Introduction to the Linux Log System

Logs are also a part of user attention. Do not underestimate the importance of log files for network security, because log files can detail various events that occur on a daily basis in the system. You can use log files to check the cause of errors,

List of MySQL primary protection checks

Chris Anley chris@ngssoftware.com.Translation: zhouzhen [E.S. T] List of MySQL primary protection checks The following are important references to reinforce the security of your Mysql

Defense Against PHP Trojan attacks

1. Prevent jumping out of the web directoryFirst, modify httpd. conf. If you only allow Your php script program to operate in the web directory, you can also modify the httpd. conf file to limit the php operation path. For example, if your web

Sniffer attack and defense instances in a broadband Internet security environment

Source: http://www.coolersky.comThere seem to be many articles about broadband Internet security, but they often refer to problems such as Trojans and Internet Explorer vulnerabilities. As a result, there is a more dangerous problem that does not

Seven methods to retrieve the restore genie Password

If you forget to restore the genie password, the trouble may be high. This problem cannot be solved by uninstalling the software, because you also need to enter a password during uninstalling. Don't worry, I have a solution! Method 1: temporary

An Effective Method for deceiving hackers

Author: Li Qinghua As you know, you can use the Ping and Tracert programs to determine the target host type. The main use of Ping is to check whether the target host can be connected. Tracert uses the TTL value in the ICMP and IP packet headers to

Windows xp 3389

Let's talk about it first. I wrote it six months ago. It was published on "hacker security base.Windows xp 3389 Windows xp has been released for more than two years. But it always seems to be unbreakable. In the past, there were some windows xp

Delete TFTP "time bomb"

Recommendation reason:In Windows, there is a client named tftp, which many hackers can use to upload some attack tools .......... This service was originally intended for the Network File Transfer Service. I did not expect it to become a "time bomb",

Seven steps to protect Linux Server Security

The main consideration for installing a Linux operating system is the security of the operating system. How can we have a Secure Linux server? Many new Linux network administrators find that it is difficult for them to switch from a click-to-click

Apsara Conficker worm cleanup Solution

According to the monitoring data, the recent Apsara Worm (Worm. Win32.Conficker .~) The worm virus, which has plagued netizens for more than two years, is spreading rapidly on the Internet in China. Many comments about the worm have also appeared on

Use coffee to set basic Server user security

An important step for hackers to intrude into the server is to escalate permissions and add users.Today, I helped the Xiaoye kids shoes maintain the server and saw coffee.Use the coffee EE antivirus software to prevent users from being added.The

Apache Tomcat full-system security vulnerability (5.x ~ 7. x) Repair

Apache Tomcat Information Leakage Security level: low Affected Versions:-Tomcat 7.0.0 to 7.0.16-Tomcat 6.0.0 to 6.0.32-Tomcat 5.5.0 to 5.5.33Earlier versions may also be affected. Vulnerability description:When you use MemoryUserDatabase

Record each Remote Desktop IP Address

Md c: \ WINDOWS \ PDPLOGEcho date/t ^> RDPlog.txt> C: \ WINDOWS \ PDPLOG \ PdPLOG. CMDEcho time/t ^> RDPlog.txt> C: \ WINDOWS \ PDPLOG \ PdPLOG. CMDEcho netstat-n-p tcp ^ | find ": 3389" ^> RDPlog.txt> C: \ WINDOWS \ PDPLOG \ PdPLOG. CMDEcho start

. NET runtime optimization Service Privilege Escalation detailed analysis and exp sharing

Author: LengF (Leng Feng)Team: www.bhst.orgBlog: www.81sec. omYou are welcome to repost the code, but please keep the copyright note. The main code of the standard is completed by xenomuta! The author of this article only makes a few changes and

Server black protection skills

Today, users and system vulnerabilities are frequently attacked. As network administrators and system administrators, although they have made great efforts in server security, such as timely patching of system security and some conventional security

TomCat Security Settings

Many people now use Tomcat as a virtual host. Below is a Tomcat security setting.1. Complex Background passwords. Do not say this. At least there must be special characters.The password configuration file is in C: \ Program Files \ Apache Software

Use SHELL scripts to prevent SSH and vsftpd brute-force cracking

BKJIA Author: fuqin LiquorOne of my public network servers, because the website adopts a dual-backup policy, port 21 of vsftpd is opened. Recently, many people are trying to crack vsftpd and ssh, I casually looked at the/var/log/secure log, which is

Talk about Vulnerabilities

I'm glad that the strong winds of one of Alibaba's young literary youths began to write blogs again, and they are all good young people who write blogs and share their technologies. Young people in literature are passionate. If you don't have to

Prevent Trojans by disabling new users

    1. Preface:   The danger of a Trojan is that it can remotely control your computer. When you become a "zombie", other people (control terminals) can enter your computer, peek at your files, steal your passwords, and even use your qq to send

Further exploration of chrome's tag correction Vulnerability

The previous article provided two prototype of the chrome tag correction feature vulnerability, which is a further extension of the idea of the vulnerability 11 issued by foreigners. I said the tag correction feature of chrome xss filter is a little

Total Pages: 1330 1 .... 959 960 961 962 963 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.