Open relay are generally not open on many servers
However, some servers support open.
But the above services are based on the hardware environment!
I think the people think, I thought of a way to use virtual relay!
Intercepts the string that the user will send at the end of the @, spelling it into a mailserver, The mailserver that the sender is sending is the mailserver I intercepted. In this way, Mailsmtps
following content:From:[email protected]To:[email protected]Subject:test Email from SMTPThis was a test email sent from my SMTP server2) Copy the Email.txt to the following path C:\inetpub\mailroot\pickup650) this.width=650, "height=", "title=" clip_image014 "style=" margin:0px;border:0px;padding-top:0px;padding-right : 0px;padding-left:0px;background-image:none; "alt=" clip_image014 "src=" http://s3.51cto
box is displayed: enter the domain name, which must be the domain name of the mailbox on the Internet, or the part after the @ you sent the email. 5. Right-click "SMTP virtual server" and select "properties ", here, "access"-"relay restrictions" and "pass"-"advanced" Settings (the domain name is set to your own domain name, PS: Fully Qualified Domain Name, I used the local prefix, you can also skip this
smtp.php
Copy CodeThe code is as follows:
Class SMTP
{
/* Public Variables */
var $smtp _port;
var $time _out;
var $host _name;
var $log _file;
var $relay _host;
var $debug;
var $auth;
var $user;
var $pass;
/* Private Variables */
var $sock;
/* Constractor */
function smtp ($re
Network Scanning and sniffing tool Nmap in the penetration test tutorial of KailLinuxNetwork Scanning and sniffing tool Nmap Network scanning and sniffing tool-NmapNmap is a free and open Network scanning and sniffing tool. This tool
-ddos-simulator/
5, R-u-dead-yet
R-u-dead-yet is an HTTP POST Dos attack tool. It executes a Dos attack long form field, which is submitted by post method. This tool provides an interactive console menu, detects a given URL, and allows users to choose which tables and fields to use for post-based Dos attacks.
Download: https://code.google.com/p/r-u-dead-yet/
6. Tor ' s Hammer
Tor ' Hammer is another good DO
DOS test tool. It's written in Python. This tool has an additional advantage: it can execute attacks via the Tor anonymous network. This is a very effective tool that can kill Apache and IIS servers in a matter of seconds.
Download Tor ' hummer:http://packetstormsecurity.com/files/98831/
7, Pyloris
It is said that Pyl
, Ddosim-layer
Ddosim is another popular Dos attack tool. As the name suggests, it is through simulation to control several zombie hosts to perform DDoS attacks. All zombie hosts create a full TCP connection to the target server.
This tool is written in C + + and runs on Linux systems.
These are the main features of Ddosim:
Simulate several zombie attacks
random IP address
tcp-connection-based attack
Applic
Hitchhiker is an open-source, Restful API testing tool that supports multiplayer collaboration, supports schedule, data comparison, stress testing, support for scripting requests, and can be easily deployed locally, collaborating with your team members to test the API.For more information, see: http://doc.hitchhiker-api.com/cn/introduction.htmlOnline experience: http://www.hitchhiker-api.com/, can be used t
Web site Performance Stress testing is an indispensable part of the performance tuning process of the server Web site. Only if the server is under high pressure, can the software, hardware and other improper settings be revealed.
Performance testing Tools The most common is the following: AB, Http_load, Webbench, siege. Today we specialize in introducing AB.
AB is a pressure test tool with the Apache self
Many Web stress testing tools are now charged, but Apache brings a free stress test tool, the AB tool (command). Specifically in the Apache root directory in the bin directory, find a Ab.exe file is. Use it to make a rough test of how your program is performing.
The specific usage is as follows, extracts from the net.
Before learning the LoadRunner agreement, I think we need to understand the basic concept of the agreement. First of all, we know that the communication between computer and computer is inseparable from the communication protocol, and then we say the concept of communication protocol. What is a communication protocol, a communication protocol is actually a set of rules and conventions. In a way, two or more computers must agree on what to do when communicating, such as file transfer or email, an
Recently in doing webservices, the data obtained is from the German side of the server. To integrate this data into the current Web site. Do not know how performance. Just do a stress test. Now some of the stress testing tools are charged. Bring a AB tool in the open source Apache. It's in C:\Apache2.2\bin\ab.exe. Use it to detect how your program is performing. Use it. , you can improve your code quality.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.