-
Server security maintenance Once I saw an article about server security in a station and wrote it down. It can be regarded as reprint Now there are more and more friends catching chickens. Many hackers like to play chicken. Half of them catch port 1433 3360 135. I won't explain the port. After they catch the server, they will add accounts to the server and use the server to catch chickens. Many forums have published some scripts about server maintenance, which is impossible to prevent with the development of the network. Although there are many ways to do harm to Trojan horses, they never change .. read the whole passage Author: qxz_xp | Published: November 12, 2013 | Classification: Intrusion detection , network security | No comment read the whole passage
Blog Search
Blog Calendar
|
|
|
|
|
|
|
---|---|---|---|---|---|---|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | |
|
Recent articles
-
The blogger recommends a special price of 99 yuan for [Alibaba Cloud] ECS! The special is on sale. Opportunities cannot be missed! -
WIFI master key (except advertising display password version) -
Code editor (Notepad++) v7.6.4 Chinese free version -
Users should be alert. The NFC function of Android phones can intercept the interactive data of contactless IC cards -
Learn about the post penetration tool Koadic -
Low cost production of penetration artifact based on OpenWRT -
Mobile phone penetration test artifact zANTI v2.5 released (including full Chinese version) -
WeChat exposes remote arbitrary code execution vulnerability, which can be controlled remotely -
Burpsuite 1.7.03, the latest cracked version of penetration artifact -
How to deal with old mobile phones, which 99% of people don't know
file
-
July 2024 -
August 2018 -
July 2018 -
January 2018 -
December 2017 -
September 2016 -
August 2016 -
March 2016 -
December 2015 -
November 2015 -
October 2015 -
September 2015 -
August 2015 -
July 2015 -
June 2015 -
May 2015 -
April 2015 -
March 2015 -
February 2015 -
January 2015 -
December 2014 -
November 2014 -
October 2014 -
September 2014 -
August 2014 -
July 2014 -
June 2014 -
May 2014 -
April 2014 -
March 2014 -
February 2014 -
January 2014 -
December 2013 -
November 2013 -
October 2013 -
September 2013 -
August 2013 -
July 2013 -
March 2013
Blog Directory
-
Computer maintenance (22) -
Other technologies (8) -
Desktop maintenance (5) -
Display maintenance (3) -
computer software (3) -
Notebook maintenance (4)
-
-
Website operation (65) -
Seo optimization (45) -
News (3) -
Online entrepreneurship (8) -
Website construction (10) -
Website promotion (7)
-
-
network security (89) -
Intrusion detection (6) -
Safety knowledge (27) -
Latest information (21) -
Vulnerability announcement (35) -
Virus warning (8)
-
-
Tencent QQ (81) -
QQ personal signature (10) -
QQ personality net name (18) -
QQ avatar (45) -
QQ technology (6) -
QQ Zone (4)
-
-
Hacker attack and defense (486) -
Industry News (178) -
Social worker related (27) -
Rookie Entry (119) -
Hacker Tools (105) -
Hacker technology (139)
-
Cloud tag
Latest log Hot evaluation log Random log
-
The blogger recommends that the special price of [Alibaba Cloud] ECS is only 9 -
WIFI master key (except advertising display password version) -
Code editor (Notepad++) v7.6.4 Chinese free -
Users should be alert. The NFC function of Android phones can be intercepted -
Learn about the post penetration tool Koadic -
Low cost production of penetration artifact based on OpenWRT -
Mobile phone penetration test artifact zANTI v2.5 released (including -
WeChat exposes remote arbitrary code execution vulnerability, which can be controlled remotely -
Burpsuite 1.7.03, the latest cracked version of penetration artifact -
How to deal with old mobile phones, which 99% of people don't know
-
How to arrange the diversified outer chain of website SEO -
Grace bag, head style, fashion with words, head portrait If you choose me -
Five aspects of website seo -
Loic low orbit ion gun anonymous hacker uses magic weapon -
The router is accessed by hackers on Taobao, but it is "Taobao Special" -
Talking about the technical idea of wireless attack -
2014 Hacker Conference: How to solve everything -
Combined with man in the middle attack, the Pidgin chicken rib vulnerability becomes obsolete -
Top 10 Horror Stories of 2013 Blackhat Conference -
Hackers follow lottery websites to strengthen their awareness of prevention
Recent comments
-
Hello Published on《 30G database sharing of SoCloud social work database 》 -
It's foggy Published on《 Seven Walker IP Agent Verification V1.4 IP Agent Software 》 -
Yui Published on《 30G database sharing of SoCloud social work database 》 -
wind Published on《 The blogger recommends a special price of 99 yuan for [Alibaba Cloud] ECS! The special is on sale. Opportunities cannot be missed! 》 -
Strange Published on《 [Announcement] This site is not stable or not connected to this site 》