Enhance Linux Desktop Security
Introduction
Malicious attacks on computers are becoming increasingly popular. The GNU/Linux virus exists despite the much fewer viruses used to attack the GNU/Linux system than the Windows system. In addition, the
Enhance Linux Desktop SecurityIntroduction
Malicious attacks on computers are becoming increasingly popular. The GNU/Linux virus exists despite the much fewer viruses used to attack the GNU/Linux system than the Windows system. In addition, the
This article summarizes some of the strange c&c control servers I've seen in my safe work. The design method of the controller server and the corresponding detection method, in each C&c Control service first introduces the Black Hat part is the C&C
Shellshock vulnerability review and analysis test
0x00 vulnerability Overview
Many may have a deep memory of the Heartbleed Bug in the first half of 2014. In September 2014, another "destruction-level" vulnerability-Bash software security
This article translates from Digitalocean's Introduction to securing your Linux VPS, which is recommended to read the original. Previously posted in the OSC translation area, has been audited, had to publish to the blog this
ObjectiveTaking
No software system is absolutely secure. In general, risks in the Android system can be summarized into five categories. We recommend that you take precautions against each risk.
The first risk is misuse of application permissions. There are the
SQL Injection Tool: SqlmapDNS Security monitoring: DnsreconBrute Force test Tool: PatatorXSS Vulnerability exploit tool: XsserWeb Server Stress test tool: HULKSSL Security Scanner: SslyzeInternetScapy:send, Sniff and dissect and forge network
Document directory
Wireshark
NMAP
Metasploit
Openvas
Aircrack
Nikto
Samurai framework
Safe3 133
Websecurify
Sqlmap
Modern data centres deploy firewalland managed networking components, but still feel insecure because of crackers. hence,
One, Android security mechanism analysis (2012 "Exploration and observation")Safety design principles for 1.Android(1) By default, applications running under the Android platform do not have permissions to perform actions that are harmful to other
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.