|
The GHOST of Win7 before preparations | Hits:66 |
Q: with Win7, ready to make a system, although they say backup system comes with backup restore function is better, but I use after a slow speed, and feel the documents generated larger and larger and recovery time also don't know how to... | 03/18/2011 |
Windows 7 of VMware wireless network virtual machine set skills | Hits:242 |
Windows 7 VMware wireless network in virtual machine Settings By default, the virtual network adapter use VMware Workstation in 192.168.254.0 range - 192.168.1.0 (subnet mask for 255.255.255.0) two segment of the network card ... | 03/17/2011 |
Examples of skills against conversation about hijacked | Hits:82 |
Hackers can use Firesheep eavesdropping isn't encrypted data on the wireless network, and can steal those login to popular sites other user's session. Hackers use this tool can visit users access to popular website to use when account,... | 03/16/2011 |
360 security experts warn e-commerce will take bodyguards | Hits:59 |
Getting an ambush antivirus software cannot little Thousand bird is an Internet business personalities, 25 February, late at night, thousand bird Internet buy stamps, from before trading, the owner of a compressed package files, claims to... | 03/15/2011 |
Give oneself of the Internet to do safety detection methods | Hits:79 |
I have been engaged in virus analysis, network attack response related work, this time should be good friends with the invitation, help to investigation several servers, we came to a certain XXX stations, first checks. After 1 day time... | 03/14/2011 |
Ensure the Web application security of effective measures | Hits:32 |
Along with the B/S model application development of development, use this pattern to build applications programmer will be more and more. But because programmers level and experience is uneven, a great part of programmers in writing code... | 03/12/2011 |
Banned WVS scanner scanning website directory ideas | Hits:88 |
Acunetix Web Vulnerability could is in a foreign production and its excellent scanning tools that can help mining site many loopholes, including the familiar, SQLinjection XSS (many from think to cattle man like with WVS Saul stood found... | 03/11/2011 |
By 2010, the introduction and preventive measures new attacks | Hits:34 |
In security experts hurry-scurry handle various existing threats at the same time, there are new threat to follow. In 2010, new attack springing up appear, while some existing attack and endowed with new life, these let security experts... | 03/11/2011 |
Website backlinks going to multiply several kept secret | Hits:27 |
Do seo is the foundation of the structure and content, and usually we call the chain is the key, the chain anchor text related diversity to ranking is very stimulative effect, in an article fatty: solution 10 in the secret seo is the first... | 03/11/2011 |
Win7 desktop screen | Hits:117 |
Many users in the use of win7 process detection desktop theme tampered, appear win7 desktop screen phenomenon, in win7 desktop screen corner suggests Windows internal version 7 7,600 this copy is not genuine Windows this phenomenon... | 03/08/2011 |
Protection were cloud server security guide | Hits:46 |
If your server is placed in the public on the cloud, so in terms of security has a character is of vital importance. Do you know what's the part? Is safety manager role, this is a very important position. This job needs... | 03/05/2011 |
Ensure the effective DNS server security litigation | Hits:61 |
DNS software is hackers keen to attack the target, it may bring safety problems. This paper provides the 10 protection DNS server the most effective approach. 1. Use DNS forwarder DNS forwarder is for other DNS server... | 03/04/2011 |
Talk about ADSL safety problems | Hits:40 |
ADSL way in the family is very common, with the application of bandwidth rises, the more users still chose router build family bureau network. But all this is through ADSL, if ADSL safety protection work was not well done, not only for a... | 03/03/2011 |
Expose a seo's attack mode | Hits:76 |
Preface: yesterday received a friend commissioned, the task is to solve website meet English browser automatically jump to another web site problem. Background: it is now in the age of Internet, hackers and commercial coexist era.... | 03/01/2011 |
Linux (RHEL5) regular security measures | Hits:50 |
Basic safety measures 1. Delete or disable system does not use by users and groups # l passwd - where / / disable accounts where # passwd -u where / / unlock account where or # vi/etc/shadow / / when saving for: wq! Because the... | 02/28/2011 |
|