You are here: hacking technology > network management > Content
Hot Articles
Recommend Articles
New Articles
Why can't hundreds of thousands of equipment block the hacker attack
  Add date: 07/10/2008   Publishing date: 07/10/2008   Hits: 41
Total 4 pages, Current page:1, Jump to page:
 
The security is a three-dimensional concept, is not an equipment support's plane

Withstands the hacker attack is not only the bank, more enterprises and the unit come under various hacker attack similarly, perhaps by now you will think why the firewall, IDS/IPS and so on safety protection equipment didn't have the invincible might? This article sub-Ming Jiang narrated that his personal experience, is the 51CTO general enterprise user Q/A dispels doubt.

Toot toot the ring tone, has alarmed my midnight's sleeping soundly, blurry indistinct hears in the telephone the anxious sound: “our government website suffered the hacker attack”, heard here me sleepiness to have nothing immediately, careful listened respectfully to the telephone that head's situation statement .......

After keeping abreast of the approximate situation, climbs up the network to open rapidly the stand which attacks, the page originally was already changed changes beyond all recognition. On the homepage first screen is the big crab which paces up and down, below adheres to stick cohere a slogan: “the father runs amuck rivers and lakes for several years, passed by chance, because recently was only agitated, takes this station to practice acquiring a skill especially”.

The solution is attacked the stand example

This kind of situation only then looks up the server record, a half hour later, I to this government's server engine room. Does the first matter is downloads the server visit diary to own notebook, (because of custom, whose machine didn't feel relieved to, only believed own), passes through the careful analysis diary, discovered some people in a master station upload personal forum. Judges according to the experience, this forum procedure is the chief criminal. Therefore after the investigation, discovered that the forum is Xiao Li who is responsible to maintain should stand puts secretly, this forum was free moves the net forum, Xiao Li has only made the simple revision, then uploaded the procedure the server. In industry in many people knew that moves the net = hole net, looking from the diary analysis, the intruder is uses some Security apparatus just to announce moves the net upload crack, has obtained host server's domination. Afterward deleted the forum procedure, the return to original state backup page, hence restored the website original condition. From steps into the engine room to restore the stand, has 5 point kind.

Enterprise network information security faced with relentless confusion

This event caused the government related department to lead takes seriously, the second day, they led strangely ask me: We spend several hundred thousand government procurements every year, has placed the network security first, we provided have the firewall, IPS, IDS, why such firm city wall no matter used, knew early so, does not buy these equipment. Perhaps this question is the confusion which many enterprises face.

Dispels doubt one: Lacks the technical training, the good knife does not cause on the edge

 
Other pages: : 1 * 2 * 3 * 4 * Next>>
Prev:SQL pours into the new threat: Will challenge the operating system security Next:Prevents the hacker to invade the WEB server three inchworms

Comment:

Category: Home > network management