Your are here:hacking technology > network management > Article list

Shallow domain name service system securityHits:1
DNS (Domain Name System, Domain Name service System) is considered IT department of heart, this is exactly why most companies spend money making deployment of safety equipment protection to the DNS server from attack reason. But from the...01/12/2011
Looking for hackers trace methodHits:3
Introduce below without intrusion detection system to discover when hackers. Hackers feature information generally comes from the following four aspects, if hacked the system, can be in the following four aspects: find the invasion...01/11/2011
Windows 7 cd-rom don't read dish solution of the problemsHits:1
In Windows 7, many cd-rom can identify and open. This problem is one of the function caused by Windows, enable will probably lead to cannot view open CD directory, only loading automatically run the program or automatic...01/10/2011
Webmasters to help you make Windows 7 run fasterHits:1
And used as a Windows XP, many users are trying to improve Windows 7 operating system quickly, commonner methods are mostly on system service optimization, remove some dispensable system service, there is optimized resource manager menu,...01/08/2011
Windows system antivirus sleevesHits:1
For Microsoft Windows system for, prevent virus attack of security, the best principle is always unchanged. For Microsoft any Windows system for, good anti-virus software is to communicate with other computers, especially connected to the...01/07/2011
Maintenance of server safe port setting methodHits:2
We know, terminal server port is the default TCP 3389 port, of course, hackers is impossible not to know, so, terminal server can change the port? Of course. Terminal server port modify way has two kinds: one kind is altered manually...01/07/2011
High-risk bugs differentiation and preventionHits:2
We often say that system vulnerabilities are the most important Trojan virus spread, not timely installation system channel patch computer, will not stop was invaded. A new Windows system, need to install the patch could be as many as 100,...01/05/2011
Prevent into bad websites methodHits:1
In the discovery often visit websites appear grind or errant some very nasty website reason is due to the domain name system (DNS) caused by pollution. Domain name system cache pollution and belong to no frequent problems...01/04/2011
Hackers don't want you to know that safety skillsHits:1
Malicious script, fake antivirus software and infected PDF: how to resist the Internet's most limit of threat? You already know the basic knowledge of Internet security, is he? You know to keep anti-virus software update, on the Internet...12/31/2010
Server MSSQL security Settings schemeHits:9
Once met, almost mad, have installed MSSQL friend, hurriedly try, delete the following components. Of course, the premise is you want to put his own database fix to go after deletion, otherwise components after deletion many function...12/30/2010
How to have their own safety websiteHits:1
Domain name registration links: Now the domain name registration review stricter, domestic domain with.cn domain names like that. Cn. Com. Cn.net. Cn. Org. Cn etc Newly registered mostly needs a enterprise business license to register....12/29/2010
Linux deadlock after security restart skillsHits:1
Linux will crash? Yes, of course. If crashed, how to do? Direct press the power key to restart? It was very dangerous. Carelessly, machines have hung. But the system has no response, the keyboard and mouse is not active...12/27/2010
Cannot access the Windows Installer service solution of the problemsHits:1
If your system is installed, in WinXP Office2003 appeared when cannot access the Windows Installer service, may be you in touch type safety running under Windows or Installer no correct installation well (actually all mistakes with Windows...12/25/2010
Korenix JetNet 6059G increase provides more quality?t and high bandwidth video transmission in flexiHits:3
Korenix JetNet 6059G is a total of 9-Port Managed Gigabit Switch with 4 and 5 designed design of the copper Giga Giga combo ports for better bertragungsqualit?t and high bandwidth video applications to...12/24/2010
The web server general and special protection comparative analysisHits:5
A: your general protection method For hackers threat, network security administrators to take various measures to ensure the safety, enhance the server WWW service in normal operation. As in the Internet on Email, FTP server as such...12/23/2010

Home  <<Prev  1   2   3   4   5   6   7   8   9   10   11  Next>>  Last

Current Page:4 , Total 29 Pages, Every Page 15 Records, Total Records: 432

Hot Articles
Recommend Articles
New Articles
Sub category