Reprint description: "Memoirs of Dark Clouds" is a special topic produced by the technology we media "Light Black Technology". The vulnerability platform was shut down in 2016. A year later, I tried to visit people related to dark clouds to understand their views on network security, white hat hackers, and the world. May these records arouse more people's thinking. Everyone has his own position and reason
I haven't updated my blog for a long time, but I didn't think that the update was because my computer was infected with a virus... I can't help it. Who let me take the risk to click the trust button popped up by the anti-virus software! I remember that the last time my computer was infected with a virus in college, the virus infection seemed very serious, forcing me to clean all the grids. That painful lesson made me have the habit of using anti-virus software
Today Monday, I opened Baidu Statistics to watch the blog traffic, and was surprised: Top10 search words were even dominated by these keywords (how to activate one key traceless video, one key traceless video cracking version, one key traceless video mobile version, one key traceless video is true, one key traceless video is useful, one key traceless video is not exciting
Two days ago, I just saw the news of Bitcoin market, saying that 1 Bitcoin has exceeded 10000 yuan. At that time, I had a ha ha. This kind of "electronic currency", which is specially used to launder money, comes to the news from time to time to brush the sense of existence, and attracts some takers to continue to raise prices. Unexpectedly, a "Bitcoin virus" suddenly appeared in the past two days. For just two days, the news was full of bitcoin blackmail viruses
Today, I saw the news that the resume data of 58 cities were leaked, and 700 yuan could buy the national resume data. Another large-scale information leakage event? A resume, as its name implies, is a concise written introduction to one's education background, experience, expertise, hobbies and other relevant information. Resume is a standardized and logical written expression of targeted self introduction
Have you downloaded Xiaojingdong V5.0 multi merchant version | B2B2C mall system source | with touch screen version+WeChat+repair payment program of a three-level distribution mall of a source code forum? The compressed package file name is: Xiaojingdong V5 multi merchant version of the three-level distribution mall @ Jinshang China. rar. If yes, please note that the source code of this program has a back door, and it is webshe
Let's take a look at this super long picture first. Here is a reminder for everyone to be careful about leaving privacy information on the network! At the same time, I often change my password. It took a long time for the siege lions and program apes on the Sky Bug Vulnerability Response Platform to sort out such a beautiful picture. What is sorted out here is only the part that has been publicized. In fact, there are a lot of databases of many enterprises circulating underground
Another large-scale password leakage event! I think it might be on CCTV! Today, someone on the dark cloud said: "It's New Year's Day, many black cattle are dying. I saw the data of 12306 spreading just now, and I even have my own sensitive data, alas..."... PS: The data is only for dissemination and sale. At present, we can't confirm whether it is the official 12306 or the No
The server did not know which domain name was attacked by NTP, so it came to study the countermeasures. The following article is reproduced: NTP amplification attack was very active a while ago, now let's briefly analyze it. Attack principle: 1. Take advantage of the natural vulnerability of UDP protocol, that is, you can directly send data to the client without establishing a connection in the early stage; 2. On the Internet
Today, the server was inexplicably blocked by the computer room's IP address, saying that it was attacked by a large amount of traffic (all of them are websites without weight, who would be bored to attack?), so I quickly changed an IP address and installed a version of the security dog server on the server. I thought I would not be afraid of being attacked now! Unexpectedly, the IP was blocked again after half a day. What's the matter? Ask the space merchant