Your are here:hacking technology > network management > Article list

Linux system of SYN attack against measuresHits:15
If the Linux system under suspicion has DOS attack, can input Netstat - an grep - I server IP address: 80 awk {locate 14, 20: print} ' 'time uniq - c time - n Netstat - an grep SYN wc - l This command...02/26/2011
VSFTPD server script erection safetyHits:39
In the practical work, can use the following script erect a very safe internal FTP server. Of course can also support the Wireshark understanding of passive and active VSFTPD distinction, with the machine 192.168.0.18 as an example...02/25/2011
Nine recruit prevent Windows autoplay draws virusHits:20
1 recruit: the Shift key This method in early Winows 98 when he had begun to use. As long as is inserted in mobile hard disk while holding the Shift key not to put, won't start automatic playback function. Article 2...02/24/2011
Teach you different place easily wireless access points matchedHits:14
Use a notebook in different places on the Internet, such as home, office, coffee etc, often need in different wireless network switch between, may every time you want to reset parameters to just go, such as setting up a firewall,...02/23/2011
Teach people how to erect safe VSFTPD serverHits:25
In the practical work, can use the following script erect a very safe internal FTP server. Of course can also support the Wireshark understanding of passive and active VSFTPD distinction, with the machine 192.168.0.10 as an example...02/22/2011
Network security protection of 9 convenient stepsHits:8
In the following guide, we will study your can be used to protect the network security nine convenient steps. These steps can ensure that you have a protect your network brick wall, rather than an open door. 1, modify the default password...02/21/2011
Ace antivirus experienceHits:12
My computer security knowledge to have the strong interest, but also a kill soft trial crazy, total love try out all the latest anti-virus software and safety protection software, when a particular security software have update, I always...02/19/2011
Shallow ADSL account battlesHits:8
Along with the network popularization, the network security is also more and more attention by people. Today will introduce a little is paying more attention to the case. Hope everyone raise the safety consciousness. Everyone should know,...02/18/2011
Realize enterprise network security in several waysHits:14
Free open source software (FOSS) widely available. This kind of product to involve in the technology industry. With a firewall, routing, VPN even UTM network is free open source software of a great example. This article will introduce some...02/17/2011
A scripting class IDS resist WEB attack methodsHits:13
IDS is English Intrusion Detection by telephone under 0120-2714540 abbreviation, Chinese means Intrusion Detection system . The traditional IDS is a monitoring equipment, this equipment through the network link articulated in the...02/16/2011
By setting IIS to construct of the FTP server several stepsHits:8
The FTP server in file transmission on stable performance, occupies system resources small, and transmission speed, net now has a lot of FTP servers available, Microsoft IIS powerful functions, in addition to providing WWW service, but...02/15/2011
Teach people how to delete Windows serviceHits:10
What is a Windows service Windows services also called Windows Service, it is the Windows operating system and Windows network based, belongs to the system of the core part of it, it supports the whole Windows various operations. Such as...02/14/2011
Refuse ceng nets WIFI wireless various encryption methods are introducedHits:10
Where there is privacy, there is safety protection. Encryption as an important safety protection means, in the wireless network applications is an extraordinary degree. With the popularity of wireless networks, in bazaar, the street,...02/12/2011
Completes the Windows security basic methodHits:8
Windows operating system although left us many unpleasant memories, but had to admit it: Windows still is the application of one of the most extensive system. Facing such a vast complexity of the operating system, protect their safety is...02/11/2011
The advantages and disadvantages of computer network topology is introducedHits:14
1, star topology Star topology is by the central node and through the point to receiving central node communications link of local-local composition. Star topology structure has the following advantages: (1) simple control. (2) fault...02/10/2011

Home  <<Prev  1   2   3   4   5   6   7   8   9   10   11  Next>>  Last

Current Page:2 , Total 29 Pages, Every Page 15 Records, Total Records: 432

Hot Articles
Recommend Articles
New Articles
Sub category