computer security tools

Read about computer security tools, The latest news, videos, and discussion topics about computer security tools from alibabacloud.com

Tools for sharing computer networks using WiFi

Share a tool that allows you to use wifi to share your computer network. By default, the Windows Wi-Fi shared kernel is used to share the network. Therefore, the Mac OSX version is not provided. Application: ★★★Protocol of use★★★ 1. This tool is green software and does not contain any drivers. You do not need to install it. Download the tool and decompress it to use it. If the security software reports th

Three tools to reinforce the security performance of Firefox

The reason we like open-source software like Firefox is simple: it is secure and has many easy-to-use extension plug-ins. With these good stuff, we can browse the network and receive emails with confidence. Nowadays, more and more extensions are developed for Firefox. Next, let's take a look at the three major tools that let us turn Firefox into a powerful weapon. However, in other words, these extensions are not designed to enhance the

The mainstream browser developer tools (F12) are superior and inferior in security testing

xhr data, use tamper IE tool, can only intercept URL, and very inconvenient.  0x05 ConclusionIn the case of the Web app supporting the above three browsers, the actual testing of Firefox developer tools to meet the needs of security testing, chrome and IE F12 can not be changed XHR post data (Tamperdata also cannot change).From the convenience of use and the effect of the interface, Chrome>firefox>ie.Integ

Powerful cryptographic tools in Spring Security 3.1 passwordencoder

Powerful cryptographic tools in Spring Security 3.1 passwordencoderBlog Category: Security Spring SpringsecurityOK, this encryption mechanism is very complex, or to see better understanding:New Passwordencoder inheritance relationship in 3.1.0 versionAfter the Spring-security 3.1.0 release, the passwor

Use 360 security defender one key to optimize the computer to boot up

A friend who often uses a computer will often experience the problem of slow startup speed. Slow down on the one hand, due to too many startup items, on the other hand, because the system garbage files are not cleaned up in time, the defragmentation is not slow. Using the 360 security defender "Advanced tools" in the "power up" to intelligently analyze your

Lynis 2.2.0: Security Review and scanning tools for Linux systems

Lynis is a very powerful open-source review tool for Unix/linux-like operating systems. It scans the system for security information, general system information, installed software and available software information, configuration errors, security issues, user accounts without passwords, incorrect file permissions, and firewall reviews. Lynis is a very powerful open-source review tool for Uni

Web security practices (5) global tasks and automated tools for web Application Analysis

Author: Xuan soul Prerequisites: None This series navigation http://www.cnblogs.com/xuanhun/archive/2008/10/25/1319523.html Security Technology Zone http://space.cnblogs.com/group/group_detail.aspx? Gid = 100566 Preface The web security practice series focuses on the practical research and some programming implementation of the content of hacker exposure-web Application

10. VMware Tools Security

CP/CDROM/vmware-linux-tools.tar.gz/tmp # Upload vmware-linux-tools.tar.gz to/tmp CD/tmp # Import/tmp Resource Tar zxvf vmware-linux-tools.tar.gz # Resolving strongswan CD vmware-tools-distrib # Import vmware-tools-distrib Information /Vmware-install.pl # Start Security The hosts of the security

Ubuntu Security Settings guide and related tools

Article Title: Ubuntu Security Settings guide and related tools. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. If you are a new starter from Windows to Ubuntu, you will obviously feel the security performance of Ubuntu. At l

Prevent computer from being controlled by others _ security related

Computer hackers can invade users ' computers using open ports and weak passwords or even empty password vulnerabilities. Hackers can access the other side of the network segment (or direct access to IP), using scanning tools (such as: Superscan, X-scan, etc.) scan the user's computer port and obtain IP, and then run the Client Connection tool (for example: Glaci

Security tools in Linux

system. Firestarter only occupies a small amount of system resources during running, providing quick and effective security protection for the Linux platform. In addition, you can promptly notify the administrator of system exceptions and related information to help the system administrator handle and respond to the system in a timely manner. After the fire starter Firewall runs the program, it is located in the task bar menu on the system desktop. I

Kali Linux Security Penetration Tutorial < third more >1.2 safety penetration tools Required

all the tools are preinstalled in a Linux system. Among them, the typical operating system. Is the Kali Linux used in this book.The system is mainly used for penetrant testing.It comes preloaded with a number of penetration testing software, including the Nmapport scanner, Wireshark (Packet Analyzer), and John the Ripper (password hack). and Aircrack-ng (a set of software for penetration testing of wireless LANs). Users can perform Kali Linux with ha

Limitations of web security testing tools

= ' 1111 ', email= ' [email protected] ' where uid= ' boy ', If a user modifies their password by setting the password to 1111 '--so that if there is a SQL injection vulnerability, the password for all registered users becomes 1111. Is there a loophole here? Yes! But can the tools be found? Unless you look at the database, you won't find this problem at all. Look at the second: The station message we used a lot of time, assuming that the message there

Defense skills from Bin Laden's computer security issues

Www.2cto.com: in fact, this is a rising advertisement, but the content is indeed worthy of reference. Let's take a look. Recently, the terrorist tycoon bin Laden was killed by the US military commandid and his personal computer was also seized. The news reported: "terrorists will be as hasty as ordinary people when using computers, for example, use a password that is easy to guess, do not encrypt sensitive files, and put unencrypted documents directly

How can I skillfully configure two security tools to prevent brute-force attacks?

How can I skillfully configure two security tools to prevent brute-force attacks?Introduction to brute force attacks We all know this buzzword: "Prevention is better than treatment ." If you are a Linux system administrator, you may know how a "brute-force attack application" can cause problems on your local or remote server. Imagine: If your server is attacked by unknown attackers, the data on the server w

Linux security tools: Sxid and Skey (1)

The following describes some security tools that can be used for Linux. These tools will play a role in curing your server and can solve various problems. Our focus is to let you know about these tools. We will not give a detailed introduction to the installation configuration and usage. Some

Research on computer network information security of modern enterprise

The function of network management includes configuration management, performance management, security management, fault management and so on. Network security management has gradually become an important part of network management technology due to network Security's performance and management, and it is being widely concerned by computer users. I. The unsafe f

Kali Linux Security Penetration Tutorial < third more >1.2 safety penetration tools Required

Irssi Dnstop LaBrea PowerTOP SSLstrip Nebula Mutt Bonesi Tripwire Nano Proxychains Prelude-lml vim-enhanced Prewikka Iftop Wget Prelude-manager Scamper Yum-utils Picviz-gui Iptraf-ng Mcabber Telnet Iperf Firstaidkit-plugin-all Onenssh Nethogs Vnstat Dnstracer

Linux network security tools-Johntheripper, Logcheck, and Tripwire

/directories need to be checked, but the default setting can meet most requirements, it runs in four modes: Database generation mode, database update mode, file integrity check, and interactive database update. When the database is initialized, it generates database files for various information about existing files. In case your system files or configuration files are accidentally changed, replaced, or deleted, it compares existing files based on the original database every day to find out whic

Introduction to Security testing tools (ongoing collection)

analysis Tools : Grab Bag Tool: Wireshark (most used), HttpWatch,tcpdumpburp Suite: Common HTTP analysis tools, have a very evil usage;Fiddler: The main monitoring HTTP and HTTPS, not much use; Vulnerability Scanning Tool : AppScan: One of the most commonly used tools in the industry, a lot of information http://www.cnblogs.com/fnng/archive/2012/05/27/2520594. H

Total Pages: 12 1 .... 4 5 6 7 8 .... 12 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.