Almost all Internet companies have turned their attention to this area

With the explosive growth of mobile Internet this year, almost all Internet companies have turned their attention to this area, is both involved, but also fueling. Recently, the well-known social networking site Kaixin launched iPhone fresh version of the client. It is worth mentioning that, in the new version of the client, for the first time added IM (instant messaging) capabilities. In other words, this is the first "reverse osmosis" of SNS after Weibo and WeChat frequently "infiltrate" SNS territory. Guo Wei, vice president of happy network in an interview with "Securities Daily" said: "From the level of competition for time users, whether it is microblogging, SNS ...

The. CN root domain Server encounters the largest DDoS attack in history

China Internet Network Information Center (CNNIC) issued a statement, the state domain name resolution node and the early hours of August 25, the denial of service attack, to 3 o'clock in the morning service back to normal. Period a large number of. cn domain name and. com.cn cannot be resolved, including Sina Weibo and a group of Web sites with the. cn domain. 4 o'clock in the morning, the country's domain name resolution node was once again the largest denial of service attacks ever. As of 10 o'clock, the attack continued and the country's domain name resolution service was gradually restored. The following is the original announcement: August 25 0 o'clock in the morning, the national domain resolution node received ...

88% of the Citadel Zombie network server has been stopped operating

At the TechNet conference this June, Microsoft said the company, together with the FBI, had successfully hit more than 1400 citadel Zombie networks controlled by criminal gangs. This week, Microsoft again released news that about 88% of Citadel botnet servers have been confiscated and stopped serving. "In addition, according to our data, we have known about 40% of the Citadel since June this year," said Richard Domingues Boscovich, an assistant lawyer at Microsoft's Digital Crime department in Post.

U.S. shuts down infected DNS servers today some netizens will break the net

Because the FBI (hereinafter referred to as "the FBI") today will close the botnet behind the Dnschanger Trojan, so infected computers will be forced to break the network. As of Wednesday, around 250,000 computers infected Dnschanger Trojan horse, the United States has about 45600 units. The Trojan will change the user's DNS settings by routing traffic through a botnet. As the FBI and other law enforcement agencies have controlled the botnet behind Dnschanger, they temporarily use it as a temporary DNS server network to ensure that infected users can continue to ...

Future security and virtual server protection remain critical

According to the Acronis report on the Global Disaster Recovery Index (ACRONISGLOBALDISASTERRECOVERYINDEX2012), financial services have listed disaster recovery as a major item on its IT agenda due to the frequency of natural disasters over 2011 years. However, implementation, security, and virtual server protection remain the industry's biggest concerns. The Acronis survey visited a total of 18 countries in nearly 6,000 small and medium-sized enterprises, the results show that in 2011, 60% of the global financial services institutions fully implemented the industry ...

The process of controlling a DHCP server The beginning of security of the network

Imagine a network virus infected by a common computer connected to the network, the corresponding system of the virus is likely to be transmitted over the network to other computers on the LAN. Such mutual transmission, infection, the entire network is bound to be the network virus serious attack, at this time the security of the network is naturally destroyed. To ensure network security, access to the network must be properly controlled to ensure that ordinary computers can be trusted to connect to the local network and access the Internet. So which ordinary computers can be trusted? Here, we can force ordinary computers ...

The Senate server was hacked into the Senate account password or leaked

Xinhua Beijing, November 22, according to Kyodo News report, about the Japanese parliament members of the computer, and so on received an offensive mail, the Senate Affairs Bureau announced 21st, as the Senate two network servers were illegally visited, all senators and secretaries account and password may be stolen. According to the Bureau, the confidential Investigation company analyzed 5 of the 29 computers that were infected or could be infected with the virus. The results found that in the history of communication records, from early August to late October, the management of account information of the domain name server has been illegally accessed traces. It is reported that the other servers responsible for network monitoring ...

BIND 9 DNS domain name server suffers denial of service attack

Bind is a popular DNS server software, and the latest version is bind 9. The Internet Systems Association (ISC), which manages and maintains bind, warns that the BIND 9 DNS domain name server is suffering from a coordinated denial of service attack, which may have an unknown 0day vulnerability. Warns that a DNS domain name server crashes while executing a query, and returns an error message "Insist (! dns_rdataset_isassociated (Sigrdataset))". Multiple versions of BIND are subject to ...

To stand out and be more secure--five key words to help shop sellers build stations

"51cto.com Comprehensive News" in many similar shop, how to strengthen the buyer's memory of the store, bring "repeat customers", to build their own brand from many online shop in the fore? A simple and practical way is to have an independent "house number" on the Internet and register a Web site with a. com domain name. As one of the leading global top-level domain names,. com and. NET has become the preferred domain name for 93.5 million of the world's internet users, with a global high degree of cognitive advantage. However, there are still many network sellers to the. com domain name registration methods and procedures to know ...

Focus on main engine protection wave exerting force server security strengthening system

In the rapid development of the Internet industry today, the continuous updating of network technology has made the traditional way of social production has undergone tremendous changes. But the internet brings convenience to people's production and life at the same time, also brings great security hidden danger. To protect the enterprise's increasingly large information data, the current approach is the firewall, anti-virus software, intrusion detection and other traditional security equipment. Admittedly, these commonly used security devices can defend against some of the conventional attacks, but at the same time we have to accept a brutal reality, many enterprises in the deployment of almost all traditional security ...

Security slows the development of server virtualization

Last year, Stanford hospital in the United States moved general applications from traditional server platforms to VMware virtual machines, and found significant security deficiencies. "We have changed the nature of the IT infrastructure, but there is uncertainty about the impact of virtualization," said Mike Mucha, the hospital's information security officer. The virtual device begins to evolve into a derivative of the server component, controlled primarily by the server group, but the exchange of virtualization means that the traditional network itself has been changed. "In the virtualized world, there are some security issues that have begun to emerge, such as where ...

Sohu Upgrade Server user mail is emptied

Recently, the partial use of Sohu free mailbox users found their mailbox was "accidentally" emptied, some of the years accumulated in the mailbox in various folders of useful information also lost. According to Sohu staff explained that the recent server upgrades may cause some of the mailbox is emptied, Sohu will do its best to help the damaged users. The mailbox was cleaned up information was lost yesterday morning, Mr. Wang Login to his website in Sohu Free mailbox, found that the inbox has been cleaned "clean". "Just a few emails from the previous one, including the presence of drafts, and all the messages in the folder. "Mr. Wang is stored in the mailbox ...

Anti-American hacker group attacks U.S. Web server again

Whether it is consumer-level users, business users or government departments are very concerned about the security of online data. The theft of data cannot be measured in terms of money, which in some cases may even endanger national security. In order to protect the data, people have spent a lot of money to protect the data from being stolen by vicious attackers. Still, according to InformationWeek, anti-American hackers have again successfully breached two of US military-sensitive sites in recent days. The two sites are related to the Macalester Arms Factory and the U.S. Army Corps of Engineers. Which ...

The university server was taken down by the IIS vulnerability attack

May 20 reported IIS6 a WebDAV loophole, foreign media today reported that hackers have exploited this loophole in the United States, Indiana University of the server breached. Hackers did not waste a bit of time because it was Monday, just a few hours, before the leaks were published and exploited. As of Tuesday, the university's servers were still not repaired successfully and were expected to be fully repaired by Thursday or Friday. The US Computer Emergency Response Team recently revealed that the IIS6 WebDAV vulnerability found last week has been used in the attack, which is secured by the computer ...

Microsoft IIS6 Vulnerability: Server sensitive information easily stolen

Security experts recently warned administrators using Microsoft Internet Information Services IIS 6 that Web servers are vulnerable to attacks and expose password-protected files and folders. It is reported that this vulnerability exists in some process commands based on WebDAV protocol. By adding some Unicode characters to the Web address, hackers can access these sensitive files, which are generally protected by a system password. In addition, the vulnerability can be used to upload malicious files to the server. Nikolaos Rangos safety researcher said, "W ...

Beijing netcom Domain name error correction server suspected ARP attack was hanged horse

"51cto.com comprehensive report" 17th early morning, Jinshan poison PA anti-virus warning system found that Beijing Netcom domain name error correction server suspected ARP attack was hanged horse. Jinshan Poison PA Anti-Virus engineer said, when the user visited a Web site has no longer exist, the domain name error correction system will come out of the hint that the site does not exist, but at the same time show the error correction page has been hanging horse. Once the user landed on the site of the horse, most likely encounter Trojan attack. It is understood that the incident will affect a large number of national Netcom Internet users. Jinshan Poison PA Anti-Virus engineer The first time analysis: The target URL: ...

Linux System VPS Server Entry level Security Configuration Guide

Although Linux is more secure than Windows, some simple security configurations are necessary. There are a lot of tools on the Internet to scan your admin password with a dictionary, we can create some trouble and increase the possibility of being deciphered. Take a look at the entry level security configuration. First: Remote management port modifies SSH's landing port, and the default port is 22. Scan Dictionary Poor lift password They all start with the default. If you change the port to a 4-digit number, it greatly increases their difficulty and time. Edit SSH configuration with vi command ...

How to configure Server for NFS under Linux

The network filesystem (nfs,network file system) is a mechanism by which partitions (directories) on a remote host are mounted over the network to the local system, which enables users to share partitions (directories) on the remote host, as if they were operating on the local system, by supporting the network file system. . In the development of embedded Linux, developers need to do all the software development on the Linux server, cross compile, the general FTP way to download the executable file to the embedded system operation, but this way not only effective ...

Build station application M.dot push new version to reduce user threshold

"Sohu It Message" M.dot is a mobile phone to create a website application, just use the preset template, minutes to create a beautiful mobile site. Today the application ushered in upgrades, fixes bugs, and added some new features. 1, the new version simplifies the user's first run of the process, no need to register can be directly through the "test" account to create a website. It should be noted that the test account is only temporary, the subsequent want to visit the creation of the mobile site or need to register an official account. 2, bring the new website domain name setting process, click "Set website address", can obtain a ...

Lenovo intends to enter the server market in 2015, the top three accounted for 10% share

Phoenix Science and technology news June 5, Lenovo Global Server Division general Manager Gao Wenping said today, Lenovo plans to 2015 for the global server manufacturers of the top three, it is intended to sell more than 1 million servers, occupy the server market share of 10%. At present, Lenovo server's annual sales volume of 200,000 units. The Gao Wenping was made at Lenovo Thinkerserver RD630 Server conference. Gao Wenping said that in order to achieve the above goal, Lenovo will be based on the Chinese market, and gradually to expand the server market ranked the top eight of the world to expand, its ...

Total Pages: 1204 1 .... 71 72 73 74 75 .... 1204 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.