Network security nine tricks

zhaozj2021-02-08  541

Network security nine tricks, port listening Many people already know how to view the current connection and open port, but NetStat is not allowed, such as your Win95 is attacked by OOB, inequality NetStat You have already crash. To this end, a special gadget - port listener appears. Port listening is not a complex technology, but can solve some local problems. When OOB attacks, some programmers expect to block this vulnerability in a simple way of listening to the port, so I have icmpwatch, antinuke, Nukenaber and other tools, and later Bo, NetBus, etc. The previous version is mainly to rely on port listening methods. Of course, as Trojans are increasingly flooding and the customizable of Trojan Server ports, this method is still abandoned. However, it is Antinuke, which is a small program with only tens of K, but he has a function of counterattack, that is, it will attack the people who attack you 139 in the way, and it will The scanner like Hacktek has been overflow when scanned to 139, and everyone may wish to experiment. The advantage of Nukenaber is that he can listen to multiple ports, and Port Magic also has such a function. It is also necessary to explain that port listening is also used to implement monitoring and control of shared directory access, we all know that the shared directory of remote access to a machine is actually accessing 139 port, then as long as the monitoring of this machine 139 can be perceived to remote Access request, such software has a lot of software, such as ProtectX, Netalert, etc., their functionality is approximative, can record or display an IP address that tries to connect to your machine and makes a warning, allow you to choose the rejection or allow. Some port listening tools can not only passively monitor, but also provide some interesting features, such as FakeServ to open multiple ports, so that the scanner mistakenly thinks that you have opened Wingate, Telnet, etc., busy a mess, result I found a scam. Not only wasted time, but also IP you recorded. Also let your machine open 12345, 31337 and other ports. When someone is connected to the client of Trojans, it will give him a warning message or use the vulnerability of Trojan himself to let him crash. The defect of the port scanner can only monitor fixed ports, facing the harsh security environment, is not enough for simple port monitoring programs. Second, Trojan Test and Clear Some programmers choose to monitor Trojans while monitoring Trojans, others use the characteristics similar to the anti-virus software to find Trojans. So some tools for tipping and clearance. These tools have integrated tools for a variety of Trojans, such as TDS (Trojan Defence Suite) and Cleaner, although TDS claims that it can detect 360 kinds of Trojans, more than 200 claims, but the influence, or CleaNer name The head is more. Also, tools are for a small procedure for one or a few Trojans, such as tools specifically to understand BO, there is 20 kinds of Bokiller, Bo2KSS, Bo2klean-Eng, Anti-Bos, UN BACK Orific, etc. Solve Netspy REMOVER, etc., a meaningful thing is some Trojan's dedicated clearance tool is written by Trojans. Very typical example is Yai's author written Yaiclener.

In addition, there is currently a better anti-virus software to clear hundreds of Trojans, such as AVP Clearing Trojans, is quite different than CleaNer. Third, the chopped of the chopping tool, saw an example of a particularly laugh, saying how a child was anti-black, and it was this child's mailbox by this child, and the child held a mouse, staring at the screen, and kept staring at the screen. View the mailbox, keep the letter to prevent the name of the mail bomb. Similar boring reports will inevitably mislead some network beginners. In fact, the resolution of the mail bombing will never touch all the letters, your purpose is just to delete unique messages. For general users, we recommend that the free mailbox supported by POP3 and Web is used as its own main mailbox (do not expose you in the mailbox of ISP, exceeding the rated capacity is to charge), so there is not much When spam, you can delete it directly, and if you are bombed by hundreds of mail, then you will cut it directly with the chopping tool, it will delete spam in batches (of course, ask your mailbox) POP3 must be supported, if the mailbox can only log in from the web). It is said that echom can cut a thousand letters a minute, if you are not good, you can consider a domestic tool Mailcut. Fourth, password protection In order to prevent virtual passwords, some tools that save passwords, more typical is PTD (Password Tracker Deluxe), which is not just a password encrypted program, but he also Will call you password when you need your password, of course, run this software itself must have password verification, otherwise it is meaningless. 5. Resource protection information encryption may use the ZIP encrypted code or DOC encrypted code to protect its key information, but do you try to add a password for your directory or other resource? The Lock is such a tool. In addition, if you have some information that needs to be encrypted, the following software will help you Arctic Security , Easycode, etc. These software is using the same password. The odd times run is encrypted, and even the number of operation is decrypted. It is very uncomfortable. . However, this method of this encryption is that the file does not contain the key itself. If you have forgotten the password, it is very difficult to want to restore. The above tool I have seen is DOS under the DOS. It is not very convenient to use, there is a Win9X under Cryptext, and an addendal function is added to the right mate menu. Sixth, resource protection currently has some tools for protecting files and directory resources, Magic Folders is a tool for protecting directory, and File Protector can protect individual files. In addition, although the 9X account function is not strong enough, if it is still notified, it is still a bit effect, and the setting of the registry can make the illegal visitor cannot use any drive, and can not view any information, can not enter the MSDOS mode, there is no on the desktop Of course, I can't run the regedit (otherwise what is meaningful). We can use the Win9X policy editor to complete this work. If you feel too complicated, the Chinese people write the super rabbit, although it is not strong enough, but can also be used. Seven, this machine monitors everyone often regrets that it is like a desktop system like Win9X, there is no LOG mechanism similar to the UNIX or NT system, even if someone illegally uses your computer, you may not know, if there is a log tool, Record the system to run information, isn't it very good.

转载请注明原文地址:https://www.9cbs.com/read-260.html

New Post(0)