Author: Feng xinxin
The network is interconnected. When you obtain resources from the network, you must also pass the test. The Trojan program modifies and destroys the computer's systems and files, in addition to installing anti-virus software
You may still be unfamiliar with the reference to "Hacker Eliminator", but if you mention the popular "LockDown 2000", you will be familiar with it, "Hacker Eliminator" is actually a new version of "LockDown 2000. With the "Hacker Eliminator", we
AngelBST Source: Security angel
As we all know, there are currently no technologies and devices that can completely defend against DDOS attacks. I have written a code for temporary relief against FATBOY's working principles to effectively defend
Author: Review of stream smoke [HacKBasE] Source: hacker base Original essence district responsible editor: tyrant
Classic Network command line1. The most basic and commonly used physical network testingPing 192.168.10.59-t. The-t parameter is
Source: fhod
When you encounter a CC attack, put the following code into conn. asp. You can study the principle on your own.
Dim fsoObjectDim tsObjectDim fileIf Request. ServerVariables ("HTTP_X_FORWARDED_FOR") = "" thenResponse. write "in system
Source: Perls Blog
To enable apache anti-theft connection, you must first enable apache to support. htaccess client setting files and add the mod_rewrite module. The following is my compilation and installation process.1. install apache and add the
This article describes seven steps to prevent illegal user intrusion in Windows 2000 and Windows XP operating systems ".Step 1: Screen Protection
After screen protection is enabled in Windows, the system automatically starts the Screen Protection
If your PC is loaded with a Windows operating system, your documents, your privacy, and your computer security will be threatened when you use it to access the Internet. There are so many virus writers, computer hackers, and people with bad
Microsoft's IIS and SQL Server are usually the main part of the Windows-based distributed application environment. This means that they are also the most frequently attacked targets. In this article, we will provide some specific suggestions to
For most enterprise LAN, routers have become one of the most important security devices in use. Generally, most networks have a primary access point. This is the "virtual border router" that is usually used with a dedicated firewall ".After proper
Abstract firstly, this paper briefly describes the existing security problems in the computer network, analyzes the process of hacker network attacks, and puts forward specific measures to prevent hacker attacks.Keywords hacker TCP/IP protocol
Statement: The main content is from The Shellcoder's Handbook, which extracts Important Notes and adds some personal understanding. If there is something wrong, be sure to point it out.
A simple program victim attack is mentioned in . Since my
Because the SQL query statement execution time is not checked (query time-out time is usually limited), this may force MySQL to execute a special query statement, let the query statement be executed within a custom time (several hours or days). Of
Vulnerability description:BisonFTP Server v3.5 does not judge the buffer size when processing the received data, resulting in heap overflow.Vulnerability sample source:Http://www.exploit-db.com/exploits/17649/Debugging environment and
The web Service www.2cto.com (for example only, not real) is IIS7.0. Www.2cto.com/robots.txt followed by/any character. php is successfully resolved to php Register a user name, find the Avatar upload address, and upload a normal image and a pony
By thanks
Http://insight-labs.org /? P = 267
The vulnerability principle analysis is not much said.
However, we did not mention how to fix the vulnerability. We just made a supplement here.
Vulnerability principles and processes:
1. The victim
Instead of using iis attributes and configurations, you can directly use the vbs Script: it_security.vbs. View the current extension: Cscript it_security.vbs Add a backdoor. aso suffix (for example ): Cscript it_security.vbs-a. aso, c: \ windows \
This day, When I captured hashdata, I found that gethashes.exe is not easy to use. In addition, I tested several other things and it was not easy to use...Similar to Windows hashs'. Some useful tools include pwdump7.exe1_gethashes.exe1_saminside.exe,
We have recently learned how to fix vulnerabilities in linux!RPC Statd service RPC dangerous level: highDetected host ###################################### ####################Vulnerability No.Vulnerability classification RPCHigh risk levelAffected
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.