« Home « Chủ đề computer security

Chủ đề : computer security


Có 20+ tài liệu thuộc chủ đề "computer security"

Haking live_ New Version Available

tailieu.vn

Additional options regard- ing starting of the CD (language choice, different screen resolution, disabling the framebuffer, etc.) are described in the documentation on the CD – the index.html fi le.. In the fi fth – the nobody mailbox user connects to the mail.example.com server via a dial-up connection and POP3 (or IMAP) protocol, and uses the Out- look Express program...

Game Console Hacking: Xbox, Playstation, Nintendo Atari and Gamepark 32

tailieu.vn

Joe is the author of Chapter 1 “Tools of the Warranty Voiding Trade,” Chapter 2 “Case Modifications:. Chapter 1 Tools of the Warranty-Voiding Trade. Out of the Box: Configuring Your GP32. With the development and release of the first microprocessor (Intel 4004) in. It is one of the first books to bring hardware hacking to the mainstream. Tools of the....

Securing Exchange Server and Outlook Web Access

tailieu.vn

INTRODUCING EXCHANGE 2000. Unnecessary Exchange 2000 Back-End Server Services. Unnecessary Exchange 2000 Front-End Server Services. Accessing the Exchange 2000 Directory Service. Standard Exchange 2000. High Security Exchange 2000. Introducing Exchange 2000. Understanding the Basic Security Risks Associated with Exchange 2000. Exchange 2000 is the latest iteration of Microsoft’s enterprise messaging platform. However, the Exchange 2000 release contains significant changes from...

Routing Fundamentals

tailieu.vn

Routing Fundamentals - SANS ©2001 1. Routing Fundamentals. Hello, welcome to Routing Fundamentals. Routing Fundamentals - SANS ©2001 2. Routing Fundamentals - SANS ©2001 3. Routing Fundamentals - SANS ©2001 4. Find and locate the IOS – Find and apply the router. As we have discussed, a router’s primary role is to connect different networks together and to route traffic...

Wireless Networking Security

tailieu.vn

Encryption and Exploits - SANS ©2001 1. Wireless Networking Security. Hello, in this module we are going to discuss wireless networking. Wireless Networking - SANS ©2001 2. Any Internet-connected node can be attacked. Wireless Networking - SANS ©2001 3. Users can be mobile while staying connected. Home WLAN users enjoy working on the computer from the living room couch or...

Internet Information Server (IIS) Security

tailieu.vn

Windows Security - SANS ©2001 1. In this section we are going to cover some of the key aspects that need to be addressed in order to have a secure web server using IIS. IIS Security - SANS ©2001 2. IIS Security - SANS ©2001 3. This document is relevant for the implementation of an IIS 5.0 server running on...

The Little Black Book of Computer Viruses

tailieu.vn

Here is the virus’ world. The Basics of the Computer Virus. Figure 2: Format of the Program Segment Prefix.. the beginning of the program by jumping to the offset 100 Hex in the code segment where the program was loaded. If a suitable file is found, the virus appends its own code to the end of the file.. Next, it...

WINDOWS NT SECURITY STEP BY STEP

tailieu.vn

Action 1.1.5 Install a UPS (uninterruptible power supply) and associated soft-. Action 1.4.1 Set page file size.. Action 1.4.2 Clear page file at system shutdown.. Action 2.2.3 Set up a locked storage area for the emergency repair disks. Action 2.3 Remove OS2 and POSIX subsystems:. Action 3.3.1 Use the Resource Kit service FLOPLOCK to lock access to. Action 3.3.2 Disable...

Securing Linux step-by-step

tailieu.vn

See Step 4.9.5 for information on downloading and compiling OpenSSL.. STEP 4.5 PRINTING SERVICES. (See Step 4.2 for replacing the “r” programs with SSH).. STEP 4.6 NETWORK FILE SYSTEM. STEP 4.7 SERVER MESSAGE BLOCK (SMB) SAMBA SERVER. STEP 4.8 CENTRAL SYSLOG HOST. STEP 4.9 FILE TRANSFER PROTOCOL (FTP). Step 4.10.1. Step 4.10.2. STEP 4.10 HYPERTEXT TRANSFER PROTOCOL (HTTP) SERVER. Step...

IP Routing

tailieu.vn

We will also briefly introduce the Ethernet protocol, since the majority of the IP network traffic is routed using this link layer medium. Much of the traffic that needs to be routed is between hosts on the same physical network and that is where the link layer comes into play.. Specifically, we will examine all of the protocols that affect...

Hacking from a network: SYN flood and TCP Sequence number prediction attacks

tailieu.vn

This is the oldie, but goody section of the course. Finally, the attacker completes the kill. Review of TCP – Theory of attack – Implementation. The initial header of the news posting is shown below.. There seems to be a lot of confusion about the IP address spoofing and connection hijacking attacks described by John Markoff's 1/23/95 NYT article, and...

Guide to the Secure ConfiguratGuide Configuration and Administration of Microsoft Exchange

tailieu.vn

Chapter 1 - Exchange Server Installation. The focus of these documents is Exchange Server 5.0 and 5.5, the Exchange Client, and the Outlook 97 and Outlook 98 clients. Most of the discussions relate to both versions of the Exchange Server (version 5.0 or version 5.5) or to all versions of the client. Chapter 1, “Exchange Server Installation”, provides an overview...

E-mail Virus Protection Handbook

tailieu.vn

Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work.. ProsoftTraining.com who assisted in the creation of the Certified Internet Webmaster (CIW) program. E-mail is the essential killer application of the Internet. This...

Hack Proofing E-Commerce Site

tailieu.vn

From the authors of the best-selling. Protect the privacy of the customers’. Preserve the integrity of the organization’s information assets.. What Are Some of the Tools Attackers Use. Most insurance offerings for e-commerce are of the. Q: What’s the difference between a password and a passphrase?. Who was in custody (possession) of the evidence?. Confidentiality is the most widely known...

Hack Proofing: Your Web Applications

tailieu.vn

Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work.. In the mid-1970s, Steve Wozniak and Steve Jobs—the very men who founded Apple Computer—worked with Draper, who had made quite an impression on...

Security Operations Guide for Windows 2000 Server

tailieu.vn

Events in the Event Log. In this case, you will be using MOF in the context of security operations.. Vulnerabilities are often categorized as shown in the following table.. Some of the more common are given in the following table.. This is shown in the following diagram.. Details on the services that are stopped in the five Windows 2000 server...

THE ART OF INTRUSION: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers

tailieu.vn

Together we hosted a popular Internet talk radio show known as “The Darkside of the Internet” on KFI radio in Los Angeles. the hyperbole created by those who sought to profit from the “The Myth of Kevin Mitnick.”. After their initial research, Alex “sort of forgot about” the project.. When a program is compiled into the form that the machine...