Securely initialize the MySql server

After installing the MySql server and setting the root user password of MySql, we started using it directly. In fact, there are still some insecure factors in such a MySql server, this article demonstrates how to use the command

Test procedure for Secure Desktop

0 × 00 what is a Secure DesktopWhen employees in some enterprises (such as finance) perform internal operations in the company, the general security policy is to recommend that the customer configure another computer for office work, and cannot

[Translation] Implementing ASLR in Linux Kernel 3.7

Author: Jonathan Salwan> Translation Date:> Http://www.cfeng.org> Original English: > In this short article, we will see how to implement ASLR in Linux Kernel 3.7>. The kernel generates a pseudo-random number by calling the get_random_int ()>

Disable default script ing for IIS to improve server security

Disabling IIS to execute file types not in our plan can significantly improve the security environment of the server. The following describes how to disable the script ing we do not need.Start IIS manager, right-click the website, and select

General ie json hijacking Vulnerability

You can view this information at http://www.bkjia.com/article/201205/132847.html.Json hijacking due to improper data processing of some resource containers. because ie supports vbscript, the script element can be specified as the vbscript language:

Nginx another WAF Method

Usage: vi/usr/local/nginx/conf/drop_ SQL .conf Add the following code: # Block SQL injectionsset $ block_ SQL _injections 0; if ($ query_string ~ "Union. * select. * \ (") {set $ block_ SQL _injections 1;} if ($ query_string ~ "Union. * all. *

Use Nginx rewrite to improve website security performance

A few days ago, in order to use idle VPS, a movie station was built with GXCMS, and then swept down to the 360 Website Security Detection area, the system prompts that the XSS vulnerability exists. After checking the vulnerability, the vulnerability

Android penetration testing Basics

I. Application Local Storage check 1. View data in sqlite3 formatThe local storage of many applications uses the sqlite3 database for storage. We can use the sqlite3 command to view the content, for some Android devices without the sqlite command,

Nginx server prevents SQL injection/overflow attacks/spam and User-agents bans

Add the following fields to the configuration file: Server {# Block SQL injections for SQL InjectionSet $ block_ SQL _injections 0;If ($ query_string ~ "Union. * select. * \ (") {Set $ block_ SQL _injections 1;}If ($ query_string ~ "Union. * all. *

YY client local storage password bug

Today, I have been playing yy for a while .. It feels bad... So let's take a look at this very tricky program .. In addition. I am not engaged in reverse engineering .. Let's just take a look .. Hope you can analyze Yy cache + configuration

Mongodb-Security Weaknesses in a typical NoSQL database

Over the last year or so, I 've noticed 2 ports appearing more frequently during internal penetration tests, namely 27017/tcp and 28017/tcp. these can be easily missed if full port scans are not saved med.A quick service scan revealed this as

Simple stack overflow in solaris 9 (iSCSI)

Test the vulnerability program vul. c # include # include void func (char * str) {char buf [8]; strcpy (buf, str); printf ("% s \ r \ n", buf );} int main (int argc, char * argv []) {if (argc> 1) func (argv [1]); return 0 ;}with the suid bit, the

Stunshell php Web Shell Remote Code Execution

### This file is part of the Metasploit Framework and may be subject to # redistribution and other cial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use .# http://metasploit.com/##require

Chrome plugin Spoofing Attack

I have dug a bunch of XSS in the past. At first I thought it was quite interesting. Later I realized that I would submit the XSS in the future. Sorry, brother, I don't know what type it should be, you can check it out... This is just something that

Browser URL Address Bar Spoofing

When I got up in the morning, I took a vacation with my school and started my computer. I accidentally saw a PPT from xisigr 《Browser magicI was very depressed about how it was implemented. I searched for nothing and did some tests on my

Use pcntl_exec to break through disable_functions

1DescriptionPcntl is an extension in linux that supports multi-threaded php operations.The pcntl_exec function is used to execute a specified program in the current process space. version requirements: PHP 4> = 4.2.0, PHP 52, UtilizationDuring

Linux server uses php and cron to automatically block attacker ip addresses

I haven't written anything for a long time, mainly because it's so busy recently that an idiot uses webbench to attack the company's server every day. as the saying goes, I have been ill for a long time. Today, my Mongolian doctor will share the

Try to crack a simple and regular root Password

[Introduction] some small companies make it easy to remember and use images. servers use the root password with fixed combination rules (developers/O & M personnel are lazy) and sshd: 22 is available on the Internet. For example, if we know that the

Apache nginx disables PHP program execution through rewrite settings

A website may have vulnerabilities. The last time a friend's website used an open-source system, the website was infected with Trojans and checked a vulnerability when it was originally used to edit the template, A Trojan is written into the

Configure https and self-signed certificates for nginx

1. Prepare the certificate.The procedure is similar to that described in the use of the OpenSSL self-issuing server https certificate. Repeat it here.1. Create a CA certificate:Ca. key CA private key: Openssl genrsa-des3-out ca. key 2048

Total Pages: 1330 1 .... 968 969 970 971 972 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.