虫虫首页|资源下载|资源专辑|精品软件
登录|注册

vulnerabilities

  • Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

    Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s

    标签: vulnerabilities Introduction discovered undeniably

    上传时间: 2014-01-04

    上传用户:yph853211

  • 工业系统安全问题和解决办法

    Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, anddistributed control systems (DCSs), and then discusses security issues and remedies. This document alsoexplains the benefits and limitations of two cryptographic solutions (digital signatures and encryption) andelaborates on the reasons for using security ICs in an ICS to support cryptography.

    标签: 工业系统 安全问题

    上传时间: 2013-10-08

    上传用户:woshinimiaoye

  • I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco

    I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. II. Screenshots $ ./kill-bill.pl . kill-bill : Microsoft ASN.1 remote exploit for CAN-2003-0818 (MS04-007) by Solar Eclipse <solareclipse@phreedom.org> Usage: kill-bill -p <port> -s <service> host Services: iis IIS HTTP server (port 80) iis-ssl IIS HTTP server with SSL (port 443) exchange Microsoft Exchange SMTP server (port 25) smb-nbt SMB over NetBIOS (port 139) smb SMB (port 445) If a service is running on its default port you don t have to specify both the service and the port. Examples: kill-bill -s iis 192.168.0.1 kill-bill -p 80 192.168.0.1 kill-bill -p 1234 -s smb 192.168.0.1

    标签: I. vulnerability Introduction undisclosed

    上传时间: 2015-05-14

    上传用户:xhz1993

  • Every day, patches are created to cover up security holes in software applications and operating sys

    Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.

    标签: applications operating security software

    上传时间: 2015-10-31

    上传用户:fhzm5658

  • An Introduction To Cryptography Chapter 1, “The Basics of Cryptography,” provides an overview of th

    An Introduction To Cryptography Chapter 1, “The Basics of Cryptography,” provides an overview of the terminology and concepts you will encounter as you use PGP products. Chapter 2, “Phil Zimmermann on PGP,” written by PGP’s creator, contains discussions of security, privacy, and the vulnerabilities inherent in any security system, even PGP.

    标签: Cryptography Introduction provides overview

    上传时间: 2017-06-12

    上传用户:cylnpy