/directories need to be checked, but the default setting can meet most requirements, it runs in four modes: Database generation mode, database update mode, file integrity check, and interactive database update. When the database is initialized, it generates database files for various information about existing files. In case your system files or configuration files are accidentally changed, replaced, or deleted, it compares existing files based on the original database every day to find out whic
Article Title: Ubuntu Security Settings guide and related tools. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
If you are a new starter from Windows to Ubuntu, you will obviously feel the security performance of Ubuntu. At l
How can I skillfully configure two security tools to prevent brute-force attacks?Introduction to brute force attacks
We all know this buzzword: "Prevention is better than treatment ." If you are a Linux system administrator, you may know how a "brute-force attack application" can cause problems on your local or remote server. Imagine: If your server is attacked by unknown attackers, the data on the server w
The following describes some security tools that can be used for Linux. These tools will play a role in curing your server and can solve various problems. Our focus is to let you know about these tools. We will not give a detailed introduction to the installation configuration and usage. Some
1. Privacy and security always exist
When real-time messages are generated, you need to pay attention to potential risks of malicious hackers entering your computer through ICQ, including enhanced firewall and security.Code. Although this is the case, the main IM client has not experienced some major virus outbreaks, but the hidden danger of malicious behavior always exists. E-mail users have been surrounded by a variety of viruses and are on high a
This section describes the process of updating Kali and the configuration of some additional tools. These tools will be useful in later chapters. Kali software packages are constantly being updated and released, users quickly discover a new set of tools that are more useful than the packages originally downloaded on DVD rom. This section obtains an activation cod
analysis Tools : Grab Bag Tool: Wireshark (most used), HttpWatch,tcpdumpburp Suite: Common HTTP analysis tools, have a very evil usage;Fiddler: The main monitoring HTTP and HTTPS, not much use;
Vulnerability Scanning Tool : AppScan: One of the most commonly used tools in the industry, a lot of information http://www.cnblogs.com/fnng/archive/2012/05/27/2520594. H
[Original] Three security testing tools www.microsoft.com (Microsoft official) are recommended
1Microsoft Source Code Analyzer for SQL Injection
Official download: http://www.microsoft.com/downloads/details.aspx? Familyid = 58a7c46e-a599-4fcb-9ab4-a4334146b6ba displaylang = en this tool called mscasi can detect ASPCodeThe SQL Injection Vulnerability (ASP code is known as the SQL injection vulnerabi
parameters
Encrypt/Decrypt CMS information (pkcs#7)CMS [-cdes] [
-C Create a CMS encryption information
- D Decrypt CMS information
-E Create CMS package information
-S Create CMS signature information
Decryption options
-c
-h
-N Suppress content output
Encoding options
-R ID,... To create a package for the specified recipient, the ID can be certificate nickname or email adderess
-G contains signature time properties
-h
It's okay to tell you about Linux system security tools. Someone should want to know about Linux system security and so on. If you are not interested in this, you can skip this step.◆ Sxid: Check◆ Suid, sgid: And files without a master◆ Skey: one-time password Tool◆ Logrotate: log loop Tool◆ Logcheck: log management tool◆ Swatch: log management tool, which is mor
XCodeGhost indicates that development tools should be downloaded from the official website for security purposes.
Today's hot topic is the XCode compiler, which has also been used in the hot wave of mobile Internet. According to the article analysis (there is a ghost-XCodeGhost sample analysis in the XCode compiler) http://www.huochai.mobi/p/d/2125554/ domestic manufacturers have been in the move, your iPho
Article Title: List of Linux security tools. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Sxid
Check the suid, sgid, and files without the master in the system.
Skey
One-time password Tool
Logrotate
Log loop Tool
Logcheck
Log Management
Comments: I recently used an automatic IP Security policy setting tool on the server. The server is a web site with 80, 20, and so on. The server installs the eset anti-virus software (nod32) with a firewall. The system starts the firewall and only allows the corresponding port.Then directly run the "Win server filter policy .exe" (suitable for servers), but after the operation, 3389 cannot be connected. At first, the firewall or the anti-virus firewa
Encryption converts data from its original form to a form that can only be read by the decrypted. In essence, encryption aims to prevent unauthorized reading of data. Encryption technology can be elaborated from different perspectives. Today we only introduce the six most famous encryption tools.
1. GnuPG/PGP: These two tools can ensure advanced encryption of files and communications. PGP is a well-known en
Tp link 802.11n wireless network security connected to the encrypted network through TP-LINK management tools:
Step 1: TP-LINK management tool main program in the supporting Nic drive disc, we can run the installation wizard.
Step 2: Select "Install client utility and driver" in the installation type, and click "Next" to continue.
Step 3 connecting to the encrypted network: By default, the wireless client
1. zenoss
Zenoss is an enterprise-level open-source server and network monitoring tool. It is most notable for its virtualization and cloud computing monitoring capabilities. It is hard to see that other old monitoring tools have this function.2. ossim
Ossim is short for open source security information management (Open Source security information manag
I sorted out two network security scanning tools under Ubuntu and shared them with friends who like ubuntu. Nbtscan --- collect NetBIOS information from a Windows network Tool Name: nbtscan-1.5.1a application environment: Linux tool Introduction: This is a program used to scan NetBIOS Name Information on a Windows network. This program sends a NetBIOS status query to each address in the given range, and lis
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.