所属分类: 网络技术 整理: FengNet.Com 更新日期:2004/5/13 7:59:22 阅读次数:12611

Top Ten Tips for Secure Testing



Introduction
1.Don抰 Run Tests as an Administrator
2.Test on a Secure File System桸TFS
3.Don抰 Change Anything in HKLM or %PROGRAMFILES%
4.Don抰 Store or Send Secrets in Clear Text
5.Get Adequate Feature Documentation
6.Press the Limits of Bad Data
7.Test on Two or More Processors
8.Know the 20 Laws of Security
9.Use the tools available
10.Analyze the source code
Resources

Introduction
This paper provides information about testing applications for the Microsoft?Windows?family of operating systems in a secure fashion. The topics are divided into ten tips that any developer or tester can readily apply when testing an application or hardware device driver.

For access to the tools and resources discussed in this paper, see "Resources" at the end of this paper

Top of page
1.Don抰 Run Tests as an Administrator
Far too often developers and testers run as the local administrator, because it抯 the path of least resistance. This practice can lead to a false sense of stability, because administrators can do virtually anything on the system, so most things will work just fine. As soon as the current user isn抰 an administrator, the operating system security features really come into play, and things might not work as smoothly. Fortunately, there抯 an easy fix: don抰 run any tests as an administrator unless absolutely necessary.

Use the RUNAS Command
Microsoft added a great feature to recent versions of Windows that lets the currently logged on user run another program as a different account. Using the RUNAS command from either the Windows Explorer interface or from the command line is a quick and easy way to specify a non-administrative account.

Use a Secondary Local Machine or Domain Account
Create a user on the local machine that has only local user level permissions. Thus, someone running a test can quickly see whether features don抰 work as the result of certain permission levels being assumed for file system or network access. After installing the program, log off and log back on as the local user before running tests.

If network permissions are required, use a second domain account that has only user privileges on the test system. That way, network permissions don抰 get in the way, and administrator rights don抰 provide a false sense of security.

A Few Exceptions?
Here are a few exceptions where requiring administrator access is acceptable:

?Setups and installations need to be able to change system state in a substantial way.

?Maintenance and configuration tools might require administrator access as necessary.

In these cases, the best programming practice is for an application to check the permissions available when it is launched and then warn the user if administrative access is required for full functionality.

Top of page
2.Test on a Secure File System桸TFS
It does little good to run as an administrator while testing if the file system isn抰 secure. FAT12, FAT16, and FAT32 have only rudimentary file permissions, but NTFS provides a full, robust base for testing all types of permissions scenarios.

Use NTFS
Set up all test machines with an NTFS system drive from the start. That way the operating system is configured with base default permissions. On Windows XP and later versions, running the CONVERT command automatically applies the setup default permissions to the system volume.

Also, consider turning on disk quotas for users.

Test on NTFS First, Others as Necessary
Because NTFS is a secure file system, if the software being tested works on NTFS, chances are it will work just fine when using other non-secure file systems. Software that works well in a restrictive environment usually works just fine in an unrestrictive one.

Beware of Differences
Independent of the file system permissions, there are some other differences between file systems to note, such as maximum file, cluster, and partition sizes. These are prime areas for testing border cases.

Start Restrictive; Add Permissions as Necessary
Does the software work if the current user isn抰 allowed to access a particular folder? What are the minimum permissions required for a particular file operation? Can the program save files into a "drop box" folder?

Start with restrictive permissions on a folder or file share, and then add privileges as testing progresses.

Top of page
3.Don抰 Change Anything in HKLM or %PROGRAMFILES%
Far too many programs assume unrestricted access to the HKEY_LOCAL_MACHINE section of the registry and the %PROGRAMFILES% folder on %SYSTEMDRIVE%. Both are read-only for normal users. Don抰 change anything there except at installation time.

Required for Logo Compliance
An application that is designed to comply with the "Designed for Windows XP" for Applications logo must not try to write to either HKLM or %PROGRAMFILES%. For information, see section 3.0 of the Designed for Windows XP Applications Specification.

Store Data on a Per-User Basis
It抯 reasonably safe to assume a user has access to the %USERPROFILE% folder. Use the %TEMP% folder for temporary data files. Use %APPDATA% for storing application-specific data per user. Consider storing data under the user抯 My Documents folder. For registry settings, use HKEY_CURRENT_USER.

Top of page
4.Don抰 Store or Send Secrets in Clear Text
Far too often applications attempt to hide something in plain sight using simple obfuscation. This might keep casually prying eyes away, but it doesn抰 provide any significant protection.

Use the System.Security.Cryptography
Microsoft .NET Framework has an entire class library devoted to cryptography functions for hashing, encrypting, decrypting, signing, and so on.

Don抰 Store the Secret; Store the Hash
If something sensitive must be stored but not unencrypted, don抰 store the secret; instead, store a one-way hash of the secret. Then compare the computed hash with the stored hash of the secret.

Use Some Salt
When computing or storing a hash, add some unique randomization (that is, some "salt"), so that the hash is unique per user or per machine for the same data.

Know the Trust Boundary
Where can the program no longer trust data to be transmitted discreetly? A well-defined trust boundary is essential

Legal Concerns
Several legal requirements should be considered in testing, such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA), Computer Fraud and Abuse Act (CFAA), and California (CA) SB1386.

Top of page
5.Get Adequate Feature Documentation
The realities of a development cycle sometimes save documentation for the last minute, but documentation is necessary and prudent. Notice the title of this tip isn抰 about perfection, just that the team should have adequate documentation for each feature. Not having such information will make diagnosing potential security problems much harder in the future.

Know the 5 Ws
The bare minimum is knowing the who, what, where, when, and why for each feature.

List the Files
What source files does the feature use? What temporary files does the feature write out? What data file types does the feature let the user open or save? Never assume a data file will be unchanged between execution sessions. Any data file could be changed or manipulated by a malicious user while not opened by the application. Test the file opening code for robust error handling. And never assume a specific file name and so on in code or while testing unless you can be absolutely certain the file name cannot be changed by a malicious user.

List the Registry Entries
Which registry entries does the feature read? What data formats are stored in the registry entries? Does the feature need to write data to the registry?

List the Data Formats and Types
Does the feature store or transmit data in XML or other format? What schema is used? What ranges are valid for fields inside the schema (or related format)? Does the program store data in a proprietary binary format? What happens if the data is altered?

List the Error Messages
Does the feature fail gracefully in certain scenarios? Does the error message provide too much information? For example, rather than telling the user the password was wrong, it抯 better to indicate some combination of username and password was wrong, without specifying which was inaccurate.

Top of page
6.Press the Limits of Bad Data
Using the documentation from tip 5, analyze the boundary conditions for each data field, and then design tests that check the validation of each field.

Check All Numeric Ranges
Is the field numeric? Is the field an integer? Are negative numbers allowed? What抯 the maximum value? What抯 the minimum value?

Check All Buffer Sizes
If the field size is 255 characters, what happens when the input string is 256 characters? What happens when the input string is 256 Unicode characters?

User Data is Untrustworthy until Proven Otherwise
Does the software accept input from a user? Does the program download files from the internet? Is that data fully and completely range checked? What happens if a malicious data stream is received? All input must be properly and fully validated before use. Software must never assume that a user data file hasn抰 changed between executions.

Change the Date Formatting
If the feature expects a date in US format (for example, 10/13/2003), what happens when the date is in European format (13/10/2003)? Don抰 forget to test impossible dates such as 02/29/2013.

Change the Number Formatting
If the feature expects numbers in US format (for example, 3.14159), what happens when the input is in a European format (3,1415926)?

Inject Scripts
If the feature accepts input from a web page form, can a script function be inserted into a text field such that it can be executed? View the web page source to see whether any sensitive details were unintentionally left behind, for example, SQL database server passwords, comments from development, and so on.

Top of page
7.Test on Two or More Processors
Symmetric multiprocessing (SMP) is becoming much more common today with the advent of technologies such as Hyper-Threading technology in Intel Pentium 4 processors. More and more customers are likely to have SMP-capable systems. Every driver should be tested on an SMP-enabled system. Every multi-threaded application should be tested on a multi-CPU system to assure proper behavior with one or more simultaneous threads of execution. Similarly, every hardware driver should be tested on an SMP system. Pay particular attention to multi-user software, as threads executing in one user抯 process space shouldn抰 allow for illicit access by another. Drivers should also be tested on 64-bit platforms, with special attention to issues such as PAE for 64-bit systems.

Every Tester and Developer Should Have One
Make sure every tester and developer on the software project has at least one SMP-capable system to use.

Turn on Hyper-Threading
If a test system is running Windows XP or Windows Server?2003 on a Pentium 4 Hyper-Threading CPU, testing on SMP is as simple as making sure Hyper-Threading is enabled in the BIOS settings.

Add a Second Processor
Many workstation-class computers can be made to support SMP by simply adding a processor. A fast, cheap (compared to a new computer), and easy way to enable SMP is to purchase and install a second processor.

Caveats for Older Windows Releases
Windows 2000 and older Windows operating systems don抰 support dynamically switching between single and multiple CPUs. Adding a second processor to an older system might require reinstalling the operating system. Test the complete package on all the acceptable systems, and document which service packs might be required to install.

Top of page
8.Know the 20 Laws of Security
Everyone developing software should acquaint themselves with the articles "The 10 Immutable Laws of Security" and the "The 10 Immutable Laws of Security Administration"梥uch as testing to make sure that a failed installation or usage doesn抰 leave the system in an exploitable state. These rules, in addition to the extensive information in Writing Secure Code, 2nd Edition, provide an excellent starting point for understanding what makes well designed, secure software.

Practice Defense in Depth
Just because there is a security hole that is possible doesn抰 mean the game is over. Define ways to mitigate the direct risks and the secondary risks if a particular security technology fails. Once the mitigation methods are defined, designed, and built, then test them. Remember, well designed software fails gracefully and to a secure mode. When in doubt, deny access. Installation programs, while permitted to require administrative access, shouldn抰 leave a system in an insecure state. Be sure setup doesn抰 configure anything more than the least privileges required for the software to run.

Design Security into the Product
Consider security from the beginning of the development process; don抰 try to add it later. Create a threat model as an integral part of the design process. Analyzing potential threats before writing code can reduce the need for mitigation later. Careful design can decrease the "surface area" exposed to potentially malicious users.

Secure All Test Systems
It抯 of little value to test security on an insecure system! Protect all test systems with patches, anti-virus software, and firewalls as appropriate. This is especially important for programs that communicate over the Internet.

Top of page
9.Use the tools available
Microsoft and other independent software vendors have a wealth of affordable tools for securing, updating, scanning, testing, and evaluating software security.

Windows Update
Windows Update and the Automatic Updates feature built in to Windows 2000 Service Pack (SP) 3, Windows XP, and Windows Server 2003 provide the best ways to get a test system up to date on all the latest patches. Keep all test systems regularly updated.

Microsoft Baseline Security Analyzer, v. 1.1.1
Microsoft Baseline Security Analyzer (MBSA) is a free tool for scanning and evaluating any system (client or server) for compliance with security best practices. MBSA looks for patching status, and it also checks various other system settings and then provides a concise report with details about how to correct any problems found.

Microsoft Windows Application Compatibility Toolkit, v. 3.0
The Windows Application Compatibility Toolkit, version 3.0, contains several helpful tools that detect many of the problems mentioned in earlier tips. Application Verifier is particularly helpful for detecting common software problems. The kit is available at no charge.

Network Scanning Tools
Network Monitor (NetMon) and other network scanning and analysis tools are useful for watching and analyzing traffic among computers while a particular software test is underway. Careful dissection of the data can reveal where certain risks are inadequately mitigated.

Top of page
10.Analyze the source code
Careful reviews of source code with an eye for security can reveal potential security holes and risks. Writing Secure Code, Second Edition, has some excellent recommendations on what to watch for.

Hold Code Reviews
Gather all the parties working on a particular feature and have them review the source code line by line. Any issues found should be verified as changed in the manner agreed upon by multiple people.

Search for Risky Functions
Writing Secure Code, Second Edition, has an excellent set of appendices that list standard functions that are commonly used incorrectly and in such a way as to leave a potential security hole. Consider replacing all references to unsafe functions with the recommended alternatives.

Use Automated Scanning
Using automated source code analysis tools, such as PREfast for drivers, can speed up the code review process and provide consistent feedback. Although some tools may occasionally give false positives, be sure to review any feedback carefully.

Top of page
Resources
Designed for Microsoft Windows XP Application Specification
http://www.microsoft.com/winlogo/software/windowsxp-sw.mspx
Matt抯 Top 10 Tips for Securely Testing on MSDN TV
http://www.microsoft.com/downloads/details.aspx?displaylang=en&familyid=6dd3da05-399a-40ec-a14e-ba3fbdff41ed
Microsoft Baseline Security Analyzer v1.1.1
http://www.microsoft.com/downloads/details.aspx?FamilyID=9a88e63b-92e3-4f97-80e7-8bc9ff836742&DisplayLang=en
Microsoft .NET Framework Developer Center
http://msdn.microsoft.com/netframework/default.aspx
Microsoft Windows Application Compatibility Toolkit v3.0
http://www.microsoft.com/downloads/details.aspx?familyid=7fc46855-b8a4-46cd-a236-3159970fde94&displaylang=enhttp://www.microsoft.com/downloads/details.aspx?familyid=7fc46855-b8a4-46cd-a236-3159970fde94&displaylang=en
Microsoft Windows Driver Development Kit (DDK)
http://www.microsoft.com/whdc/ddk/
PREfast for Drivers
Article at http://www.microsoft.com/whdc/hwdev/driver/prefast.mspx
Tool in the Windows DDK
The 10 Immutable Laws of Security
http://www.microsoft.com/technet/archive/community/columns/security/essays/10imlaws.mspx
The 10 Immutable Laws of Security Administration
http://www.microsoft.com/technet/archive/community/columns/security/essays/10salaws.mspx
Threat Modeling for Drivers
http://www.microsoft.com/whdc/hwdev/driver/threatmodel.mspx
Windows Hardware and Driver Central
http://www.microsoft.com/whdc/hwdev/
Windows Update
http://windowsupdate.microsoft.com/
Writing Secure Code, 2nd Edition
http://www.microsoft.com/mspress/southpacific/books/book19911.htm



--------------------------------------------------------------------------------

相关文章
Linux内核参数调优 2015/10/9 10:58:10
Linux运维工程师的十个基本技能点 2015/9/21 9:40:09
Apache安全配置 2015/9/21 9:38:05
运维的85条军规 2015/9/21 8:54:31
Linux下路由跟踪mtr命令使用举例 2015/9/20 10:30:37
Linux故障排除技术和修复技巧 2014/12/18 15:52:44
系统架构师经验总结 2014/12/18 15:48:36
如何查看windows和linux80端口号占用 2014/5/16 15:19:17
iSCSI配置 2014/4/21 10:42:52
中文Linux Command 2013/5/28 11:25:48
TCP/UDP常见端口参考 2013/5/23 15:26:35
Cisco交换机 DHCP Snooping功能 2013/4/27 10:42:57
Cisco 交换机与路由器故障处理方法分享 2013/4/27 10:41:58
Memcached 安装 2013/3/15 16:46:46
JavaScript注入攻击 2012/10/17 19:51:45
苹果Mac开机按键汇总 2012/9/4 11:10:55
苹果入门-mac系统终端命令大全 2012/9/4 11:06:07
Mac 常用应用推荐.输入法篇 2012/9/4 10:46:58
Mac 常用应用推荐下载工具篇 2012/9/4 10:46:21
Mac 常用应用推荐.聊天工具篇 2012/9/4 10:45:41
OS X Mountain Lion 的10大秘密功能 2012/9/4 10:42:37
使用Public Key (OpenSSH) 不用密码登陆 2012/3/30 10:36:34
Web安全工具大汇聚 2012/3/20 9:27:50
Windows XP用户配置文件丢失或损坏后的恢复方法 2011/10/25 20:05:28
如何实现从物理到虚拟基础架构迁移 2011/9/19 15:55:50
Iphone4超详细路径表 2011/4/7 15:57:16
Linux Unix的区别 2011/3/22 13:09:29
一些常见的数据备份的问题 2011/3/22 12:56:42
解决macbook air 升级windows7补丁后蓝屏 2011/3/1 9:49:45
嗅探原理与反嗅探技术详解 2010/4/16 15:22:03
根文件系统的启动及配置 2010/4/16 15:19:33
linux init六种模式简介 2010/4/16 15:18:55
系统崩溃 十款Linux救援工具任你挑 2010/4/16 15:15:43
安全审计自己动手 2010/4/14 11:12:19
如何为运行中的服务器生成位镜像拷贝应对突发安全事故 2010/4/14 11:11:31
WinSCP工具保障文件复制的安全 2010/4/14 11:10:09
设置 WINDOWS 2003 IIS 中的权限 2010/4/3 15:50:03
如何配置Win2003的NTFS文件系统权限 2010/4/3 15:47:20
最好的windows2003安全设置参考 2010/4/2 14:08:01
介绍两个免费SQL防注入工具给大家(UrlScan与ISAPI) 2010/4/2 13:48:37
cmd命令行使用iisapp来查看IIS应用程序池cpu占用率 2010/4/2 13:26:37
开源应用程序防火墙WebKnight使用 2010/4/2 13:23:39
IIS应用程序防火墙WebKnight 2010/4/2 13:21:54
详解MySQL数据库授权原则 2010/4/1 10:55:18
Win 7 常见问题 2010/4/1 10:48:36
巧改启动方式修复路由器故障 2010/3/31 13:10:06
备份与应急恢复系统功能实现 2010/3/31 13:04:58
印刷五大要素:原稿、印版、油墨、承印物、印刷机械 2010/3/31 12:55:02
电脑死机原因浅析 2010/3/16 9:00:27
硬盘坏道的发现与修复 2010/3/16 8:56:45
扫描仪故障 2010/3/16 8:55:26
网络打印机只能打印第一页 2009/12/18 13:57:42
服务器被入侵后的紧急补救方法 2009/12/16 13:18:59
管理思科路由器的十大蠢事 2009/12/16 13:13:32
青岛市电子政务发展“十一五”规划纲要 2009/11/4 15:14:39
sata硬盘安装windows蓝屏的解决方法 2009/10/21 19:38:35
掩码地址设置引发的网络访问问题 2009/8/5 21:54:34
服务器虚拟化后应该注意的八大问题 2009/6/30 19:53:38
关于服务器虚拟化十二个知识点的说明 2009/6/30 19:52:12
如何监控虚拟环境? 2009/6/30 19:49:08
VM 热备份的几种办法 2009/4/21 13:07:23
在ESX Server环境下的存储管理 2009/4/21 13:06:35
使用快照备份的方法 2009/4/21 13:05:45
如何最大化VMware存储效率? 2009/4/21 13:04:20
使用VMware ESX troubleshooting恢复VMFS分区 2009/4/21 12:59:46
虚拟机备份应该注意的五个问题 2009/3/27 12:23:31
思科IOS文件管理命令 2009/3/13 21:15:53
POP3协议命令原始码及工作原理 2009/2/14 10:51:32
基于NDIS(网络驱动接口标准)包拦截技术 2008/8/25 9:17:12
WinDump:Windows 的tcpdump工具 2008/8/25 9:15:35
局域网内计算机共享文件夹设置权限后拒绝访问 2008/8/12 13:36:31
将普通文件夹设为共享文档 2008/8/12 13:35:45
熟悉ROM Monitor维护路由器 2008/8/7 14:18:42
部署企业级城域网和局域网的核心技术 2008/7/31 8:45:33
全面出击 让DNS服务器无懈可击 2008/7/31 8:38:03
路由器的一般故障分类和排障步骤 2008/7/16 8:23:31
cisco ASA防火墙配置笔记 2008/6/7 11:22:48
解决Vista狂读硬盘问题 2008/6/5 13:36:21
linux 常用命令总结 2008/4/28 18:51:58
为基于类的策略选择突发数据量和超额突发数据量 2008/1/10 17:44:44
一个强大的文件下载工具curl 2007/12/24 14:35:15
方便的网络下载工具wget 2007/12/24 14:34:15
IE6和IE7浏览器128 位版本的安全套接字层 (SSL)故障解决方案 2007/12/12 21:08:41
计算机时钟设定和校准 2007/12/8 16:04:32
31 个用来测试你网站各项性能的免费在线工具 2007/6/20 10:43:17
NTP网络时钟协议的实现 2007/6/6 15:43:49
Win2003网站服务器的安全配置 2007/5/29 10:21:02
Linux 2.6.19.x 内核编译配置选项简介 2007/5/29 7:55:59
Linux下常用应用软件列表 2007/5/29 7:12:53
Linux 下实现网卡高可用性的几种方法 2007/5/28 17:42:06
基于Windows 2003 和 Bind 9 的智能域名(DNS)服务 2007/5/23 8:10:39
特殊IP地址分类 2007/5/15 9:10:54
怎样改变主机名或者机器名字? 2007/5/15 8:02:06
有关ARP病毒问题的处理 2007/5/10 14:48:27
如何有效的抵抗DDOS 2007/5/10 14:45:44
磁盘阵列可靠度的计算 2007/3/29 8:10:03
JUNOS、IOS、VRP对比 2007/3/7 12:27:38
微软一个罕为人知的无敌命令 2007/3/7 12:05:12
linux common command 2007/2/1 20:13:16
基于FreeBSD5.4全能服务器安装 2007/2/1 17:19:40
系统时间同步及ntp服务的提供 2007/2/1 17:14:30
CPU占用率高的九种可能 2007/2/1 13:51:37
DNS 配置详解 2007/1/16 15:01:02
Linux安全配置步骤简述 2006/12/14 13:36:24
ARP攻击与防护完全手册 2006/12/13 14:29:41
交换网络中的嗅探和ARP欺骗 2006/12/4 16:48:30
网络入侵检测初步探测方法 2006/12/4 16:45:50
新一代网络安全接入技术对比分析 2006/12/4 16:40:41
切断入侵道路 关闭特殊共享资源 2006/11/27 15:09:31
对目标进行ARP欺骗 2006/11/27 15:04:33
如何能让DHCP服务器更安全 2006/11/23 17:04:26
解决实际维护网络过程故障的五个盲点 2006/11/10 9:00:29
删除chkdsk.exe及launchCD.exe方法 2006/11/1 8:04:54
有关VPN连接的15项故障诊断提示 2006/10/28 9:55:18
Cisco防火墙技术汇总 2006/10/28 9:50:56
在交换机上实现存储安全 2006/10/27 10:02:36
MAC地址的访问控制 2006/9/13 19:28:58
关闭常见木马和未授权控制软件 2006/8/31 8:51:54
7200路由模拟器使用手册 2006/8/20 19:58:24
Telnet 命令 详解 2006/8/12 15:19:16
网络路由安全攻防对策分析及实践 2006/8/8 18:55:12
核心网络设备配置及参数如何备份 2006/8/8 18:53:00
解决在DHCP环境下私自指定IP和私自搭建DHCP服务器的方法 2006/8/4 7:00:32
ASP木马Webshell安全解决方案 2006/8/2 14:37:47
网络故障处理手册 2006/7/25 14:09:43
安装SCSI硬盘 安装、启动、设置篇 2006/7/24 10:03:13
80端口web服务攻击痕迹 2006/7/22 17:19:31
交换机升级排障 2006/7/18 17:57:24
XP.CMD命令大全 2006/7/14 9:08:51
如何使用Cisco IOS文件系统命令 2006/7/13 8:14:53
交换机 VLAN配置基础及实例 2006/7/4 19:48:33
路由器默认密码 2006/6/28 23:05:49
服务器的日志合并统计 2006/6/17 11:31:34
DHCP + DNS (bind) == DDNS 2006/6/17 10:04:25
常见病毒、木马进程速查表 2006/6/15 17:28:53
工作中处理交换机频繁吊死故障实例 2006/6/13 8:41:14
ping的高级用法 2006/6/12 12:35:59
用PHP编写PDF文档生成器 2006/6/11 8:50:26
如何查找和下载华为产品手册资料?(含华为3com、爱默生电源资料说明) 2006/6/7 9:31:53
入侵检测系统逃避技术和对策的介绍 2006/6/7 9:25:12
使用 nslookup 命令检查DNS 2006/5/29 9:44:48
华为 L2TP VPN Config 2006/5/29 9:24:11
Sun Solaris 9 卷管理应用研究 2006/5/25 16:51:32
SysAdmin Commands 2006/5/25 16:06:54
网络安全讲座之八:审计结果 2006/5/24 19:46:24
网络安全讲座之七:IDS系统 2006/5/24 19:45:52
网络安全讲座之六:侦察与工具 2006/5/24 19:43:53
网络安全讲座之五:文件系统安全 2006/5/24 19:43:20
网络安全讲座之四:账号安全 2006/5/24 19:42:35
网络安全讲座之三:防火墙技术 2006/5/24 19:41:57
网络安全中能起重大作用的三条命令 2006/5/22 17:18:33
网络专业人士笔记 2006/5/22 10:06:48
如何恢复被破坏的Windows XP系统文件 2006/5/15 14:21:58
Linux 进程管理 2006/5/12 16:21:51
vlan间dhcp配置 2006/5/10 10:35:15
实现四台Web服务器的负载均衡 2006/5/8 19:32:09
网络负载均衡技术概况 2006/5/8 19:29:56
使用OPENVPN实现各机房的互通 2006/5/8 14:34:04
OpenVPN使用User/Pass验证登录 2006/5/8 14:33:08
Linux 作为 DHCP 服务器 2006/4/30 13:47:54
防黑全攻略——端口扫描技术 2006/4/30 13:24:46
SNARE-系统入侵分析和报告环境 2006/4/30 13:16:31
在Cisco设备上实现IOS DHCP Server的功能 2006/4/30 12:31:15
用MRTG在IIS 6.0上实现入侵检测功能 2006/4/29 15:04:21
Unix操作系统启动故障的紧急诊断与处理 2006/4/29 8:56:34
命令行IPSEC封锁端口(转) 2006/4/22 19:53:12
服务器安装之文件签名验证工具 2006/4/22 19:48:46
网络分析监听技术之原理、应用与防范 2006/4/6 19:22:39
用专用Linux日志服务器增强系统安全 2006/4/3 13:37:51
cisco四种类型的网络防火墙技术汇总 2006/3/20 12:59:53
802.1x:老根发新芽 2006/3/8 10:55:52
无线网络技术轻松配置五字诀 2006/3/1 8:33:54
解决局域网中IP盗用问题的三种技术手段 2006/2/22 20:06:16
dllhost占用大量内存 2006/2/13 16:35:00
网络常见攻击方式及对应防御方式概述 2005/12/25 14:56:55
基于网络IDS的典型配置 2005/12/14 8:46:10
Linux必学的系统安全命令 2005/12/13 18:02:56
交换机故障的一般分类和排障步骤 2005/12/13 14:44:33
安装VERITAS NetBackup 2005/12/2 15:56:53
WINDOWS 2000 ADVANCED SERVER群集安装 2005/12/2 15:49:31
NetBackup6.0 Beta3 升级安装步骤 2005/12/2 15:14:25
如何部署BackupExec Oracle Agent 2005/12/2 15:12:44
BackupExec 10 SQL Agent使用指南 2005/12/2 15:10:32
Linux中文件查找技术大全 2005/11/25 10:05:27
ADSL拨号中出现的错误代码 2005/11/23 13:39:43
RUNDLL32.EXE 是什么程序 2005/11/23 13:38:49
Regsvr32命令修复系统故障 2005/11/23 13:37:52
Regsvr32使用方法 2005/11/23 13:36:58
Regsvr32 用法和错误消息的说明 2005/11/23 13:36:19
Windows中打开和关闭FSO文件读写权限的方法 2005/11/22 15:30:36
Windows Server 2003的一些优化设置 2005/11/15 8:21:25
《网络基础学习之二十》路由器的配置 2005/11/11 10:03:00
《网络基础学习之十九》路由器的硬件连接 2005/11/11 10:01:42
《网络基础学习之十七》路由器原理、分类和选购 2005/11/11 9:59:28
《网络基础学习之十六》路由器基础 2005/11/11 9:58:20
《网络基础学习之十五》交换机VLAN的配置 2005/11/11 9:57:10
《网络基础学习之十四》交换机配置全接触 2005/11/11 9:56:00
《网络基础学习之十》组建小型C/S网络 2005/11/11 9:50:23
《网络基础学习之七》构建对等网 2005/11/11 9:44:30
《网络基础学习之六》初识网络体系结构与协议 2005/11/11 9:42:59
《网络基础学习之二》常见局域网拓扑及操作系统 2005/11/11 9:38:06
深入破析网线及连接 2005/11/7 21:34:31
Sniff网络基础原理和软件实现技巧详解 2005/11/5 21:15:12
IPSEC 安全架构、应用及展望 2005/11/5 20:58:28
维修笔记本技巧 2005/11/4 9:19:32
系统启动出现蓝屏错误“STOP: 0x000000C2”的解决方法 - NEW! 2005/10/26 13:43:24
彻底删除、卸载dmcast——dudu加速器 2005/10/24 10:31:01
系统入侵者攻击企业或敏感数据网络方法白皮书 2005/10/11 10:52:53
Win2000 Server入侵监测 2005/10/11 10:36:19
Windows自启动程序十大藏身之所 2005/10/11 9:10:45
Windows操作系统十则最新应用技巧 2005/10/11 9:08:22
不能访问网上邻居 2005/9/23 8:15:51
Cisco ios 软件的安装升级方法 2005/9/20 14:09:04
Windows 2000 安全检查清单及安全设置 2005/9/15 10:16:56
在Windows XP/2000下巧拒强行关机 2005/9/14 10:53:23
安全防护-入侵检测实战之全面问答(上) 2005/9/14 10:46:03
IE经典故障大全 2005/9/7 8:45:45
多服务器的日志合并统计 2005/8/29 15:16:44
ARP地址解析协议详解及其漏洞分析 2005/8/19 8:29:37
信息安全策略概述 2005/8/16 17:33:36
Web服务器日志统计分析完全解决方案 2005/8/10 12:27:24
网络使用的学习总结 2005/8/10 8:27:09
WinSock学习(完整) 2005/8/4 15:35:17
Linux常见的紧急情况的处理方法 2005/8/4 13:13:00
XP系统网络不能互访七大解决之道 2005/7/29 10:34:40
AWStats: 跨平台的日志分析工具——在GNU/Linux和Windows平台上的使用简介 2005/7/28 16:44:17
日志文件分析工具—AWStats在IIS中的配置步骤 2005/7/28 12:20:10
XP系统网络不能互访七大解决之道 2005/7/9 19:25:16
[网工]入侵检测系统FAQ(全) 2005/7/6 21:01:49
IPSec基础-IPSec服务 2005/7/6 21:00:34
网络设计师考试资料-典型选择题及答案 2005/7/6 20:57:18
2005年网络工程师考试题目预测(1) 2005/7/6 20:54:53
CCNP-CIT中文笔记 完整版 2005/6/24 15:31:49
交换机(Switch)工作原理 2005/6/22 7:57:16
Windows蓝屏代码含意速查表(全集) 2005/6/20 10:34:34
网络安全方面的专业词汇大全 2005/6/20 10:33:11
网络流量监控器mrtg全攻略 2005/6/17 15:03:36
再探安装多操作系统分区,grub的设置问题 2005/6/10 21:14:14
用安装光盘来修复grub 2005/6/10 21:12:03
dos下用grub.exe修复启动故障 2005/6/10 21:10:44
Windows常见非法操作详解 2005/6/10 20:38:55
系统故障的超级解决方法 2005/6/8 9:10:26
软件vpn与硬件的优势对比 2005/6/3 12:14:03
加速磁盘碎片整理的六大技巧 2005/6/3 11:56:31
在Linux操作系统下备份恢复技术的应用 2005/6/3 11:53:31
Windows服务器安全设置经验 2005/6/3 11:52:37
GRUB安装,配置及使用汇总 2005/4/20 12:19:49
安装Win2003 Server下的Snort 2005/3/24 9:18:42
基于网络IDS的典型配置 2005/3/24 9:01:23
Windows 2000日志的描述及删除 2005/3/15 12:36:43
三分种保证IIS自身的安全性 2004/11/24 9:25:45
WIN2000故障修复之紧急修复过程 2004/11/24 9:22:41
在Win 2003中配置NAT服务器 2004/11/24 9:21:40
将Access数据库移植到MicrosoftSQLServer7.0 2004/11/24 8:53:13
恢复Windows2000/XP 管理员密码 2004/11/24 8:38:12
网络邻居问题故障解决方法大全 2004/11/16 8:25:55
Linux下加挂文件系统 2004/11/15 14:34:32
Linux常见故障的紧急处理方法 2004/11/10 16:26:57
CCNA考试命令集 2004/11/9 10:47:49
100多道简单网络基础题(答案) 2004/11/9 10:09:43
发一些运行命令 2004/11/9 9:22:43
Windows Xp修复控制台详细用法 2004/10/25 17:29:20
让DNS服务器支持泛域名解析 2004/10/24 18:20:49
数据恢复的方法 2004/10/21 8:55:26
硬盘数据拯救全攻略 2004/10/21 8:54:01
内存介绍 2004/10/21 8:52:01
BIOS设置攻略,比较全面! 2004/10/21 8:47:33
全面深入了解电脑死机的原因 2004/10/21 8:46:19
系统安全名词列表(1) 2004/10/8 9:38:02
插翅难逃 根据Web服务器的记录来追踪黑客 2004/9/17 8:56:49
群集服务指南 2004/9/15 13:22:48
华为、Intel与Cisco的交换机产品使用感受 2004/9/13 8:29:36
[Linux命令]备份与压缩命令 2004/9/9 9:49:50
怎样在Cisco设备上实现IOS DHCP Server的功能 2004/9/1 11:19:27
资源共享,如此“GUEST” 2004/9/1 11:16:29
实现四台Web服务器的负载均衡 2004/9/1 11:15:32
用MDaemon搭建邮件服务器 2004/9/1 11:11:24
网络流量监控器mrtg全攻略 2004/8/21 10:14:35
硬盘数据恢复实例全解 2004/8/21 9:55:55
实现四台服务器的负载均衡 2004/8/13 13:01:59
Cisco 路由配置语句汇总 2004/8/10 12:26:42
计算机端口介绍[详细列表] 2004/8/9 8:02:50
关于Sniffer 2004/7/26 8:47:20
恢复Windows2000/XP 管理员密码 2004/7/22 14:21:55
CIT中文笔记 2004/7/15 11:52:42
一种 Web 应用程序级别的 Cluster 实现技术 2004/7/14 16:23:12
Windows 非法操作详解 2004/7/9 9:10:20
UNIX系统被删文件的恢复策略 2004/6/18 8:13:46
网上邻居的内幕 2004/6/7 8:36:01
安全配置WIN2000服务器 2004/6/2 15:08:02
教你设置 需要密码的Windows XP系统的共享文件夹 2004/6/2 15:01:21
Linux常见故障的紧急处理方法 2004/5/26 14:08:31
VNC的安装与使用 2004/5/26 14:06:49
Linux一句话精彩问答-网络相关篇 2004/5/26 13:44:58
Linux一句话精彩问答-网络无关篇 2004/5/26 13:43:14
Win2KSP4八大热点问题 2004/5/25 8:01:12
Port Reporter 工具的可用性和说明 2004/5/13 7:52:22
用好你的WinXP之一二三 2004/5/5 17:19:35
实用运行命令大集合 2004/4/15 17:22:34
高手最常用的五个组合键 2004/4/15 17:14:47
IIS常见问题及解答 2004/3/31 15:41:39
IIS安全机制漫谈 2004/3/31 14:40:28
Win2000 Server入侵监测 2004/3/31 14:32:37
Ghost使用(包括制作自动恢复光盘) 2004/3/30 15:01:18
Ghost V8.0 使用详解 2004/3/30 14:52:47
Outlook Express 错误代码表 2004/3/30 14:51:50
Windows 2000 安全检查清单 2004/3/23 10:04:45
Win2000命令全集 2004/3/16 17:07:20
网络经典命令行 2004/3/16 17:05:34
mac地址更改全攻略 2004/3/16 16:59:30
让你的WINDOWS XP更爽 2004/3/3 15:57:05
浏览过含有恶意代码的网页后的解决办法 2004/2/27 11:31:20
安全事件日志中的事件编号与描述 2004/2/23 15:36:26
双机硬件及w2k做群集解决方案 2004/2/21 0:24:25
深入学习Linux下的网络监听技术 2004/2/20 13:53:41
Linux口令恢复任我行 2004/2/20 13:48:54
IE不能开新窗口多种解决方法 2004/2/17 9:09:54
Win XP家用版也能装 IIS 2004/2/17 9:06:49
网络端口及其详解分页 2004/2/17 9:03:12
系统知识:Windows系统中注册表的禁用及启用方法 2004/2/11 10:40:36
IPC$详细介绍 2004/2/10 9:49:01
Windows的自启动方式 2004/2/5 11:19:25
在接入服务器上使用Cisco IOS DHCP服务器 2004/2/4 8:31:10
Cisco路由器由Windows 2000 CA中心登记证书 2004/2/4 8:30:02
Snort 中文手册 2004/1/29 11:53:10
U盘上的LINUX 2004/1/29 11:49:46
http 500内部服务器错误 2004/1/17 13:50:19
Linux软件安装一般方法 2003/12/31 20:57:02
LINUX新手入门及安装配置faq200(下) 2003/12/31 20:54:57
LINUX新手入门及安装配置faq200(上) 2003/12/31 20:51:43
在RedHat9下配置时间服务器 2003/12/31 20:35:06
高性能linux双效防火墙howto 2003/12/31 20:32:05
使用x-window的远程显示 2003/12/31 20:09:46
Linux常见紧急情况处理方法 2003/12/31 20:06:21
在unix linux下安装配置DHCP服务 2003/12/31 20:00:40
c3550配置作为dhcp服务器工程实例 2003/12/27 20:52:25
Netsh命令备份/恢复服务器网络设置 2003/12/21 9:52:36
用netstat查QQ好友IP 2003/11/28 10:41:01
windows系统文件名详解 2003/11/27 9:44:48
Win2000 Server入侵监测 2003/11/27 9:13:06
续(二)Solaris高级系统管理员指南!(公司内部培训教材) 2003/11/26 10:37:19
续(一)Solaris高级系统管理员指南!(公司内部培训教材) 2003/11/26 10:36:21
Grub配置杂谈(转载) 2003/11/23 10:03:05
使用图形客户端远程访问Linux服务器 2003/11/19 10:42:48
能看到自己计算机,看不到网上邻居的标准答案! 2003/11/11 7:59:57
Symantec.Ghost.8.0企业版使用全攻略 2003/11/4 8:57:43
装机软件合集 2003/10/31 9:28:44
linux经典问题==网络篇 2003/10/30 11:20:02
linux经典问题==基础篇 2003/10/30 11:19:02
LINUX 常见问题1000个详细解答 2003/10/29 14:13:25
ADSL+RH8.0透明网关指南 2003/10/23 15:11:40
用windows2000实现双机热备 2003/10/22 8:10:28
网络共享软件WinRoute Pro4.1全攻略 2003/10/13 11:09:48
Window 服务全功略 2003/10/10 12:09:28
如何突破各种防火墙的防护 2003/10/10 12:07:54
Redhat9+ADSL+IPTABLES+DHCPD解决方案 2003/9/17 8:44:16
SOCKET编程详细文档 2003/9/17 8:24:16
调整 TCP/IP 防范攻击 2003/9/11 14:38:28
DOS下常用网络相关命令解释 2003/9/11 14:36:13
华为s系列手册(连载1) 2003/9/8 16:07:14
CISCO 技术大集合 2003/9/8 7:46:34
几种QQ病毒以及解决办法 2003/9/5 17:57:45
最佳的75个安全工具 2003/9/5 15:18:38
某大型企业局域网安全解决方案 2003/9/2 9:14:09
基于Linux的集群系统(五) 2003/9/1 18:37:53
基于Linux的集群系统(二) 2003/9/1 18:27:32
基于linux的集群系统(一) 2003/9/1 18:25:40
常见端口表汇总 2003/9/1 10:31:24
20%的SOLARIS知识解决80%的问题 2003/8/29 15:16:51
常见软件故障及处理方法 2003/8/27 14:21:43
Win2000安装参数 2003/8/27 14:12:46
新建策略禁用ICMP协议(Win2K/XP) 2003/8/27 14:11:01
Win2000命令全集 2003/8/27 14:06:40
用Winroute共享ADSL的实现篇 2003/8/22 11:36:58
Lynx 简明使用指南 2003/8/19 9:42:57
Linux服务器的一些基本应用 2003/8/15 12:11:07
Linux下如何接ADSL一类的宽带猫带动局域网上internet (转) 2003/8/15 10:45:23
Linux系统命令分类详解 (2) 2003/8/12 9:23:12
在RedHat下建立群集 2003/8/12 9:13:09
Debian GNU/Linux下的入侵检测系统 2003/8/12 8:41:10
如何在Linux下实现设备的配置 2003/8/12 8:14:10
Linux下的NAT及防火墙的混合应用 2003/8/5 8:15:16
网络通信命令详解 2003/8/5 7:14:31
如何安装双硬盘 2003/8/4 10:15:35
五个TCP/IP实用程序 2003/7/31 8:48:16
linux常见问题FAQ 2003/7/30 18:01:57
Linux系统下的扫描器及防范 2003/7/30 17:26:42
解析Linux网络分析的三大利器 2003/7/30 17:21:18
Linux服务器架设实例 2003/7/30 17:06:11
思科产品常见问题一百问 2003/7/30 14:17:30
系统安全名词列表 2003/7/29 10:27:02
NTFS分区随心转换[转帖] 2003/7/28 21:06:39
4006交换机(IOS版)简明配置维护手册 2003/7/28 18:02:12
MDaemon Mail Server 设置问题10则(菜鸟总结篇) 2003/7/28 10:06:00
Linux下软件的基本安装和卸载 2003/7/28 9:28:29
Microsoft的25位CDKey里有什么 2003/7/28 8:53:21
Windows死机密码 2003/7/28 8:50:13
用实验快速学习Samba 2003/7/21 8:40:19
solaris常用命令及简单解释[推荐] 2003/7/19 19:24:27
Solaris 问答集 2003/7/19 19:06:09
如何配置DNS Server(附详细实例) 2003/7/15 8:45:49
[转帖]solaris常用命令及简单解释[推荐] 2003/7/15 8:41:27
[分享]玩转Xwindow 终端 2003/7/15 8:39:23
系统平台安装操作手册 SUN Fire 280安装配置手册 2003/7/15 8:36:18
全面搞定vmware上装solaris 2003/7/15 8:31:07
Solaris高级系统管理员指南!(某公司内部培训教材) 2003/7/15 8:28:23
服务器的安全解决方案 2003/7/14 16:23:48
网络流量监控器mrtg全攻略 2003/7/14 9:37:34
linux应用软件谈之远程桌面控制篇 2003/7/14 8:56:59
基于Linux的路由器和防火墙配置 2003/7/14 8:52:12
[转帖]实现四台服务器的负载均衡 2003/7/13 19:03:25
[精华手册]CISCO路由器配置手册 2003/7/13 19:01:40
win2000忘记administrator密码的解决方案 2003/7/13 18:58:23
redhat 7.2下面配置VPN客户端理论联系实际! 2003/7/13 18:49:26
redhat linux 9.0的samba设置详解(原创) 2003/7/13 18:15:31
学习Linux的七点忠告 2003/7/13 17:48:46
在win2000中使用mrtg进行实时流量监测 2003/7/11 22:14:10
网络经典命令行 -> Windows 2k/2003 Server 2003/7/8 12:24:10
终端服务命令参考手册 2003/7/8 12:20:59
部分病毒手工清除方法集锦 2003/7/8 12:17:57
[转帖]:攻破天网的几种办法 2003/7/2 9:55:38
Windows下Ping命令详解及使用小技巧 2003/7/2 9:06:47
Linux经典使用技巧8则 2003/7/1 8:39:51
Linux下文件查找技术大全 2003/7/1 8:38:50
linux下的dns设置详解 2003/6/27 8:28:11
Emacs 快速指南( Emacs tutorial ) 2003/6/27 8:20:13
电脑书籍下载网站集锦 2003/6/27 8:18:43
防范木马程序 2003/5/27 13:54:24
Linux下实现集群负载均衡 2003/5/25 21:04:02
Linux 组网入门 2003/5/25 20:56:32
常见windows 2000系统进程描述 2003/5/23 20:53:20
木马的分析方法 2003/5/23 20:50:33
近期常见蠕虫、木马的检测方法 2003/5/23 20:22:42
解剖WIN2K下的空会话 2003/5/23 19:54:32
用Linux防火墙伪装抵住黑客攻击 2003/5/21 10:00:55
linux下的dns设置详解 2003/5/19 9:39:26
Linux新手入门教程 2003/5/16 23:18:21
网管的常用命令! 2003/5/15 21:34:44
Samba服务器的使用 2003/5/6 14:07:19
PHP新手上路 2003/4/27 11:50:38
PHP的十个高级技巧 2003/4/27 11:04:11
Windows Memory Dump File Options Overview 2003/4/26 23:13:11
在 Windows XP 中内存转储后如何搜集信息 2003/4/21 14:21:24
Windows 2000蓝屏死机之STOP对"症"下药 2003/4/19 15:03:46
Windows 2000蓝屏死机故障处理 2003/4/19 14:53:37
winows蓝屏代码提示解析 2003/4/19 14:43:06
Sniffer的一些资料 2003/4/9 9:34:08
Linux下的sniffer工具--Tcpdump的安装和使用 2003/4/9 9:29:52
一般黑客入侵所需要的几个常用命令! 2003/4/9 9:23:08
Sniffer 常见问题集(FAQ) 2003/4/9 9:20:30
构建基于 LDAP 的地址簿 2003/4/2 19:56:44
教程大全(转于红客联盟) 2003/3/31 17:36:40
网络技术常用术语汉语对照 2003/3/31 17:34:50
net命令全集 2003/3/31 10:48:29
[原创]一份详尽的IPC$入侵资料 2003/3/31 10:20:58
Windows下的个人防火墙-网络数据包拦截技术概览 2003/3/31 10:17:45
伪装IP地址的洪水Ping攻击 2003/3/31 10:16:46
一般黑客入侵所需要的几个常用命令 2003/3/31 10:13:15
自己动手做一个迷你 Linux 系统 2003/3/25 10:21:18
Linux中软件安装及技巧 2003/3/25 10:05:00
如何规划 Linux 主机 2003/3/24 16:00:23
如何学习 Linux 2003/3/24 15:59:18
什么是 Linux 2003/3/24 15:58:22
vi介绍 2003/3/24 14:39:44
Linux服务器的一些基本应用 2003/3/24 10:43:09
用Linux建立局域网服务器 2003/3/23 21:50:45
某大型企业局域网安全解决方案 2003/3/17 22:44:09
ProFtpd快速指南 2003/3/17 15:27:03
linux99问 2003/3/11 18:37:18
Linux简明系统维护手册 2003/3/11 18:35:40
Linux中的十个“快速” 2003/3/11 18:33:53
Linux 入门常用命令 2003/3/11 18:25:01
Internet安全,防火墙及其它 2003/2/23 14:48:51
简易防火墙建置与流量统计之五 2003/2/22 14:45:12
Linux关机命令详解 2003/2/22 14:36:55
Linux中文件查找技术大全 2003/2/22 14:35:52
搞清linux的用户和组-基础篇 2003/2/22 14:33:20
突破TCP-IP过滤/防火墙进入内网(一) 2003/2/22 14:30:05
Linux下访问Windows硬盘分区 2003/2/22 14:23:20
某大型局域网安全解决方案 2003/2/21 22:13:18
Linux简明系统维护手册5 2003/2/18 19:48:03
Linux简明系统维护手册1 2003/2/18 19:40:38
linux常用精华网址 2003/2/18 15:07:43
简易防火墙建置与流量统计 2003/2/18 14:54:01
网站综合实例 2003/1/25 20:42:08
linux网站综合实例 2003/1/19 22:05:29
Netfilter/Iptables的防火墙功能介绍 4 2003/1/12 16:21:46
BT的学生 2002/11/11 14:23:38
一个mm面试得经验 2002/11/11 9:49:36
校园尴尬事(超级搞笑)(10)(史上最强贴) 2002/11/11 9:45:01
木马是如何编写的(三)(3) 2002/11/10 17:53:13
木马是如何编写的(二)(3) 2002/11/10 17:50:36
木马是如何编写的(一)(3) 2002/11/10 17:47:40
木马是如何编写的(一)(2) 2002/11/10 17:46:51
木马是如何编写的(一)(1) 2002/11/10 17:45:16
注册码 2002/11/9 12:45:44
通用序列号 2002/11/9 12:44:35
注册码大全二 2002/11/9 12:43:08
注册码大全 2002/11/9 12:41:10
通用序列号 2002/11/9 12:37:37
恶意网页修改注册表的十二种现象(下) 2002/11/9 9:59:31
恶意网页修改注册表的十二种现象(上) 2002/11/9 9:58:07


感性空间
设计&运维
网络技术
休闲娱乐
NetFilter
linux&Unix
网络安全
程序空间
软件考试
RFC&ISO
规划&规范
虚拟&存储
Apple技巧
云计算&大数据



文章搜索



站内搜索