|
Linux system of SYN attack against measures | Hits:15 |
If the Linux system under suspicion has DOS attack, can input Netstat - an grep - I server IP address: 80 awk {locate 14, 20: print} ' 'time uniq - c time - n Netstat - an grep SYN wc - l This command... | 02/26/2011 |
VSFTPD server script erection safety | Hits:39 |
In the practical work, can use the following script erect a very safe internal FTP server. Of course can also support the Wireshark understanding of passive and active VSFTPD distinction, with the machine 192.168.0.18 as an example... | 02/25/2011 |
Nine recruit prevent Windows autoplay draws virus | Hits:20 |
1 recruit: the Shift key This method in early Winows 98 when he had begun to use. As long as is inserted in mobile hard disk while holding the Shift key not to put, won't start automatic playback function. Article 2... | 02/24/2011 |
Teach you different place easily wireless access points matched | Hits:14 |
Use a notebook in different places on the Internet, such as home, office, coffee etc, often need in different wireless network switch between, may every time you want to reset parameters to just go, such as setting up a firewall,... | 02/23/2011 |
Teach people how to erect safe VSFTPD server | Hits:25 |
In the practical work, can use the following script erect a very safe internal FTP server. Of course can also support the Wireshark understanding of passive and active VSFTPD distinction, with the machine 192.168.0.10 as an example... | 02/22/2011 |
Network security protection of 9 convenient steps | Hits:8 |
In the following guide, we will study your can be used to protect the network security nine convenient steps. These steps can ensure that you have a protect your network brick wall, rather than an open door. 1, modify the default password... | 02/21/2011 |
Ace antivirus experience | Hits:12 |
My computer security knowledge to have the strong interest, but also a kill soft trial crazy, total love try out all the latest anti-virus software and safety protection software, when a particular security software have update, I always... | 02/19/2011 |
Shallow ADSL account battles | Hits:8 |
Along with the network popularization, the network security is also more and more attention by people. Today will introduce a little is paying more attention to the case. Hope everyone raise the safety consciousness. Everyone should know,... | 02/18/2011 |
Realize enterprise network security in several ways | Hits:14 |
Free open source software (FOSS) widely available. This kind of product to involve in the technology industry. With a firewall, routing, VPN even UTM network is free open source software of a great example. This article will introduce some... | 02/17/2011 |
A scripting class IDS resist WEB attack methods | Hits:13 |
IDS is English Intrusion Detection by telephone under 0120-2714540 abbreviation, Chinese means Intrusion Detection system . The traditional IDS is a monitoring equipment, this equipment through the network link articulated in the... | 02/16/2011 |
By setting IIS to construct of the FTP server several steps | Hits:8 |
The FTP server in file transmission on stable performance, occupies system resources small, and transmission speed, net now has a lot of FTP servers available, Microsoft IIS powerful functions, in addition to providing WWW service, but... | 02/15/2011 |
Teach people how to delete Windows service | Hits:10 |
What is a Windows service Windows services also called Windows Service, it is the Windows operating system and Windows network based, belongs to the system of the core part of it, it supports the whole Windows various operations. Such as... | 02/14/2011 |
Refuse ceng nets WIFI wireless various encryption methods are introduced | Hits:10 |
Where there is privacy, there is safety protection. Encryption as an important safety protection means, in the wireless network applications is an extraordinary degree. With the popularity of wireless networks, in bazaar, the street,... | 02/12/2011 |
Completes the Windows security basic method | Hits:8 |
Windows operating system although left us many unpleasant memories, but had to admit it: Windows still is the application of one of the most extensive system. Facing such a vast complexity of the operating system, protect their safety is... | 02/11/2011 |
The advantages and disadvantages of computer network topology is introduced | Hits:14 |
1, star topology Star topology is by the central node and through the point to receiving central node communications link of local-local composition. Star topology structure has the following advantages: (1) simple control. (2) fault... | 02/10/2011 |
|