E-COM-NET
首页
在线工具
Layui镜像站
SUI文档
联系我们
推荐频道
Java
PHP
C++
C
C#
Python
Ruby
go语言
Scala
Servlet
Vue
MySQL
NoSQL
Redis
CSS
Oracle
SQL Server
DB2
HBase
Http
HTML5
Spring
Ajax
Jquery
JavaScript
Json
XML
NodeJs
mybatis
Hibernate
算法
设计模式
shell
数据结构
大数据
JS
消息中间件
正则表达式
Tomcat
SQL
Nginx
Shiro
Maven
Linux
Malicious
02/14/2018 UEFI Remote Attestation based
Malicious
Operation Detection Framework
Thispassagetracedthesetting-upofLAMPserverandsomeML&AIrelevantknowledgeinourattempttodetectionmaliciousoperationinUEFIenvironment.(1)BridgeConnectioninQEMUandVirtualBoxTheTUNisavirtualnetworkingdevice
Ramperouge
·
2020-03-25 08:00
<论文笔记 >ALDOCX: Detection of Unknown
Malicious
Microsoft Office Documents Using Designated Active Learning
ALDOCX:使用基于新的结构特征提取方法的特定主动学习方法对未知恶意微软文档文件的检测引用:NissimN,CohenA,EloviciY.ALDOCX:DetectionofUnknownMaliciousMicrosoftOfficeDocumentsusingDesignatedActiveLearningMethodsBasedonNewStructuralFeatureExtracti
娄叔啊喂
·
2020-02-29 05:47
W3-D1 Limiting the downsides of artificial intelligence
[
malicious
]怀有恶意的[pitch]宣传广告语[dystopian]反乌托邦(utopia)Dronesusingfac
罗禹
·
2020-02-26 19:41
security.web.firewall.RequestRejectedException: The request was rejected because the URL contained a potentially
malicious
今天有个接口打算使用矩阵变量来绑定参数,即使用@MatrixVariable注解来接收参数调用接口后项目报了如下错误org.springframework.security.web.firewall.RequestRejectedException:TherequestwasrejectedbecausetheURLcontainedapotentiallymaliciousString";"完成
雨落寒沙
·
2020-01-03 15:00
CSRF攻击的原理
:用户Alice向网站Trusted.com发送身份验证请求Trusted.com验证通过并在Alice的浏览器中注入cookie用户Alice在没有登出Trusted.com的情况下,登录另一个网站
Malicious
.com
橙子_80c3
·
2019-10-31 14:31
PyPI 发现 3 个针对 Linux 服务器的恶意库
来源:开源中国www.oschina.net/news/108412/pypi-
malicious
-python-libraries据ZDNet的报道,安全公司ReversingLabs在扫描了PyPI
机器学习算法与Python学习-公众号
·
2019-07-22 08:00
The request was rejected because the URL contained a potentially
malicious
String ";"报错解决
报错信息浏览器中看到的报错错误摘要:TherequestwasrejectedbecausetheURLcontainedapotentiallymaliciousString";"从控制台看到的报错2019-09-0910:39:30,149ERROR(DirectJDKLog.java:182)-Servlet.service()forservlet[dispatcherServlet]inc
贼宇
·
2019-07-19 09:00
FindBugs 规则整理:
Malicious
Code Vulnerability
目前已转至个人博客,本系列地址:Lam'sBlog-KnowledgeasActionEI_EXPOSE_REPMayexposeinternalrepresentationbyreturningreferencetomutableobject返回一个易变对象引用并把它保存在对象字段中时会暴露对象内部的字段描述,如果接受不守信任的代码访问或者没有检查就去改变易变对象的会涉及对象的安全和其他重要属性
格子林ll
·
2016-12-13 17:24
分析一个嵌入payload的恶意.lnk文件
原文:https://isc.sans.edu/diary/Analyzis+of+a+
Malicious
+.lnk+File+with+an+Embedded+Payload/20763 WereceivedsomefeedbacktodayfromNick
dozeoo
·
2016-02-25 12:00
关于nonce
In an authentication scheme without a nonce, a
malicious
client could generate a request ONCE and replay
·
2015-11-13 20:38
on
PatentTips - Maintaining shadow page tables in a sequestered memory region
BACKGROUND
Malicious
code, known as malware, which includes viruses, worms, adware, etc., may attack
·
2015-11-13 15:33
memory
use fgets or fread
This will prevent possible buffer overflows that could be exploited by a
malicious
u
·
2015-11-13 02:49
read
HDU2317:Nasty Hacks
Problem Description You are the CEO of Nasty Hacks Inc., a company that creates small pieces of
malicious
·
2015-11-12 14:16
hack
Microsoft® Windows® 恶意软件删除工具
偶然间发现XP自带的恶意软件删除工具: Microsoft Windows
Malicious
Software Removal Tool 位置: C:/WINDOWS
·
2015-11-11 13:21
Microsoft
Malware
1概述 Malware这个单词来自于
Malicious
和Software两个单词的合成,是 恶意软件的专业术语,专指那些泛滥于网络中的 恶意代码。
·
2015-11-10 22:24
war
Microsoft® Windows® 恶意软件删除工具
偶然间发现XP自带的恶意软件删除工具: Microsoft Windows
Malicious
Software Removal Tool 位置: C:/WINDOWS
·
2015-11-08 11:09
Microsoft
百度统计js被劫持用来DDOS Github
今天中午刷着全国最大的信息安全从业人员同性交友社区zone.wooyun.org的时候,忽然浏览器每隔2秒就不断的弹窗:
malicious
javascript detected on this domain
·
2015-11-07 10:52
github
CISSP的成长之路(十八):详述网络威胁类型
这便是本文将要介绍的两种具体威胁类型——拒绝服务(Denied of Services)和恶意代码(
Malicious
Code)。 在51CTO安全频道特别策划的
·
2015-11-02 11:08
网络
SQL injection
is a code injection technique, used to attack data-driven applications, in which
malicious
·
2015-10-31 13:29
inject
existence way of The
malicious
software
随着新一轮病毒的来袭,杀毒软件显示了它的脆弱。从熊猫烧香、AV终结者、机器狗、磁碟机病毒,拥有的反杀毒能力越来越强,没有自我防护功能的检测软件注定不受市场欢迎 了解恶意软件隐藏自己、对抗跟踪的生存方式,不仅对检测软件的研发有非常重要的作用,对用户手动检测也有极大的参考价值。 对大部分用户来说,靠肉眼发现病毒是不容易的,检测软件的扫描器可部分的弥补这个缺陷。如何在扫描器前隐藏自己,甚至反制检测软
·
2015-10-31 10:31
software
How a virus works
The word virus is often being used as a common term for all
malicious
programs, but technically a virus
·
2015-10-30 13:03
vi
How does anti-virus software work?
computer program that can be used to scan files to identify and eliminate computer viruses and other
malicious
·
2015-10-30 13:03
software
网络与信息安全——知识整理(1)
Confidentiality: to protect theconfidential information and to guard against the
malicious
actions that
·
2015-10-27 14:43
信息安全
Windows
Malicious
Software Removal Tool
Windows
Malicious
Software Removal Tool - April 2005 (KB890830) Date last published: 4/14/2005 Download
·
2015-10-21 13:57
software
swfupload 上传SecurityError Error #2156
security change has been made in Adobe Flash Player 9.0.115.0 to block commonly reserved ports (to prevent
malicious
·
2015-10-21 11:37
swfupload
Malicious
Stored XSS Vulnerability in PayPal, Find Bitdefender Researchers
BitdefenderhasfoundaStoredXSSvulnerabilityinPayPalthatcouldallowattackerstouploadmaliciouslycraftedfilestoperformattacksonPayPalcustomers.Thevulnerabilitycanbeweaponizedtodelivermaliciouscontentorfile
qq_27446553
·
2015-09-07 14:00
Flex Error #2156问题
security change has been made in Adobe Flash Player 9.0.115.0 to block commonly reserved ports (to prevent
malicious
·
2014-12-03 11:00
error
[译]5步分析pdf文件
原文:http://countuponsecurity.com/2014/09/22/
malicious
-documents-pdf-analysis-in-5-steps/大多数企业网络边界都被保护。
j4s0nh4ck
·
2014-09-29 21:00
pdf
Vbs 测试程序一
慎重测试 'This procedure is written in SeChaos, only for entertainment, not
malicious
communication, crack
·
2014-07-11 12:00
vbs
XSS Attack
Overview Cross-Site Scripting attacks are a type of injection problem, in which
malicious
elicer
·
2013-02-25 22:00
xss
Attack
XSS Attack
Overview Cross-Site Scripting attacks are a type of injection problem, in which
malicious
elicer
·
2013-02-25 22:00
xss
Attack
通过/dev/mem进行恶意代码注入
出处:http://blog.csdn.net/tody_guo/article/details/5457659 有删改英文原文:http://www.dtors.org/papers/
malicious
-code-injection-via-dev-mem.pdf
linuxdrivers
·
2013-01-13 15:00
Webgoat 笔记总结
Malicious
execution
MaliciousexecutionMaliciousFileExecution(�阂獬淌�绦�),�W站引入�碜酝獠康�n案,�K且�绦衅�热荩�若引入�阂獬淌酱a或�阂膺B�Y到正常�W�中,其他�g�[同一�W站的使用者也�⑸钍芷浜Γ�遭到�阂獬淌降娜肭郑�甚至成�轳�客的魁儡。MaliciousFileExecution攻�羰址ù蠖喟l生於PHP�W站程式�Z言上。常�缺失一般最常�的弱�
GeForever
·
2012-10-08 22:10
target
execution
blank
的
FindBugs的Bug种类说明
Findbugs自带检测器,其中有60余种Bad practice,80余种Correctness,1种 Internationalization,12种
Malicious
code vulnerability
shithanwa
·
2011-12-28 10:00
findbugs
Interesting
malicious
script #4
Thelatestiframeinject.P,whichusesdocument.body.appendChildinsteadofeval. var date=new Date(),pau=('ev'+date.getFullYear()).replace('2010','al');g=window[pau];sf=window['String'].fromCharCode;g(sf(4.5*
coordinator
·
2011-10-28 03:00
Interesting
malicious
script #3
Thisisthenewestvariantofblackhole,labeledbyMSasBlacole.R.ItisstillsurprisingtoseethesignatureofBlackholeupgradednearlyadozenofversioninamonthortwo. I'vereplacedthepayloadinasitisverylarge. Evalitselfi
coordinator
·
2011-10-28 03:00
Interesting
malicious
script #2
Thisscripthasevalexposed,butsimplyreplacingevalwithalertwon'tshowthemaliciouspayload.Infact,onlym[i]willbeshowninthepopupdialog. Andtheevalisexecutedinthecatchblock,whichshouldbeabletodefeatalotofemul
coordinator
·
2011-10-26 12:00
Interesting
malicious
script #1
1 var CJlKp;function AyzhzK(){} 2 var KCfW;var xBtS;var HEKIZIOW="";if('EXHJH'=='vaEYij')LWkpgS();if('CLfChe'=='QiJCNa')uYVR='YcOyK';var UjFXc="sl\x69\x63e";var kBzvW='FUQEEH';if('hyIN'=='Sjacj')YNTW
coordinator
·
2011-10-26 12:00
tomcat 绑定域名 防止恶意域名绑定
原文地址:http://www.zlong.org/tomcat-binding-domain-bound-to-prevent-
malicious
-domain/ 今天公司一台服务器被很多恶意域名绑定了
Aaronlong31
·
2011-07-13 12:00
tomcat
通过/dev/mem进行恶意代码注入
dev/mem进行恶意代码注入AnthonyLineberry«
[email protected]
»2009年3月27日原文http://www.dtors.org/papers/
malicious
-code-injection-via-dev-mem.pdf
tody_guo
·
2010-04-07 12:00
数据结构
struct
table
System
Access
Allocation
浅谈CSRF
一、什么是CSRF先看看CSRF的原文说明,如下:Cross Site Reference Forgery works by including
malicious
code or a link in
jsntghf
·
2010-02-27 20:00
Ajax
浏览器
Security
Rails
bbs
浅谈CSRF
一、什么是CSRF先看看CSRF的原文说明,如下:Cross Site Reference Forgery works by including
malicious
code or a link in
jsntghf
·
2010-02-27 20:00
Ajax
浏览器
Security
Rails
bbs
通过/dev/mem进行恶意代码注入
showart_1932455.html AnthonyLineberry«
[email protected]
»2009年3月27日原文http://www.dtors.org/papers/
malicious
-code-injection-via-dev-mem.pdf
cnctloveyu
·
2010-02-25 15:00
数据结构
linux
struct
table
System
Access
the rule to write the secure flex
context=LiveDocs_Parts&file=security2_10.html http://www.cert.org/tech_tips/
malicious
_code_mitigat
liuchuang
·
2009-10-21 16:42
职场
休闲
the rule to write the secure flex
context=LiveDocs_Parts&file=security2_10.htmlhttp://www.cert.org/tech_tips/
malicious
_code_mitigatio
liuchuang
·
2009-10-21 16:42
职场
休闲
the rule to write the secure flex
context=LiveDocs_Parts&file=security2_10.html http://www.cert.org/tech_tips/
malicious
_code_mitigat
liuchuang
·
2009-10-21 16:42
职场
休闲
使用tar种木马
下面是使用tarball来种目录的集中方式,如有tarball文件
malicious
.tar.gz,含有如下内容-rw------- r
leisure512
·
2009-10-20 23:00
linux
工具
How To Prevent Brute Force Attacks With Brutelock
Brutelock is an open source program that actively monitors various system logs and immediately blocks
malicious
love~ruby+rails
·
2009-09-29 18:00
ssh
J#
UP
去除文本中的标签
/// <summary> /// 去除文本中的标签Method to make sure that user's inputs are not
malicious
liuway
·
2009-07-23 14:00
Web
cache
UP
shutdown TCP ports,blocked all
malicious
scan
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出处、作者信息和本声明。否则将追究法律责任。[url]http://sukhoi.blog.51cto.com/229761/142505[/url]最直接的办法,把系统不用的端口都关闭掉,然后重启系统,如果瑞星还提示有漏洞攻击,你来找我,注:关闭的端口有,135,137,138,139,445,593,1025,2475,3127
gaotao521
·
2009-04-17 11:36
职场
端口
休闲
上一页
1
2
3
下一页
按字母分类:
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
其他