본문 바로가기

개발

(326)
개발/서버
ddos 방화벽 룰 - 패스워드 공격 :iptables -A INPUT -p tcp —dport 22 -m state —state NEW -m recent —set —name SSHSCANiptables -A INPUT -p tcp —dport 22 -m state —state NEW -m recent —update —seconds 60 —hitcount 8 —rttl —name SSHSCAN -j LOG —log-prefix SSH_SCAN:iptables -A INPUT -p tcp —dport 22 -m state —state NEW -m recent —update —seconds 60 —hitcount 8 —rttl —name SSHSCAN -j DROP혹은 ../etc/rc.d/init.d/iptables save.. 2015.09.10
개발/서버
UNIX IP Stack Tuning Guide v2.7 UNIX IP Stack Tuning Guide v2.7 UNIX IP Stack Tuning Guide v2.7 By Rob Thomas, robt at cymru.com, 03 DEC 2000 Introduction The purpose of this document is to strengthen the UNIX IP stack against a variety of attack types prevalent on the Internet today. This document details the settings recommended for UNIX servers designed to provide network intensive services such as HTTP or routing (firewall.. 2015.09.10
개발/서버
죽은 프로세스 살리기 #include #include #include #include #include #include #include /* 검사 주기(초) */#define CHECK_SECOND 30 /* 실행 서버 패스 및 이름 */#define APP_PATH "/root/ztsvr/ztsvr"#define APP_NAME "ztsvr" int check_process();void get_timef(time_t, char *); int main(){ int rt; time_t the_time; char buffer[255]; char app[255]; sprintf(app, "nohup %s &", APP_PATH); printf("START\n"); fflush(stdout); while(1) { time(&the_t.. 2015.09.10
개발/서버
How to kill zombie process [closed] I launched my program in the foreground (a daemon program), and then I killed it withkill -9, but I get a zombie remaining and I m not able to kill it withkill -9. How to kill a zombie process?If the zombie is a dead process (already killed), how I remove it from the output ofps aux?root@OpenWrt:~# anyprogramd & root@OpenWrt:~# ps aux | grep anyprogram 1163 root 2552 S anyprogramd 1167 root 2552.. 2015.09.10
개발/해킹
Security of Cisco CallManager-based IP Telephony against Malicious Hacker Attacks Independent Lab Test Report: Security of Cisco CallManager-based IP Telephony against Malicious Hacker Attacks Cisco Systems becomes the first, and to date the only, IP-Telephony vendor to earn Miercom's highest rating of Secure for its proven ability to defend an IP phone system against malicious attack. 2015.02.03
개발/해킹
Network Security Visibility and Flow Analysis Network Security Visibility and Flow Analysis A man in the middle attack is one in which the attacker intercepts messages in a public key exchange and then retransmits them, substituting his own public key for the requested one, so that the two original parties still appear to be communicating with each other. The attack gets its name from the ball game where two people try to throw a ball direc.. 2015.02.03