Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Use small network command to check whether PC Security     - Google open source TCP team repaired the Linux kernel TCP flaw (Linux)

- Linux Change ssh port and disable remote root login at (Linux)

- CentOS yum source configuration (Linux)

- To install Docker under Ubuntu 15.04 (Linux)

- Bash variable expansion modifier (Programming)

- Strategy Games Ubuntu installation of Wesnoth 1.12.1 (Linux)

- Linux environment variable configuration and save places (Linux)

- Parse Server supports iOS and Android push messaging (Programming)

- TCP network communication Java Programming (Programming)

- 3 ways to create a lightweight, durable system of Ubuntu Linux USB disk (Linux)

- Lua4.0 interpreter documents (Programming)

- Oracle DATABASE LINK (DBLINK) Create (Database)

- Linux User Management (Linux)

- Fedora 21 setting boot script (Linux)

- ElasticSearch basic usage and cluster structures (Server)

- Getting Started with Linux system to learn: how to configure a static IP address for CentOS7 (Linux)

- Nodejs complete installation instructions for Express (Linux)

- How Glances monitoring system on Ubuntu (Linux)

- Docker use Dockerfile created since the launch of the service support SSH container mirror (Server)

- Windows environment Android Studio v1.0 Installation Guide (Linux)

  Use small network command to check whether PC Security
  Add Date : 2018-11-21      
  Some basic commands can often play a significant role in the protection of network security, the role of the following commands on a few very prominent.

Detecting network connectivity

If you suspect that your computer Trojan installed by others, or a virus, but there is no perfect tool for hand detection is not really such a thing happens, then you can use Windows built-in network command see who connect your computer. Specific command format is: netstat -an command to see all the local computer and establish a connection to the IP, which consists of four parts --proto (connection), local address (local connection address), foreign address (and the local establishment connection address), state (current port status). Through specific information this command, we can completely control the computer connection, so as to achieve the purpose of controlling the computer.

Disable unknown service

Many of my friends one day after a system reboot will find the computer slows down, no matter how optimized are slow, with anti-virus software can not find the problem, this time is likely to be other people through the invasion of your computer you open a remarkable certain services, such as IIS information services, so that your antivirus software is not check out. But wait, you can "net start" to see what kind of services the system is turned on, if you find the open service is not their own, we can in a targeted manner to disable this service. The method is to directly enter "net start" to see the service, and then "net stop server" to disable services.

Easy to check accounts

For a long time, very much like a malicious attacker to use cloning methods to control the account on your computer. The method they use is to activate a system default account, but this account is not often used, and then use the tool to upgrade the account to administrator privileges governance, it seems that this account is the same as the original from the surface, but this clone accounts system is the biggest security risk. A malicious attacker can arbitrarily control the account on your computer through this. To avoid this, you can use very simple methods account for testing.

First, enter the command line net user, view what users on your computer, then use "net user username" Show This user belongs to any authority, usually in addition to Administrator is the administrators group, the other is not! If you find a system built-in user belongs to administrators group, then almost certainly you have been invaded, and the others on your computer account was cloned. Quick use "net user username / del" to delete the user it!
- Linux use glibc2 library and crypt () function to generate the user password (Programming)
- MySQL database to open a remote connection method (Database)
- Android in the event delivery and handling mechanism (Programming)
- Linux commands to access the cheat sheet (Linux)
- On the PC goes heavy security watch your startup items (Linux)
- Learning the Linux powerful network management capabilities (Linux)
- JDK tools jstat (Linux)
- xCAT install and update software (Linux)
- systemd run levels and service management command Introduction (Linux)
- How to install and configure in Ubuntu 14.10 'Weather Information Indicator' (Linux)
- Git Advanced Tutorial (Linux)
- Erase do with HTML5 Canvas and diffusion effect (Programming)
- How to Install Xombrero 1.6.4 (minimalist Web browser) on Ubuntu and Archlinux (Linux)
- Java to create a table in the database SYBase (Database)
- Ubuntu 14.10 / 14.04 / 12.04 installation GNOME Pie 0.5.6 (Linux)
- Linux dd command make U disk boot disk (Linux)
- Node.js v4.0.0 installation configuration on Ubuntu 14.04 / 15.04 (Linux)
- C ++ sequence containers basics summary (Programming)
- ARP Linux-related operations (Linux)
- How to merge two pictures in Cacti (Linux)
  CopyRight 2002-2020 newfreesoft.com, All Rights Reserved.