Enhanced DNS Security: Run BIND with Chroot

  Running BIND on chroot improves security. This article has been tested on Debian Sarge. You can modify other versions as needed. If you have not installed BIND, run the following command to install Bind 9. Code: Apt-get install bind9 Stop the Bind

Drive away "Uninvited customers"

Author: loibbOne day, the instance is not shut down normally. When the instance is restarted, the system first enters the safe mode. After I use the previous registration file to restore the instance, however, I found that there was an extra

CISCO Literacy: Basic commands

Source: hacker Base Note: This article is only for the use of literacy, and there is no technical skills at all. You can take a look at this article if you have no knowledge of NA. 1. Enter the router operation interface. -Click here to View Answer

RSS language coding

Source: hacker Base Afrikaans: af Albanian: sq Basque: eu Belarusian: be Bulgarian: bg Catalan: ca Chinese (Simplified): zh-cn Chinese (Traditional): zh-tw Croatian: hr Czech: cs Danish: da Dutch: nl Dutch (Belgium): nl-be Dutch (Netherlands): nl-nl

The easiest way to enable full attack on a terminal

The easiest way to start a terminalThe terminal-based method introduced today is green, environmentally friendly, and pollution-free ~~You do not need to upload any files to enable the terminal. This method is applicable to win2k, xp, and 2003.In

Solution for reporting log file damage during system startup

Source: Shadow0KinGs Technique BloG If the event viewer reports that log files are damaged during system startup, you can take the following remedial measures: 1. Disable Event Log service and restart the system. 2. delete the damaged Log File

Four methods to obtain SYSTEM permissions from the Administrator identity

This article summarizes four methods to obtain the SYSTEM permission to run the regedit.exe file,The source code can be easily modified to run the specified program in the command line mode. 1. Run as a service2. Add an ACL3. HOOK ZwCreateProcessEx

Network Server Security Maintenance Skills

The malicious network behaviors of network servers include: first, malicious attacks, such as denial of service attacks and network viruses. These behaviors are intended to consume server resources and affect the normal operation of servers, even

Introduction to buffer overflow principles

First of all, it is necessary to explain the case in this article only in the vernacular,After all, I am also scared. There is nothing I can't understand, as long as you can stick to this article,It will initially understand the concept of buffer

Use ServerMask to modify IIS header information

I believe that before you start using other WEB servers, the first thing you need to do is to determine the type of the other WEB server! Usually telnet to port 80 on the server: (figure 1) See? In line 2, "Microsoft-IIS/5.0" exposes that your

No seven dangerous network administrators

Jeff Dray recently made an in-depth investigation and research on the IT industry. Through summarization and analysis, he listed a category list for the IT industry. Here, he defines the seven most insecure network administrators. If you are a

Shellcode 2. Plus2: ret2libc instance

  At the end of the ret2libc, the original book does not have detailed resources. However, understanding this will be of great help to circumvent the unexecutable stack (nx-stack) in the future. In view of this, I have found some relevant

Perform iptables drop on IP addresses that have incorrect ssh passwords

  Perform iptables drop on IP addresses that have incorrect ssh passwords Put the following script into/etc/crontab Scanned ssh password guesses more than 5 times * *** Root/home/cnscn/sh/ssh_scan_crontab.sh>/dev/null 2> & 1 $

MS11-092 patch Analysis

This patch has been released for several days and has not been compared with DIFF before. Therefore, I am very interested in it. Please note the error.Due to IDA version issues. BINDIFF cannot be used, so we have to use DarunGrim. The result is as

Solve external udp attacks in linux

In addition to disabling functions and udp packet filtering, there is no good solution to phpddos.For windows systems, see: http://www.bkjia.com/Article/201110/107970.htmlThe following describes how to change the security settings of linux servers

Notes on Linux system security performance check

Note: 1. Accounts check # Less/etc/passwd # Grep: 0:/etc/passwd Note that the new user, UID, and GID are 0 users. 2. Log check Note "entered promiscuous mode" Error Message   Note: Remote Procedure Call (rpc) programs with a log entry that includes

Apache Security Policy

1. Install patches frequently. The latest changelog on www.apache.org has the words bug fix and security bug fix. Therefore, Linux network administrators should pay attention to the bug fixes and upgrades of related websites, and promptly upgrade

Import the Registry to manually obtain the hash of the local user

Although there are many articles on the Internet to export hash from the Registry, I mainly refer to the blog record of the smelly sock, because it is very beautiful. Generally, you only need to use the AT guide. You don't need to be so entangled as

Thunder to see the player v4.8.4.898 Memory Corruption Defects

Thunder looks at the Memory Corruption defect in the player when processing MP4 files. The successful exploitation can execute arbitrary code with the program running permission. #! /Usr/bin/env python   Filepath = "nansec.mp4" F = open (filepath,

Nginx hidden version

For security reasons, we decided to hide the nginx version number. If the version number is exposed, it is equivalent to telling someone about your vulnerability. Someone else can use the vulnerability exploitation program corresponding to this

Total Pages: 1330 1 .... 963 964 965 966 967 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.