|
Speeds suddenly slow down the reason and solution | Hits:13 |
NMS (network administrator) not only to ensure stable work of the network, but also ensure a normal network speed users at work often reflect the speeds suddenly slow down, this is analyzed from two aspects, one user computer, and second... | 09/11/2010 |
The old station owners do some of the experiences accumulated in the course | Hits:8 |
Autumn is the season of harvest, but as our webmaster has not stopped at the Four Seasons change in the exchange of links matters. A long period of time, still is to enhance the site links to maintain the weight a major factor rankings... | 09/10/2010 |
Teach you how to uncover hidden behind IIS Web site | Hits:17 |
Before entering the question, we first look at the intruder is how to set up our hidden site host. Open IIS manager - select a folder - right click - select Explorer , switch to the Web site's root directory, create a new folder here named... | 09/06/2010 |
misconfigured networks are the easiest hackers to use IT resources | Hits:16 |
Technology Tufino j?Hacking as Dangerous Habits survey objectives to understand better how trends in the hacker community teams impact on business security. Answers to the security conference in Las Vegas last month CON18 DEF showed that... | 09/04/2010 |
Think you several great law of IP | Hits:8 |
First, disable the network connection service law We all know that if you limit users to modify the TCP / IP parameters, then these users even if the IP address changes, can not use the new IP address, it will lose the meaning of... | 09/02/2010 |
ILS in the description of each security layer | Hits:10 |
WatchGuard Intelligent Layered Security architecture concept? The distributed system intelligence can bring better security, this article will be detailed to answer your questions, let us look at ILS in a security layer for each of what ... | 08/31/2010 |
How good care of their own established websites hard | Hits:21 |
/ * Mini_downloader code bykardinal p.s.t compile by vc + + 6.0 can not run under win98; * / # Include windows.h # Pragma comment (lib, user32.lib ) # Pragma comment (lib, kernel32.lib ) / / # Pragma comment (linker, / OPT: NOWIN98 )... | 08/30/2010 |
VPN can not access the external network failure Phenomenon | Hits:61 |
Prepare for the Remote Assistance Step1: Right click in the computer, select properties, in the pop-up window, select Advanced System Settings. Step2: In the System Properties, switch to the Remote tab, check Allow Remote... | 08/30/2010 |
Wireless LAN rule out the details of insecurity set method | Hits:9 |
Common wireless LAN security, some settings hidden concerns of wireless LAN Settings safe? Easy to invade it? Security of your wireless LAN settings are not always online when you dropped, see the following articles, all problems can... | 08/27/2010 |
SQL common commands collection network | Hits:22 |
1, Description: Copy table (only copy the structure, the source table name: a New Table Name: b) (Access available) Method 1: select * into b from a where 1 1 Method 2: select top 0 * into b from a 2 Note: Copy table (copy the data source... | 08/26/2010 |
Experts to teach the trick against hacker attacks | Hits:39 |
Experts to teach the trick against hacker attacks: Trick one, starting from the basic To basics is the safest way. You have to be servers containing sensitive data into the regional Tone NTFS format; Similarly, anti-virus programs must... | 08/25/2010 |
Of Colleges and Universities web site is currently facing severe threats and protection methods | Hits:13 |
University Web site security threat facing the typical With Carl Sagan, devil-infested world, the phrase to describe the college site is currently located in the poor security environment is very appropriate. Host... | 08/24/2010 |
Malicious software than a simple search trick | Hits:7 |
For network administrators and IT consultants for work in desktop support, remove malicious software should be regarded as the most irritating one was. You must also clean up more than one computer, if any interference encountered in the... | 08/23/2010 |
ADSL users to teach the techniques to prevent attacks by hackers | Hits:9 |
First, cancel 文件夹隐藏 share If you use Windows2000/XP system, right-click the C drive or other disk, select sharing , you will be surprised to find that it has been set to Share this folder and in Network Neighborhood but can not see in... | 08/21/2010 |
BitDefender erm?created the possibility for the control passes through the computer network to the B | Hits:8 |
Blackburn Rovers Community Trust is to provide a regional center of excellence in an unconventional learning environment, through the connection with the Fu?ball as a route to other knowledge, skills and understanding?ndnis. Of dedicated... | 08/20/2010 |
|