Download SQL database

Use ASP to back up the SQL server database. The Code is as follows: SQL Server database backup and recovery Select Operation: backup restore Database NAME: "> file path: (backup or recovery file path, backup to EXE mainly for convenient

Tips for Analyzing System Log Files

Check Date and TimeWeb page access will leave a detailed time, which is generated by the server rather than the client time, and cannot be changed at will. Therefore, you can generate a report for the site based on the time frequency.Tracking Client

Server Security Settings (3)

8. HTTP compression for static Web pagesStatic web pages adopt HTTP compression, which can reduce the transmission volume by about 20%. HTTP compression is enabled or disabled for the entire IIS server. The client uses the IE 5.0 browser to connect

Two methods to locate hejian overflow points

Text/security Angel SuperHei [BST] _ Blank> vulnerability _ blank> Software: War-Ftpd version 1.65Debug _ blank> Software: OllydbgProgramming: perl _ Blank> vulnerability Description: Creates a USER, resulting in stack overflow.For some debugging

Security first makes your IIS impeccable

If nt4/win2000 is installed on your computer, you can directly use it as an Internet server. Microsoft has many patches, but there are still some vulnerabilities. Now let's talk about how to use IIS to build a server with high security performance. 1

How to create an intelligent server Alarm System

Source: http://www.ccw.com.cnNetwork administrators in the company often deal with servers, mail servers, FTP servers, Web servers, and so on. It is impossible for us to stay on the server 24 hours a day. Because the probability of a server failure

Best server security configuration skills

Source: CALLCALL BLOG Windows 2000 contains many security functions and options. If you configure them properly, windows will be a safe operating system .. Elementary Security 1. Physical Security The server should be placed in an isolated room with

Make good of your Windows login door

As we all know, Windows has a logon password, which is essentially a false one for most people. Even if you set a password, anyone else just needs to cancel it and then enters your system.Maybe you have a solution: modify a registry file with the

Deep decoding of the hacker empire-What is Matrix )?

The purpose of Matrix is to give birth to the uterus, Mother, and place of life. In terms of mathematical terms, Matrix is used to represent various associated data such as statistical data. This definition well explains the mathematical logic

Microsoft's patch-based MHTML cross-origin vulnerability can be exploited (2)

Microsoft recently released a patch for the MHTML vulnerability. After the patch is installed, IE prompts you to download the file. However, according to the test, if the user directly clicks "open", the "cross-origin" issue will still be triggered.

The principle of Trojan horse and the main method of remote control

A Trojan horse (or Trojan Horse) is called Trojanhorse in English. The story comes from the ancient Greek epic 'iliad. Troy is a prosperous ancient city along the coast of Asia Minor. The new Greek fought with Troy for ten years to protect their own

SPlayer & amp; lt; = 3.7 (build 2055) Buffer Overflow Vulnerability

SPlayer is a small green video playing tool launched by shooter technology. SPlayer [+] Info:~~~~~~~~~Exploit Title: SPlayer Author: xsploitedsec [+] Poc:~~~~~~~~~ #! /Usr/bin/python# Exploit Title: SPlayer # Date: May 04,201 1# Author: xsploitedsec

Batch Processing for Intranet sniffing self-protection

 When the detection administrator goes online, he or she will log out: @ Echo off: CheckChoice/c yn/T 10/D Y Quser find "#16" & del xx. bat logoff Goto check #16 each time you run this bat, you should first quser to check the current session id, and

Operating commands for oracle Database Detection

Recently, I encountered a server that used oracle databases. After learning oracle + for advice, I finally got all the user passwords on the website background management interface. I found it too troublesome to operate oracle, in order to avoid

Use javascript to obtain the asterisks and passwords in the browser

In a few simple steps, you can use javascript to retrieve the asterisks and passwords stored in your browser. 1. Open a browser2. Go to the login page where you saved your password3. Enter the following script in the address bar of the

Use PHP to break through Disable_functions to execute Linux commands

In linux, webshell administrators disable exec, system, passthru, popen, shell_exec, and so on to execute command functions in PHP. As a result, commands cannot be executed. Php provides an extension module function. The dl function can contain an

Thoughts on social engineering cases

The incident also starts from being fooled. Although I was not cheated on the money, I was very unhappy, so I came up with the idea of seeing what he was, it can be said that the case was caused by a flicker. So what should a social worker do if I

Struts2 framework javastresult local File Code Execution Vulnerability Analysis

By kxlzx http://www.inbreak.netThis is a vulnerability that has never been published and is occasionally discovered by code. In fact, there are not many people using this code. It can be implemented only when both situations are met. I guess that

Three steps to VPS Security (linux)

Editor: If you use windows System vps can see this article: http://www.bkjia.com/Article/201103/84875.html 1. Open a firewallEnable the firewall and disable unnecessary ports/Etc/init. d/iptables start // simple rules are as follows.

Iptable disables access from a specified ip Address

Disable TCP connection to port 80. Only some IP addresses can access port 80 through TCP:# Prohibit all IP addresses from accessing port 80 of the Local Machine/sbin/iptables-I input-p TCP -- dport 80-j DROP # Allow 210.245.191.162 access to port 80/

Total Pages: 1330 1 .... 960 961 962 963 964 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.