• Approaching Science: Go to the Black Market on Weekends

    The network black market, as its name implies, is a place on the web where "malicious" services and illegal goods can be bought, sold or leased. Data Value Calculator The black market is experiencing rapid growth, and underground crime is becoming more and more popular. The most profitable product in the black market is user personal information, which is often the purpose of cyber crime. As a global leader in the field of network security software and services, Trendmicro released a network calculator that can calculate the value of data: The author here through read the whole passage
    Author: qxz_xp | Published: June 12, 2015 | Classification: Safety knowledge , network security | No comment
  • Lightweight website vulnerability batch scanning artifact

    Lightweight website vulnerability batch scanning artifact (website vulnerability detection tool) is a green and free website vulnerability scanning and detection tool. The software is powerful. It can test the security of your website through web crawlers and detect popular attacks, such as cross site scripts, SQL injection, etc., can be used to crack small websites, help us find various vulnerabilities effectively and quickly, increase the security of websites, and immunize against various network attacks in advance. How to use lightweight website vulnerability batch scanning artifact 1. Right click on the left margin of the software and select "Import Site" (event read the whole passage
    Author: qxz_xp | Published: November 9, 2014 | Classification: Hacker Tools , Hacker attack and defense | No comment
  • "Heart Bleeding" Confirms to Affect Mobile Phone Antian Launches Detection Plug in

    The OpenSSL "heart bleed" vulnerability is far more serious than expected. Some users have not considered that a large number of applications on mobile phones also require account login, and many of their login services are built by OpenSSL. Therefore, before the vulnerability is repaired, it is very easy to lose user account information by logging into online banking, online shopping and other important accounts with mobile phones. The password needs to be changed in time after the vulnerability is patched. After the news of "vulnerability" broke out, the AVL mobile security team under Antian quickly accessed the login portal of mainstream online banking, online shopping, securities, and airline travel software read the whole passage
    Author: qxz_xp | Published: April 11, 2014 | Classification: Vulnerability announcement , network security | 1 comment
  • OpenSSL vulnerability redirects to personal computer 360's first repair plan

    The radiation range of OpenSSL "heart bleeding" vulnerability is expanding. At Cisco After Juniper network equipment is exposed to the impact of this vulnerability, A large number of software on Windows has also been found to have vulnerabilities, which can be used by hackers to attack Internet users' computers and capture private data such as keys. The attack code has been published on GitHub, a foreign technology website. In this regard, 360 security guards launched an emergency vulnerability repair program on the evening of the 10th, which is the only PC security software that can prevent this vulnerability at present. When the "heart bleeding" vulnerability was just exposed, hackers mainly attacked read the whole passage
    Author: qxz_xp | Published: April 11, 2014 | Classification: Vulnerability announcement , network security | 2 comments
  • Sharing experience Three disciplines of server security

    With the rise of e-commerce, many small and medium-sized enterprises have their own servers. Internally, it is used to establish a LAN to improve office efficiency; Establish a website to publicize the products and image of the enterprise more widely and strive for more customers. However, as the core product of the network, the server technology is relatively complex, especially in the era of virus ridden network, the security problem becomes more prominent. The author has been managing the server and checking its security in the company for some time, and has accumulated some experience in practical work, hoping to share it with everyone. 1、 Enhanced Network read the whole passage
    Author: qxz_xp | Published: January 29, 2014 | Classification: Intrusion detection , Safety knowledge , network security | No comment
  • Web Bugs: Behind the Scenes of User Privacy

    Write in front In fact, before I translated this article, I thought it might be a client script based technology, similar to xss. But through translation, I learned that web bugs are usually written by client server scripts. Compared with some hackers who use it to invade, it is more official to use web bugs to collect user information without the user's knowledge. Introduction Nowadays, the Internet technology has made great changes in people's daily life. People exchange information with each other through the mouse and keyboard. The complexity of information read the whole passage
    Author: qxz_xp | Published: January 14, 2014 | Classification: Hacker technology , Hacker attack and defense | No comment
  • Artifacts WebRobot v1.5.7 Quick Sidenote Tool

    Artifacts WebRobot v1.5.7 Quick Sidenote Tool The functions are as follows: 1. Batch detection (batch search for injection points and sensitive files for fast and efficient detection of network security) 2. Sidenotes 3. Added the last file directory scanning tool 4. You can add keywords with vulnerabilities to search 5. Grab all links of the specified page 6. Get the content of page explosion error, and add keywords by yourself 7. Other functions will be added later depending on the situation Update the following 1. [Grab link] Add Google and Baidu search read the whole passage
    Author: qxz_xp | Published: October 31, 2013 | Classification: Hacker Tools , Hacker attack and defense | 2 comments