-
Server security maintenance Once I saw an article about server security in a station and wrote it down. It can be regarded as reprint Now there are more and more friends catching chickens. Many hackers like to play chicken. Half of them catch port 1433 3360 135. I won't explain the port. After they catch the server, they will add accounts to the server and use the server to catch chickens. Many forums have published some scripts about server maintenance, which is impossible to prevent with the development of the network. Trojans are harmful. Although there are many means, they can never change read the whole passage Author: qxz_xp | Published: November 12, 2013 | Classification: Intrusion detection , network security | No comment read the whole passage
Blog Search
Blog Calendar
|
|
|
|
|
|
|
---|---|---|---|---|---|---|
| | | | | |
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | |
|
Recent articles
-
The blogger recommends [Tencent Cloud Server] to sell 2-core 2G cloud server for 40 yuan in the first year, and the opportunity cannot be missed -
WIFI master key (except advertising display password version) -
Code editor (Notepad++) v7.6.4 Chinese free version -
Users should be alert, The NFC function of Android phone can intercept the interactive data of non-contact IC card -
Learn about the post penetration tool Koadic -
Low cost production of penetration artifact based on OpenWRT -
Mobile phone penetration test artifact zANTI v2.5 released (including full Chinese version) -
WeChat exposes remote arbitrary code execution vulnerability, which can be controlled remotely -
Burpsuite 1.7.03, the latest cracked version of penetration artifact -
How to deal with old mobile phones, which 99% of people don't know
file
-
April 2022 -
August 2018 -
July 2018 -
January 2018 -
December 2017 -
September 2016 -
August 2016 -
March 2016 -
December 2015 -
November 2015 -
October 2015 -
September 2015 -
August 2015 -
July 2015 -
June 2015 -
May 2015 -
April 2015 -
March 2015 -
February 2015 -
January 2015 -
December 2014 -
November 2014 -
October 2014 -
September 2014 -
August 2014 -
July 2014 -
June 2014 -
May 2014 -
April 2014 -
March 2014 -
February 2014 -
January 2014 -
December 2013 -
November 2013 -
October 2013 -
September 2013 -
August 2013 -
July 2013 -
March 2013
Blog Directory
-
Computer maintenance (22) -
Other technologies (8) -
Desktop maintenance (5) -
Display maintenance (3) -
computer software (3) -
Notebook maintenance (4)
-
-
Website operation (65) -
Seo optimization (45) -
News (3) -
Online entrepreneurship (8) -
Website construction (10) -
Website promotion (7)
-
-
network security (89) -
Intrusion detection (6) -
Safety knowledge (27) -
Latest information (21) -
Vulnerability announcement (35) -
Virus warning (8)
-
-
Tencent QQ (81) -
QQ personal signature (10) -
QQ personality net name (18) -
QQ avatar (45) -
QQ technology (6) -
QQ Zone (4)
-
-
Hacker attack and defense (486) -
Industry News (178) -
Social worker related (27) -
Rookie Entry (119) -
Hacker Tools (105) -
Hacker technology (139)
-
Cloud tag
Latest log Hot evaluation log Random log
-
The blogger recommends [Tencent Cloud Server], a popular 2-core 2G cloud service -
WIFI master key (except advertising display password version) -
Code editor (Notepad++) v7.6.4 Chinese free -
Users should be alert, The NFC function of Android phone can be cut -
Learn about the post penetration tool Koadic -
Low cost production of penetration artifact based on OpenWRT -
Mobile phone penetration test artifact zANTI v2.5 released (including -
WeChat exposes remote arbitrary code execution vulnerability, which can be controlled remotely -
Burpsuite 1.7.03, the latest cracked version of penetration artifact -
How to deal with old mobile phones, which 99% of people don't know
-
Analysis of several reasons why the website was demoted! -
Hackers: Loneliners at Crossroads -
Code editor (Notepad++) v7.6.4 Chinese free -
Hacker Intelligence Action Report PHP's Super Puzzle -
Word Segmentation Technology of SEO Optimization Search Engine Algorithm -
Breaking asterisk passwords on web pages without tools (code method) -
Several Common Methods of Intruding Designated Websites -
Add statistics code to wordpress blog -
Arrogant boys win the game and lose you -
Sad girl signature file, I'm your helpless choice
Recent comments
-
Hello Published on《 30G database sharing of SoCloud social work database 》 -
It's foggy Published on《 Seven Walker IP Agent Verification V1.4 IP Agent Software 》 -
Yui Published on《 30G database sharing of SoCloud social work database 》 -
wind Published on《 The blogger recommends [Tencent Cloud Server] to sell 2-core 2G cloud server for 40 yuan in the first year, and the opportunity cannot be missed 》 -
Strange Published on《 [Announcement] This site is not stable or not connected to this site 》