How dangerous computers are -- how bad Trojans are loaded

Author: Feng xinxin The network is interconnected. When you obtain resources from the network, you must also pass the test. The Trojan program modifies and destroys the computer's systems and files, in addition to installing anti-virus software

Build your security line in five minutes

You may still be unfamiliar with the reference to "Hacker Eliminator", but if you mention the popular "LockDown 2000", you will be familiar with it, "Hacker Eliminator" is actually a new version of "LockDown 2000. With the "Hacker Eliminator", we

Anti-ddos tool: FATBOY temporary solution

AngelBST Source: Security angel As we all know, there are currently no technologies and devices that can completely defend against DDOS attacks. I have written a code for temporary relief against FATBOY's working principles to effectively defend

Classic Network command line

  Author: Review of stream smoke [HacKBasE] Source: hacker base Original essence district responsible editor: tyrant Classic Network command line1. The most basic and commonly used physical network testingPing 192.168.10.59-t. The-t parameter is

Analysis and Prevention of buffer overflow attacks

Zhao youen1Zhou shoujun2 (1.Department of Computer Science and Technology, Shandong Economic University, Jinan250014) (2.Thermal Engineering College, Shandong Construction Engineering University, Jinan250014) AbstractYesBuffer overflow attacks

Asp code for CC Attack Protection

Source: fhod When you encounter a CC attack, put the following code into conn. asp. You can study the principle on your own. Dim fsoObjectDim tsObjectDim fileIf Request. ServerVariables ("HTTP_X_FORWARDED_FOR") = "" thenResponse. write "in system

Apache2.0.54 detailed configuration for preventing unauthorized connections

Source: Perls Blog To enable apache anti-theft connection, you must first enable apache to support. htaccess client setting files and add the mod_rewrite module. The following is my compilation and installation process.1. install apache and add the

Tips to prevent illegal intrusion into Win2000XP

This article describes seven steps to prevent illegal user intrusion in Windows 2000 and Windows XP operating systems ".Step 1: Screen Protection After screen protection is enabled in Windows, the system automatically starts the Screen Protection

How Windows users implement self-protection

If your PC is loaded with a Windows operating system, your documents, your privacy, and your computer security will be threatened when you use it to access the Internet. There are so many virus writers, computer hackers, and people with bad

Best security practices: locking IIS and SQL Server

Microsoft's IIS and SQL Server are usually the main part of the Windows-based distributed application environment. This means that they are also the most frequently attacked targets. In this article, we will provide some specific suggestions to

Configure a secure router to block intrusion

For most enterprise LAN, routers have become one of the most important security devices in use. Generally, most networks have a primary access point. This is the "virtual border router" that is usually used with a dedicated firewall ".After proper

Preventive measures against hacker attacks

  Abstract firstly, this paper briefly describes the existing security problems in the computer network, analyzes the process of hacker network attacks, and puts forward specific measures to prevent hacker attacks.Keywords hacker TCP/IP protocol

Shellcode 2. Plus: victim vulnerability elevation instance

  Statement: The main content is from The Shellcoder's Handbook, which extracts Important Notes and adds some personal understanding. If there is something wrong, be sure to point it out.   A simple program victim attack is mentioned in . Since my

MySQL query timeout causes Remote DoS Attacks

Because the SQL query statement execution time is not checked (query time-out time is usually limited), this may force MySQL to execute a special query statement, let the query statement be executed within a custom time (several hours or days). Of

BisonFTP Server v3.5 Remote Buffer Overflow Vulnerability Analysis

Vulnerability description:BisonFTP Server v3.5 does not judge the buffer size when processing the received data, resulting in heap overflow.Vulnerability sample source:Http://www.exploit-db.com/exploits/17649/Debugging environment and

IIS7.0 php error File Parsing Vulnerability exploitation instance

The web Service www.2cto.com (for example only, not real) is IIS7.0. Www.2cto.com/robots.txt followed by/any character. php is successfully resolved to php Register a user name, find the Avatar upload address, and upload a normal image and a pony

How to fix Apache httpOnly Cookie Leakage

By thanks Http://insight-labs.org /? P = 267   The vulnerability principle analysis is not much said. However, we did not mention how to fix the vulnerability. We just made a supplement here.   Vulnerability principles and processes: 1. The victim

Configure iis extension ing in the command line/dos/cmd.exe/cmd console to add a custom suffix

 Instead of using iis attributes and configurations, you can directly use the vbs Script: it_security.vbs. View the current extension: Cscript it_security.vbs Add a backdoor. aso suffix (for example ): Cscript it_security.vbs-a. aso, c: \ windows \

Capture administrator hash values

This day, When I captured hashdata, I found that gethashes.exe is not easy to use. In addition, I tested several other things and it was not easy to use...Similar to Windows hashs'. Some useful tools include pwdump7.exe1_gethashes.exe1_saminside.exe,

Linux RPC Statd service vulnerability repair

We have recently learned how to fix vulnerabilities in linux!RPC Statd service RPC dangerous level: highDetected host ###################################### ####################Vulnerability No.Vulnerability classification RPCHigh risk levelAffected

Total Pages: 1330 1 .... 965 966 967 968 969 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.