: http://www.bkjia.com/Article/200911/42464.html How can we determine whether a BUG is a security vulnerability? In fact, we also follow the above principles: to determine whether the application can provide

Another method for MYSQL Privilege Escalation

Reprinted with the source h4x0er.orgIdea: Download The MYSQL Data of the server and check the ROOT password locally for privilege escalation.Make sure that the MYSQL installation directory is readable.Log on to PHPMYADMIN by setting up MYSQL

Win32k. sys keyboard layout file Elevation Vulnerability Analysis

Author: Sebastien Renaud Riusksk (quange: http://riusksk.blogbus.com)   This article will reveal some technical details about the Stuxnet worm, mainly to show you how the author uses the 0-day vulnerability to achieve code versatility. This article

Abnormal Web Server IIS Security Settings

1. Delete the default share. disable port 139.445.Select the "Computer Management" program, select "shared folder", right-click the corresponding shared folder, and select "stop" to share. However, after the system is restarted, IPC $ and printer $

Once again, lpc 0-day analysis challenges

Many years ago, when I saw the lpc api interfaces, I knew that lpc had many problems. Why did I know that these interfaces had many problems? This is "5. Why are these vulnerabilities caused? Root Cause? Why can't sdl discover these vulnerabilities?

Php webshell scan with perl

There have been a lot of things over the past few days, but for convenience, I wrote a php webshell detection script to Show the effect. In order to minimize false positives and minimize false positives, we have made a lot of analysis and

Oracle Database Security-object permissions

Q:PUBLIC is granted the following permissions WITH the 'with GRANT option' OPTION:         GRANTEE OWNER TABLE_NAME GRANTOR PRIVILEGE GRANTABLE PUBLIC SYS PLAN_TABLE $ SYS UPDATE YES PUBLIC

Common listener Fault Handling Methods

1: TNS-12537, TNS-12560, TNS-00507 ProcessingThe following error is reported when the listener is started. Generally, the information about the loopback address in the/etc/hosts file is deleted by mistake.[Oracle @ jason admin] $ lsnrctl

Who moved my QQ, Windows 7 full monitoring

Xiaoyi will share with you a tips: Let Windows 7 help you monitor the software usage. Xiaomei is naughty and often uses my machine to chat QQ and download videos when I am not there. There is no evidence that Xiaoyi can't help her. However, with the

How to crack WebLogic password management?

By BeanSoft@126.com Sometimes, the Administrator may forget the admin username and password of the WebLogic domain. How can I restore these passwords? This article will demonstrate how to use a simple Java program to restore the forgotten user name

Three elements of server security maintenance

  With the rise of e-commerce, many small and medium-sized enterprises have their own servers. It is used to establish local networks internally to improve office efficiency. It also establishes external websites to publicize enterprise products and

Technical speculation about security products

First of all, this article is purely a guess. The actual situation must be different.   We can simulate an SQL injection attack that does not exist at all.   Return   405 Not Allowed -----------------------------------------------------------------

Total Pages: 1330 1 .... 958 959 960 961 962 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.