Your are here:hacking technology > network management > Article list

Social networks self-defense soHits:1
A, identity counterfeit and pertinent personal information attack Don't think security experts are not affected by social network threats. In recent years the social network attack increasingly extensively, many social networking websites...2011-02-09
Enhance Windows 7 security wiseHits:1
All of the security of the system is more concern, Windows and in safety than previous system made big changes, below took everybody together feeling under the safety performance of the Windows 7. First, improves the version of the...2011-01-28
Experts to help you give good internal network security clearanceHits:1
This paper analyses the enterprise internal network faced by the main analysis, elaborated the safety management personnel according to different threats main technical measures. This paper introduces the industry various technical...2011-01-27
Internet access point protect registry safetyHits:1
When you use Regedit editing the registry, editor menu has a registry - Internet connection registry functions? Microsoft the aim, mainly in order to facilitate the network administrator to the computer on the network management, but if be...2011-01-26
Moment vigilant safeguard browser securityHits:1
Browser loopholes First is the browser security hole problem. In fact, most successful worms or other network attack by means of which are a few general operating systems or software applications in security vulnerabilities...2011-01-25
How to resist third-party software vulnerabilities trigger attacksHits:1
awareness Administrator usually pay more attention to Microsoft to release Windows loophole, and will timely for system installation patch, but system operation on the third-party service programs are usually neglected. For example some...2011-01-24
Remote desktop connections practical methodsHits:1
Remote desktop connections with practical skills What is a remote desktop connections? Remote desktop connections is a remote operation of computer model, it can be used to access to remote visualization, used for...2011-01-22
Enter the system is a solution to the problem of screenHits:1
Computer boot everything is normal, start-up self-check is normal also, but is to enter the system when profligate finishing become abnormal, or screen above a cursor always flashing incessantly, or simply not show any indication...2011-01-21
Webmasters help you prevent permissions upgrade attackHits:1
Q: can you briefly introduce and database related permissions upgrade? How to determine whether have access to my company upgrade problem? Answer: the user permissions upgrade attack by using exploiting loopholes in the system, the gain...2011-01-20
Redo system still infected reason analysisHits:2
1 AUTORUN Is a bit out-of-date things, but there are still many people got infected. Form is in the disk root directory of devolved into AUTORUN. J inf with * *. Exe AUTORUN. J inf usually content as follows: quoted [AutoRun] Shells \ open...2011-01-19
LAN Windows XP the simplest 7 access solutionsHits:3
In a network, the exchange of visits between Windows system can be said to be a bigger problems. Many professional network management personnel, not necessarily can quickly solve a Windows 7 cannot access the XP or XP cannot access the...2011-01-18
WEB site safety evaluation for detailsHits:1
For some large-scale WEB site, it usually has a set had carried out WEB site safety solutions, but, why some websites will still be the attacker mount Trojan? One major reason is already implemented WEB site safety solutions can only...2011-01-17
Server some safety protection to shareHits:1
Some time ago, a station on the server is hanged a Trojan horse. The server use centos + nginx + PHP, used by a program Didcuz and UChome. Originally this site no traffic, incredibly still hackers pursuing, good every day have backups,...2011-01-15
Examples explain VLAN network configuration methodHits:1
Relevant technical standards of IEEE VLAN 802.1 Q in early June 1999 by IEEE committee formally promulgated and implemented, and the earliest VLNA technology as early as 1996 (cisco) company was put forward. With years of development...2011-01-14
Webmasters teach you improve Windows 7 searching efficiencyHits:1
The search is for daily use one of the highest level of operating computer frequency, although Windows 7 provides the ubiquity of search, but in the actual operation process, you might notice, some veteran in the search files is faster and...2011-01-13

Home  <<Prev  1   2   3   4   5   6   7   8   9   10   11  Next>>  Last

Current Page:3 , Total 29 Pages, Every Page 15 Records, Total Records: 432

Hot Articles
Recommend Articles
New Articles
Sub category