RHEL account Summary 1: Account type, rhel account summary category
An account is used to record data of a single user or multiple users. Every legal user in RHEL must have an account to use RHEL.
There are two types of accounts on RHEL:
User
Prevent hackers from intruding into the Windows system you are using
When hackers intrude into a host, they will try to protect their "labor results". Therefore, they will leave various backdoors on the zombie to control the zombie for a long time,
Prevent hackers from hacking into the Windows system you are using
When hackers invade a host, will find ways to protect their "labor results", so will leave a variety of back door on the broiler to a long time to control the broiler, which is the
Original article reprinted, please note: Reprinted from guanwei blog [http://www.guanwei.org/]Link: http://www.guanwei.org/post/platformsecurity/11/windows-hide-user.html
When hackers intrude into a host, they will try to protect their "labor
Security settings need to know somethingI. Summary The analysis of the security Account manager structure was done one months ago, only fragmentary records of fragments, not published. The main reason for not publishing is that the Security
Security Account Manager (SAM) structure [10-01-13] category [Sam] Author: refdom
From: refdom_at_263.net
Introduction: Microsoft Windows uses the Sam file to store information about the login account.
I. Summary
Ii. About sam
Iii. Structure of the
What security settings do not need to knowI. Summary The structure of the security account manager was analyzed for more than a month ago. It only recorded fragments in parts and was not released. The main reason for not publishing is that the
I. SummaryII. About SAMIII. Structure of the SAM Database in the RegistryIV. structure and main content of the SAM DatabaseV. Conclusion on SAM Database Analysis
I. Summary
The structure of the security account manager was analyzed for more than a
One, the "command prompt" in the conspiracyIn fact, the production system hidden account is not very advanced technology, using our usual "command prompt" can be used to create a simple hidden account.Click "Start" → "Run", enter "CMD" to run
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.