目前分類:一般文章分享 (185)
- Jan 09 Wed 2008 16:23
[轉貼] 完整的XSS wrom入侵實現流程
- Dec 27 Thu 2007 10:00
[轉貼]3個步驟結束網站惡夢-SQL注入隱患
- Dec 24 Mon 2007 13:54
[轉貼]Inside a Modern Malware Distribution System
- Dec 24 Mon 2007 12:06
[轉貼]各種端口的入侵方法(精)
- Dec 18 Tue 2007 13:09
Responding to a file-parsing application attack
- Dec 18 Tue 2007 11:50
Phishing Drills Teach Employees to Dodge the Hook
- Dec 12 Wed 2007 11:38
[轉貼]SQL入侵:爆庫原理和基本方法
- Dec 10 Mon 2007 11:49
[轉貼]淺談javascript函數劫持
- Dec 10 Mon 2007 11:45
[轉貼]Windows XP 核心驅動 secdrv.sys 本地權限提升漏洞EXP
- Dec 10 Mon 2007 11:43
[轉貼]Your PC Is Vulnerable Without Browser Protection
- Dec 10 Mon 2007 10:58
[轉貼]2008年網絡安全形勢嚴峻
- Dec 07 Fri 2007 10:31
Your PC Is Vulnerable Without Browser Protection
December 5, 2007
By Larry Seltzer
Look back at the security news three or four years ago and you'll see a "worm of the week" phenomenon in action. Malware was spread, and botnets created, through e-mail messages. These e-mail messages had attachments and social engineering that attempted to trick the user into running the attachment.
By Larry Seltzer
Look back at the security news three or four years ago and you'll see a "worm of the week" phenomenon in action. Malware was spread, and botnets created, through e-mail messages. These e-mail messages had attachments and social engineering that attempted to trick the user into running the attachment.
- Dec 04 Tue 2007 12:00
[轉貼]保護IT系統的100個絕招
IT系統,無論是軟件還是硬件,都日益成為企業日常運作不可或缺的支撐。於是,如何保護IT系統,使其安全平穩運行,發揮其業務支撐作用,成為IT支持人員的必修課。本期,我們精選了十個應用面比較廣泛的領域
,介紹100個保護IT系統的方法,供讀者參考。
,介紹100個保護IT系統的方法,供讀者參考。
- Nov 27 Tue 2007 10:47
Securing Your Web Browser
Will Dormann and Jason Rafail
US-CERT
This paper will help you configure your web browser for safer internet surfing. It is written for home computer users, students, small business workers, and any other person who works with limited information technology (IT) support and broadband (cable modem, DSL) or dial-up connectivity. Although the information in this document may be applicable to users with formal IT support as well, organizational IT policies should supersede these recommendations.
US-CERT
This paper will help you configure your web browser for safer internet surfing. It is written for home computer users, students, small business workers, and any other person who works with limited information technology (IT) support and broadband (cable modem, DSL) or dial-up connectivity. Although the information in this document may be applicable to users with formal IT support as well, organizational IT policies should supersede these recommendations.
- Nov 26 Mon 2007 11:35
「プロフィールが未設定となっております。」 Yahoo!を語るフィッシング?
備考:かなり古いブログですが公開し忘れしていた分です。
次のようなメールが来ました。一瞬、Yahoo!のメールかと思いました。
From: (profile_page_mail)@yahoo.com <profile_page_mail@yahoo.com>
- Nov 26 Mon 2007 11:24
Gadget Security
- Nov 23 Fri 2007 16:35
微軟修補程式管理流程
作業系統和應用程式經常是十分複雜的,其中可能包含由許多程式設計人員所寫的數百萬行程式。最重要的是軟體要穩定,不能危害到您 IT 環境的安全性和穩定性。如果要將發生問題的可能性降到最低,程式在發行之前就必須做過完整的測試,但駭客總會想盡辦法找出軟體的安全性漏洞來進行攻擊。
如果軟體發行後其程式或執行出現安全性漏洞,軟體廠商便會發行修補程式來處理。但隨著駭客數目增加、手法益形複雜,惡意程式利用安全性漏洞的情況也日增,這些問題逐漸地影響到安全性。然而,只在產品中加入需要的功能時,也有可能發生問題。
安全性修補程式對大部分公司都是一項挑戰。一旦軟體出現破綻,駭客通常便會迅速對外散佈這項消息,因此軟體廠商必須儘快寫出安全性設定修補程式。在修補程式部署之前,您所倚賴的安全性很可能已經嚴重減損。
無論您公司有多少部電腦,管理所有可用的修補程式、找出其中與您環境相關者,以及評估部署之前可作多少測試,這些都是艱困耗時的工作。
- Nov 19 Mon 2007 15:21
Cisco路由器安全配置方案
- Nov 05 Mon 2007 10:36
關閉IPC$ ADMIN$預設共享
- Oct 30 Tue 2007 16:14
[轉載]非常經典的Ms Sql注射資料
- 這篇文章限定好友觀看。
若您是好友,登入後即可閱讀。