Friday, December 30, 2011

What is DDOS attack? Is there any way defense?

What is DDOS attack? Is there any way defense?

what is ddos attacks
DDOS is an acronym of Distributed Denial of Service . And what is the denial of service ? Can be understood, all can lead to legitimate users don't access the normal behavior of network services are considered denial of service attacks. The purpose of denial of service attack is very clear, that is normal to prevent legitimate users access to network resources, so as to achieve the attacker's ulterior motives. It is also a denial of service attack, DDOS and DOS is different, DDOS attack strategies focused on by many zombie hosts (the host the attacker hacked or indirect use of )sends to the victim host a large number of seemingly legitimate network packets, resulting in network congestion or server resource exhaustion denial of service, distributed denial of service attack, once implemented, will attack like a flood of network packets flock to the victim host, thus bring the legitimate users of network packet flooding, leading to legal user can not access the network resources on severs. Therefore, denial of service attack has been called the "flood attacks," there is a common means of DDOS attacks SYN Flood, ACK Flood, UDP Flood, ICMP Flood, TCP Flood, Connections Flood, Script Flood, Proxy Flood, etc.; and DOS will focus on attack through the specific vulnerabilities lead to failure of the host network stack , system crash, crash the host network can not provide normal services, resulting in a denial of service, DOS attacks are common TearDrop , Land, Jolt, IGMP Nuker, Boink, Smurf, Bonk, OOB and so on. Denial of service attacks on these two terms, mainly against the larger DDOS attack, because it is difficult to prevent, as DOS attacks, through to the host server patch or install a good firewall software can prevent, will be detailed later describes how to deal with DDOS attacks.
There are currently three popular DDOS attacks:
1.SYN / ACK Flood Attack: This attack is most effective DDOS classical method can kill a variety of systems through web services, mainly through the victim host sends a large number of forged source IP and source port of the SYN or ACK packet, lead host cache resources are exhausted or busy sending packets caused by denial of service response, because the forged source is more difficult to track, there is a certain drawback is the difficulty to implement, requiring a high bandwidth zombie hosts support. A small amount of this attack will lead to host server can not access, but it can Ping the pass, on the server using Netstat-na command to Observe that there are a lot of SYN_RECEIVED state, a large number of such attacks will lead to Ping fails, TCP / IP stack failure, and the system will be freezing phenomenon that does not respond to keyboard and mouse. Most common firewall such attacks can not resist.
2.TCP full-connect attack: This attack is to bypass the firewall inspection routine designed, under normal circumstances, most conventional firewall with filtering TearDrop, Land and other DOS attacks, but for normal TCP connection is let pass , does not know a lot of network service (such as: IIS, Apache Web server, etc.) can accept a limited number of TCP connections, once a large number of TCP connections, even normal, can lead to very slow or unable to access the site access, TCP all connected through a number of zombie hosts attack is continuous with the host server to establish a large number of affected TCP connections until the server's memory and other resources are exhausted and are drag you down to cause a denial of service.Attack is characterized by a general firewall bypass protection to achieve the attack purpose disadvantage is the need to find a lot of zombie hosts, and because the zombie host's IP is exposed, so easily traced.
3. Brush Script scripting attack: This attack is mainly directed against the existence ASP, JSP, PHP, CGI and other scripts, and call MSSQLServer, MySQLServer, Oracle and other database systems and web site design.Features and server establish a normal TCP connection and constantly submit queries to the script, the list takes a lot of database resources such calls. In general, submit a GET or POST command to the client's cost and bandwidth usage is almost negligible, while the server processes the request, but may have to go on a million records to identify a record, this process cost of resources is great, very few common database server can support hundreds of simultaneous query command, which is for the client, it is easy, so the attacker simply by Proxy proxy server to host a large number of submitted query command, only a few minutes to server resources will be consumed and cause denial of service, a common phenomenon is the site slow as a snail, ASP program failure, PHP connect to the database fails, the database main CPU-high. This attack can be characterized completely bypass the normal firewall protection, you can easily find some Proxy agent attack, only drawback is that static page site to deal with the effect will be greatly reduced, and some of Proxy will be exposed to the attacker's IP address.

How to delete the System Volume Information folder

How to delete the System Volume Information folder

Sometimes we will find the hard disk inside each partition has a System Volume Information folder and also can not delete this folder , and what is the System Volume Information folder to do, can it be deleted, how should I delete it. Here I come to you talk about the computer skills of the System Volume Information folder.
What is the System Volume Information folder?

System Volume Information folder is a hidden system folder ."System Restore" tool use the folder to store its information and restore points. Your computer each partition has a System Volume Information folder. This folder is stored with the system restore backup information, the user uses the system with the time increase, the restore points become more and more, and finally will lead to hard disk space be less and less.

Look at FAT32 format System Volume Information folder

For the System Volume Information folder in a FAT32 file system ,you can view the contents inside without any setting.

Look at NTFS format System Volume Information folder

Right-click the System Volume Information folder in the root folder , then click the "XP Download Sharing and Security" - single click the Security tab - Click "Advanced" - hook the "Allow inheritable permissions from father to propagate to this object" in the first - click "OK." In this way, you can open the System Volume Information folder, delete the files inside.

Completely remove the System Volume Information folder

1, Run, type "gpedit.msc" / (Group Policy) program / Computer Configuration / Administrative Templates / System / System Restore / right, turn off System Restore, double-click to open it, and enabled.

2, Run, type "gpedit.msc" / (Group Policy) program / Computer Configuration / Administrative Templates / windows components / windows Installer / on the right there will be a "turn off System Restore check points to create" double click to open it, select Enable .

Use the cacls command to give the current user full control permissions to delete the System Volume Information folder, the command is as follows: 'cacls "c: \ System Volume Information" / g everyone: f 'this is to give all users on the c drive System Volume Information file Full Control permission on the folder, you can delete it.

Through the basic explanation of the System Volume Information folder , all of us should know how to look at System Volume Information folder, how to delete the System Volume Information folder.We will learn more computer skills.

This address is http://www.computerites.com/computer-skills/2011/11/how-to-delete-the-system-volume-information-folder-6.html

UA:D [1.9.13_1145]

Saturday, December 24, 2011

Windows XP Windows 7 Dual Operating System Simple Installation Procedures and Attentions

Windows XP Windows 7 Dual Operating System Simple Installation Procedures and Attentions



Many user install dual operating system on their computer,even after Windows 7 appeared.Most of them will install Windows 7 Windows XP dual system right now.But how to install dual system?Now let us to see the procedures below:
To install Windows XP Windows 7 dual system, should insist on the order of "low version" to "high version" :
First, take the disc (or "USB flash disk") format installation, install Windows XP to the C drive (NTFS file system reserved space is not less than 10G). Then, format the D drive (NTFS file system reserved space is not less than 20G). Use the virtual drive to load Windows 7 disc image,
then you can enter the installation process and complete the system installation.After installed Windows XP and Windows 7 dual system, if reinstall Windows 7, just format the D drive in Windows XP, still load with the virtual drive to install. If you reinstall Windows XP, you will lose about Windows 7 boot entry.
But no need to worry, the following tutorial will satisfactorily solve the problem Windows XP Windows 7 dual boot system reinstalled the system files and the missing solution options menu.
Solution of the Boot Files and the Boot Option Menu are Lost after Windows XP Windows 7 Dual System Reinstalled
This article address is http://www.computerites.com/computer-skills/2011/12/windows-xp-windows-7-dual-operating-system-simple-installation-procedures-and-attentions-224.html

Friday, December 23, 2011

Solve the Problem of HTTP Error 403 Forbidden

HTTP Error 403 Forbidden
When you visit a Web site if you receive a following error message 403 :
Server Error in Application "<application name>"
--------------------------------------------------------------------------------
HTTP Error 403.1 - Forbidden
HRESULT: 0x80070005
Description of HRESULT: You have attempted to run a CGI, ISAPI or other executable program from a directory that does not allow executables to run.

The cause is that execute access forbidden. The appropriate level of the Execute permission is not granted.For example, this problem occurs if you try to request an ASP page from a directory that does not have the scripts handler permission enabled.And the CGI application is also.
To solve this problem,you should:
1.Click WIN+R to open the run window,type INETMGR and click enter.
2.In IIS Manager, locate the level that you want to manage.
3.In Features view, double-click Handler Mappings.
4.In the Action pane, click Edit Handler Permissions.
5.If you use ASP,click to select Script, and then click OK.
If you use CGI,click to select Execute, and then click OK.
» This address is http://www.computerites.com/internet-skills/2011/12/solve-the-problem-of-http-error-403-forbidden-239.html