Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Microsoft Adds Technical Updates to SDL Site

Microsoft releases a new round of updates and technical content additions to its Security Development Lifecycle website. Microsoft has released a new wave of updates and technical content additions for...

View Article



Image may be NSFW.
Clik here to view.

火眼金睛识骗术之 网络诈骗篇

火眼金睛识骗术之 网络诈骗篇 一点号天津市人民检察院昨天 php?url=0Fjpubh3Yx" alt="火眼金睛识骗术之 网络诈骗篇" />火眼金睛 之网络诈骗篇(一) 防范诈骗犯罪工作不仅是一项检察工作,更是一项民心工程,与老百姓的切身利益密切相关。南开区检察院根据多年办案经验, 系统总结了社会中存在的各类骗局及行骗者运用的有关骗术,下面让我们一起擦亮眼睛,看看网络诈骗有哪些惯用伎俩吧!

View Article

新加坡国防部I-net系统遭网络攻击

新加坡国防部I-net系统遭网络攻击 14分钟前来源:新华网 原标题:新加坡国防部I-net系统遭网络攻击 新华社新加坡2月28日电(记者包雪琳)新加坡国防部28日发布消息说,国防部I-net系统2月初受到网络攻击,约850名国民服役人员和国防部职员个人信息被盗,但没有机密外泄。...

View Article

Python开发【Django】:组合搜索、JSONP、XSS过滤

组合搜索 做博客后台时,需要根据文章的类型做不同的检索 1、简单实现 关联文件 : from django.conf.urls import url from . import views urlpatterns = [ url(r'^index.html/$',views.index),...

View Article

Image may be NSFW.
Clik here to view.

Cyber criminals net 8bn from financial services in 2016

Cyber criminals netted an estimated 8bn from one million attacks targeting online lending transactions in 2016, according to the latest report from security firm ThreatMetrix . Download this free...

View Article


Image may be NSFW.
Clik here to view.

A week in security (Feb 20th Feb 27th)

RELATED ARTICLES Conferences |Security world Malwarebytes @ DefCon July 26, 2012 - That’s right, this week some of the Malwarebytes gang will be out in Las Vegas for the hacker convention: DefCon 20!...

View Article

Image may be NSFW.
Clik here to view.

JDBC Connection to Exadata Express Cloud Database from a Raspberry Pi

Spoiler Alert: It’s pretty much the same as any other linux system. The officialdocumentation can be found on the Oracle website. Install Linux on your Raspberry Pi I prefer to use BerryBoot, it makes...

View Article

Image may be NSFW.
Clik here to view.

浅谈拒绝服务攻击的原理与防御(3):反射DDOS攻击利用代码

0×01 前言 之前发了一篇 关于反射DDOS攻击原理以及反射资源扫描的文章...

View Article


Amazon RDS for SQL Server Supports Forced SSL

Amazon RDS creates an SSL certificate for your SQL Server DB instance when the instance is created. The SSL certificate includes the DB instance endpoint as the Common Name (CN) for the SSL certificate...

View Article


Image may be NSFW.
Clik here to view.

【技术分享】逆向C++虚函数(二)

【技术分享】逆向C++虚函数(二) 2017-03-01 11:05:31 来源:安全客 作者:维一零阅读:779次 点赞(0) 收藏翻译:维一零 预估稿费:200RMB(不服你也来投稿啊!) 投稿方式:发送邮件至linwei#360.cn,或登陆网页版在线投稿 传送门:【技术分享】逆向C++虚函数(一) 前言 在上一部分中,我描述了一种在小型C...

View Article

Image may be NSFW.
Clik here to view.

顶级黑客教你在数字世界隐形

顶级黑客教你在数字世界隐形 一点号嘶吼RoarTalk1小时前 对计算机历史有一定了解的人,相信对kevin...

View Article

Image may be NSFW.
Clik here to view.

Cipher Rules And Groups in BIG-IP v13

My mother used to always tell me two things before I left for school in the morning. Be wary of what ciphers your application supports Never use the Default cipher list unless you have compatibility...

View Article

Symbolic execution and (amateur) cryptography

28-Feb-2017: Symbolic execution and (amateur) cryptography Let's back to the method we previously used to construct expressions using running python function. We can try to build expression for the...

View Article


Image may be NSFW.
Clik here to view.

梭子鱼推出Office 365邮件威胁扫描服务

新闻要点: 梭子鱼在近日推出了全新的梭子鱼Office365邮件威胁扫描服务,这一基于云的服务可通过识别潜在威胁帮助客户即时了解邮件的安全状态,包括隐藏在企业邮件环境中的APT。 越来越多的高级威胁影响着大大小小的企业。事实上,梭子鱼新的研究显示,所扫描的93%企业邮件账户都含有威胁,平均每个账户125个,说明有必要为高级威胁增加额外的保护层。...

View Article

Image may be NSFW.
Clik here to view.

70+ Cyber Security Micro-Courses and Certifications To Boost Your IT Career

With the evolving hacking events around us, cyber-security skills are in high demand across all organizations and industries, because a shortage of skilled cyber security practitioners could leave an...

View Article


Image may be NSFW.
Clik here to view.

Securing the Digital Transformation

Key Takeaways from Cisco Live Berlin 2017 Digital Transformation is the Core of Every Business 2016-2017 introduced the era of Digital Transformation. Digital transformation is the change associated...

View Article

February-2017.php

February is coming to a close, and it’s time for a monthly round-up. Even though February is the shortest month of the year I doubt it will be the least eventful. Especially the security scene has been...

View Article


Image may be NSFW.
Clik here to view.

Zones of Trust: A New Way of Thinking about IoT Security

Recent attacks have focused attention on how to safely add "things"to enterprise networks, a topic that straddles IT and physical security. A zones-of-trust approach may be the answer. Last year, when...

View Article

Image may be NSFW.
Clik here to view.

SSL Certificates and HTTPS: What You Need to Know

If you’re using Chrome 56 (or above), you might have noticed that some HTTP pages are marked as non-secure. This was introduced in January 2017 , but only for pages that collect passwords or credit...

View Article

Image may be NSFW.
Clik here to view.

Always Install Elevated

windows environments provide agrouppolicy settingwhich allows a regular user to install a Microsoft Windows Installer Package (MSI)with system privileges. This can be discovered in environments where a...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images