• How to deal with old mobile phones, which 99% of people don't know

    Internet technology is changing with each passing day, and mobile phone products are constantly updated and iterated. I believe that many small partners are the same as Xiao Bian. Kidney 3, Kidney 4, Kidney 5, Kidney 6, Kidney 7 is coming soon. What about updating old mobile phones? Where have all your old mobile phones gone? When the Internet has completely penetrated into all aspects of our lives, the recycling of second-hand mobile phones will naturally be thought of through the Internet. As a result, online second-hand 3C product trading platforms, such as idle fish, have gradually become popular, and even O2O recycling platforms, such as AiRecycle, are constantly targeting this increasingly read the whole passage
    Author: qxz_xp | Published: March 22, 2016 | Classification: Safety knowledge , network security | 27 comments
  • Prevent hackers from sharing wifi attack methods

    It has to be said that people have become more and more inseparable from wifi. Although desktop computers or laptops also contain network cable interfaces, they have basically been abandoned. This is especially true for mobile tablets. They can only use operator networks and wifi to access the Internet. Once smart homes become popular, The application field of wifi will also be greatly expanded. The biggest advantage of wifi is that it is convenient and fast without wiring, but it is inherently weak in stability and security. Hackers break through wifi devices to obtain user information is not uncommon. In short, wi... read the whole passage
    Author: qxz_xp | Published: November 30, 2015 | Classification: Safety knowledge , network security | 4 comments
  • Approaching Science: Go to the Black Market on Weekends

    The network black market, as its name implies, is a place on the web where "malicious" services and illegal goods can be bought, sold or leased. Data Value Calculator The black market is experiencing rapid growth, and underground crime is becoming more and more popular. The most profitable product in the black market is user personal information, which is often the purpose of cyber crime. As a global leader in the field of network security software and services, Trendmicro released a network calculator that can calculate the value of data: The author here through read the whole passage
    Author: qxz_xp | Published: June 12, 2015 | Classification: Safety knowledge , network security | No comment
  • By setting the route like this, 99.9% of hackers can't break it

    Routing security is a big topic. The background settings of the router are too professional, and the network card is popular. The legendary hacker seems to have disappeared... It seems that the router at home is hopeless. As long as there is a hacker who knows something about it, he will be attacked every minute. Zhaikejun (public account "Letshome") has previously discussed this topic from multiple perspectives, including technical analysis, testing, protocol specification traceability, etc. However, in these things, there is no talk about the security mechanism of routing itself that has been developed for many years. We ignored the heaviest read the whole passage
    Author: qxz_xp | Published: October 18, 2014 | Classification: Safety knowledge , network security | 7 comments
  • Vulnerability science: Do you attach importance to weak passwords?

    In today's world where user name and password are used as authentication in many places, the importance of password can be imagined. Password is the key to enter your home. When someone has a key to enter your home, think about your security, your property, your privacy... Be afraid. Because weak passwords can be easily guessed or cracked by others, it is very dangerous if you use weak passwords, just like putting the door key under the mat at the door. In the last few days, I submitted weak passwords of multiple telecommunications systems on the vulnerability platform, and read the whole passage
    Author: qxz_xp | Published: September 1, 2014 | Classification: Safety knowledge , network security | No comment
  • Research on Nginx Security Configuration

    0 × 00 test environment Operating system: CentOS6.5 Web server: Nginx1.4.6 Php version: Php5.4.26 0 × 01 Nginx Introduction Nginx itself cannot process PHP. It is just a web server. After receiving a request, if it is a PHP request, it sends it to the PHP interpreter for processing and returns the result to the client. Nginx generally sends the request to the fastcgi management process for processing, The fastcgi management process selects the cgi sub process processing results and returns them to nginx. Nginx involves two accounts, one is the running account of nginx read the whole passage
    Author: qxz_xp | Published: June 6, 2014 | Classification: Safety knowledge , network security | No comment
  • 10 ways for hackers to crack network passwords

    Breaking network password - violent exhaustion The most basic technology of password cracking is brute force cracking, also known as password exhaustion. If the hacker knows the account number in advance, such as the email account QQ user account, online bank account, etc., and the user's password is set very simply, for example, with a simple combination of numbers, hackers can quickly crack the password using brute force cracking tools. Therefore, users should try to set passwords more complex. Cracking network password - keystroke record If the user password is more complex, it is difficult to use the method of violence exhaustion read the whole passage
    Author: qxz_xp | Published: May 9, 2014 | Classification: Safety knowledge , network security | No comment