Running BIND on chroot improves security. This article has been tested on Debian Sarge. You can modify other versions as needed.
If you have not installed BIND, run the following command to install Bind 9.
Code:
Apt-get install bind9
Stop the Bind
Author: loibbOne day, the instance is not shut down normally. When the instance is restarted, the system first enters the safe mode. After I use the previous registration file to restore the instance, however, I found that there was an extra
Source: hacker Base
Note: This article is only for the use of literacy, and there is no technical skills at all. You can take a look at this article if you have no knowledge of NA.
1. Enter the router operation interface.
-Click here to View Answer
Source: hacker Base
Afrikaans: af
Albanian: sq
Basque: eu
Belarusian: be
Bulgarian: bg
Catalan: ca
Chinese (Simplified): zh-cn
Chinese (Traditional): zh-tw
Croatian: hr
Czech: cs
Danish: da
Dutch: nl
Dutch (Belgium): nl-be
Dutch (Netherlands): nl-nl
The easiest way to start a terminalThe terminal-based method introduced today is green, environmentally friendly, and pollution-free ~~You do not need to upload any files to enable the terminal. This method is applicable to win2k, xp, and 2003.In
Source: Shadow0KinGs Technique BloG
If the event viewer reports that log files are damaged during system startup, you can take the following remedial measures:
1. Disable Event Log service and restart the system.
2. delete the damaged Log File
This article summarizes four methods to obtain the SYSTEM permission to run the regedit.exe file,The source code can be easily modified to run the specified program in the command line mode.
1. Run as a service2. Add an ACL3. HOOK ZwCreateProcessEx
The malicious network behaviors of network servers include: first, malicious attacks, such as denial of service attacks and network viruses. These behaviors are intended to consume server resources and affect the normal operation of servers, even
First of all, it is necessary to explain the case in this article only in the vernacular,After all, I am also scared. There is nothing I can't understand, as long as you can stick to this article,It will initially understand the concept of buffer
I believe that before you start using other WEB servers, the first thing you need to do is to determine the type of the other WEB server! Usually telnet to port 80 on the server: (figure 1)
See? In line 2, "Microsoft-IIS/5.0" exposes that your
Jeff Dray recently made an in-depth investigation and research on the IT industry. Through summarization and analysis, he listed a category list for the IT industry. Here, he defines the seven most insecure network administrators. If you are a
At the end of the ret2libc, the original book does not have detailed resources. However, understanding this will be of great help to circumvent the unexecutable stack (nx-stack) in the future. In view of this, I have found some relevant
Perform iptables drop on IP addresses that have incorrect ssh passwords
Put the following script into/etc/crontab
Scanned ssh password guesses more than 5 times
* *** Root/home/cnscn/sh/ssh_scan_crontab.sh>/dev/null 2> & 1
$
This patch has been released for several days and has not been compared with DIFF before. Therefore, I am very interested in it. Please note the error.Due to IDA version issues. BINDIFF cannot be used, so we have to use DarunGrim. The result is as
In addition to disabling functions and udp packet filtering, there is no good solution to phpddos.For windows systems, see: http://www.bkjia.com/Article/201110/107970.htmlThe following describes how to change the security settings of linux servers
Note: 1. Accounts check # Less/etc/passwd # Grep: 0:/etc/passwd Note that the new user, UID, and GID are 0 users. 2. Log check Note "entered promiscuous mode" Error Message Note: Remote Procedure Call (rpc) programs with a log entry that includes
1. Install patches frequently. The latest changelog on www.apache.org has the words bug fix and security bug fix. Therefore, Linux network administrators should pay attention to the bug fixes and upgrades of related websites, and promptly upgrade
Although there are many articles on the Internet to export hash from the Registry, I mainly refer to the blog record of the smelly sock, because it is very beautiful. Generally, you only need to use the AT guide. You don't need to be so entangled as
Thunder looks at the Memory Corruption defect in the player when processing MP4 files. The successful exploitation can execute arbitrary code with the program running permission. #! /Usr/bin/env python Filepath = "nansec.mp4" F = open (filepath,
For security reasons, we decided to hide the nginx version number. If the version number is exposed, it is equivalent to telling someone about your vulnerability. Someone else can use the vulnerability exploitation program corresponding to this
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.