Close/enable port
Before introducing the functions of various ports, we will first introduce how to disable/enable ports in Windows, because the default situation is, many insecure or useless ports are enabled, for example, port 23 of the Telnet
As a popular Web server as the main target of global network spoilers and worms, IIS has become the focus of Microsoft's trustworthy computer operations. IIS has re-designed the default settings and security. This article discusses the major default
Scan is the basis for all intrusions. There are many host detection tools, such as the well-known nmap. I don't have any new technologies here. They are old things and old things. Even if I have been referring to the Phrack document or even a
Microsoft once again fabricated complex equations to explain the mysteries of today's most cutting-edge technologies that are difficult to tune. No one can determine from a philosophical perspective whether IIS 6.0 is secure enough. All we can do is
Source: hacker BaseIn network overload attacks, a shared resource or service cannot meet the requests from other users because it needs to process a large number of requests. For example, if a user generates a large number of processes, other users
WIN2000 SERVER Security Configuration strategy: currently, WIN2000 SERVER is one of the most popular SERVER operating systems, but it is not easy to securely Configure Microsoft's operating system. This article attempts to preliminarily discuss the
Author: pt007 [at] vip.sina.comI .S. T. O All Rights Reserved. The author must be specified for reprinting.1. Be sure to boot from the USB flash drive or CD into BT3 (do not start BT3 in vmware). Select the fourth option to enter the text mode.
Abstract: When an arp virus attack occurs, the computer that is poisoned may forge the MAC address of a computer, for example, the address of the gateway server, this will affect the entire network, and users may experience frequent transient
The transition from IPv4 to IPv6 will inevitably force many enterprises to rethink their network security measures. The result is that the practice of identifying all incoming information traffic as insecure from obtaining a confirmed security
Dark Group zachary
The university is about to graduate. I think of a school that I want to fill in during the college entrance examination. Because the college entrance examination is poor, I only have more than 10 points for two books and can only
For example, let's get an injection point: jmdcw. asp? Name = aaand 1 = 1 and =, If you replace 1 = 1 With the statement to query the administrator password:
(Select asc (mid (pass, 1, 1) from [name] where id = 1)> 49
How to Use spaces? It can be
Author: nightSource: www.54rk.cn
Suppose there is such a file, no matter how you inject it into the page, the content is the same. But his code does have injection points.Select * from table where columnid = $ input_idIt is absolutely impossible to
The other side, the flowers are not open
SQLJStored procedureCan also used to write documents.
It can also use the following in this way I am talking aboutSQL> create tablespace kjtest datafile e:websitekj.aspsize 100k nologging ;
Table space has
When conducting a security penetration test, we first need to collect as much information as possible for the target application. Therefore, information collection is an essential step for penetration testing. This task can be completed in different
RainyFox
If your server supports. NET, you should note that the aspxspy web page has a function: IIS Spy. After you click it, you can see the physical path of all sites. Generally, you can set a single user permission to block it, but sometimes you
It is often used for * related database operations. Including connection code, SQL commands, and so on, and never deliberately remember them (I don't want to remember this stuff), so they are often usedAnd then go to the books. However, they may not
Author: L4nk0r (http://www.l4nkor.org)E_mail: l4nk0r [at] gmail.com
Today, I am reading an asp system. When I analyze the code, I open the database and find that there is only one notdown table, but the webpage is displayed normally. the content is
Author: [Z. S.T] Xiao Bing
In fact, this webmaster only stays on the surface in terms of security, and he appreciates the improvement of 1 in the background.
If you modify the management directory, it will block some intruders. Everyone's security
Blog.tosec.cn
From the title, it seems that this start menu (windows system) has a major correlation with our Elevation of Privilege. Nobug32 wrote some recall information about mssql backup last time, the START item in the Start menu is also
Author: L4nk0r [cn_lgz@126.com]Recently, I helped a computer repair website. The teacher gave me a domain name and I checked server security with curiosity.My website was written in asp. I tried a connection and tested it. I found that simple SQL
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.