首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 171 毫秒
1.
本文首先解释了缓冲区及缓冲区溢出的概念,通过一个会导致缓冲区溢出的程序对缓冲区溢出攻击的产生进行了实例分析;综述缓冲区溢出攻击防范策略。  相似文献   

2.
首先解释了缓冲区溢出的概念和溢出原理,并在VC++环境下比较了缓冲区非溢出、下标越界溢出、堆溢出、综合代码和激活记录溢出四种情况,由此总结出了避免缓冲区溢出的基本方法;其次通过一个导致缓冲区溢出的小程序对缓冲区溢出攻击的产生进行了实例分析,总结出缓冲区溢出攻击的类型;最后,从静态防范和动态防范两个方面提出了溢出的防范策略.缓冲区溢出攻击的分析与防范对网络信息安全具有非常重要的意义.  相似文献   

3.
潘磊  赵晖 《河北企业》2013,(1):92-93
<正>在当今开放式的信息环境中,传统的安全结构已经落伍,每一台连接到互联网上的服务器都有可能受到来自病毒侵扰和黑客的入侵,安全风险远远超过传统环境风险。在这里讨论的Web服务器就是如此。Web服务器的攻击是通过Http协议发起的,所以传统的防火墙对诸如SQL注入及基于脚本的DDos等这种攻击方式不能提供很好的保护,且他们试图通过Web服务器上的突破口,来进一步对内部网络进行渗透,以达到投机、犯罪的目的,而这种做法是与我国法律相违背的。所以,Web服务器的安全就显得尤为重要。有鉴于此,我们提出了保护Web服务器安全的Web入侵防御系统,并介绍系统的设计与实现。一、几种常见的Web服务器面临的威胁1.缓冲区溢出。缓冲区溢出攻击是利用缓冲区溢出漏洞所进行的攻击行动,具体是指当计算机向缓冲区内填充  相似文献   

4.
《价值工程》2013,(16):201-202
Widows server 2003操作系统常常会受到缓冲区溢出的攻击、拒绝服务攻击、口令破解攻击、欺骗用户攻击和扫描程序和网络监听攻击等类型的攻击。为了应对不同的攻击,Widows操作系统可采用通过补丁管理、通过账号口令方面、通过限制网络服务、通过使用安全文件系统、日志审核等方式加固操作系统。  相似文献   

5.
IT新知     
近日,网络中流传着一种针对腾讯QQ即时聊天软件的攻击手段,通过向QQ好友发送一条特殊内容的消息,就能够导致消息接收者的QQ崩溃。实际上,这并不是腾讯QQ的问题,而是因为Windows系统存在一个DLL缓冲区溢出漏洞,使QQ成为受害者。  相似文献   

6.
IE是大家使用最多的浏览器,然而又是漏洞频出,比如IE在处理“frame”和“iframe”HTML元素的两种属性时可能会卅现缓冲区溢出、当用户使用一个存在该漏洞的IE版本访问恶意网页或使用Outlook、Outlook Express、AOL等依赖Web Bwwser ActiveX控件的软件查看HTML电子邮件时.都有可能会受到攻击。因此,为了保护系统,我们也可以像“收礼只收脑白金”那样让电子邮件软件拒收假冒伪劣之“伊妹儿”,即“邮件只收纯文本”。以下。我们就以Foxmail和Outlook Express(简称OE)为例,说明邮件只收纯文本的设置方法。  相似文献   

7.
从缓冲区溢出的原理出发,详细的阐述了缓冲区溢出的黑客攻击方法及如何防范黑客攻击的技术,确保网络运行的安全和可靠,在计算机网络安全管理中具有较好的实用价值。  相似文献   

8.
《价值工程》2013,(7):211-212
在Web系统中,SQL注入是一种经常出现的漏洞。攻击者利用此漏洞通过SQL语句对数据库进行直接地访问,严重威胁系统安全。本文由SQL注入原理着手,对产生SQL注入原因以及常见的SQL注入攻击方式进行了探究,并提出有效防范SQL注入攻击的对策,旨在为一些Web应用在防注入方面提供指导和帮助。  相似文献   

9.
<正>一、常见的web服务攻击Demchenko在漏洞—事件生命周期模型中指出,攻击者实施攻击的方法包含以下几个基本步骤:调查和评估;利用和渗透;逐步提升权限;维持访问或拒绝服务;未授权使用资源;清除或伪造活动轨迹。从这些步骤中可以得知攻击者是怎样利用Web服务实现协议上的漏洞,进行准备和实施攻击的。  相似文献   

10.
技术溢出机理及效应分析   总被引:8,自引:0,他引:8  
文章对技术溢出概念进行了深入探讨,分析了溢出的外部性和有效性,在此基础上对技术溢出的负效应和限制性因素的概念进行了区分,同时对跨国公司技术溢出产生的机理和效应进行了详尽分析,给出了一种形象化的技术溢出模型。  相似文献   

11.
We study competitive dynamics by using 10 years of data from the biotech industry on patent infringement lawsuits because they capture offensive actions and defensive responses. Results suggest that larger patent portfolios, long‐term partnerships, and short‐term agreements lead to factor market rivalry. Specifically, long‐term research partnerships are associated with lower proclivity and vulnerability to attack, while short‐term licensing and marketing agreements with increased proclivity and vulnerability to attack. Lastly, although nonbiotech companies attack biotech firms, the proclivity of the latter to launch cross‐industry attacks is not significant. We discuss how the results contribute to competitive dynamics research and theory.  相似文献   

12.
Corporate venturing and the rent cycle   总被引:2,自引:0,他引:2  
Jenny  Morgan P.  Chris W.   《Technovation》2005,25(12):1437-1442
This study views entrepreneurial rents as renewable opportunities and explores how firms can effectively utilize corporate venturing to create and sustain economic rents. Schumpeterian entrepreneurs create rents by harnessing corporate venturing to exploit attractive economic opportunities. The Schumpeterian rent is composed of Ricardian and Austrian rents. Ricardian rents result from unique and non-reproducible characteristics or competencies of the firm, and hence, are not appropriable by imitators. Conversely, Austrian rents, or economic profit, are subject to dissipation by imitators and attract entry by competitors or Austrian entrepreneurs until they are bid to zero or destroyed by another Schumpeterian innovation. In this formulation, Austrian entrepreneurs are modeled as infra-marginal rent seekers. Consequently, to sustain rents, firms must cycle between using corporate venturing to create or discover Schumpeterian entrepreneurial opportunities and using venturing as a mechanism to exploit existing rent generating opportunities.  相似文献   

13.
Is there any factor that is not analyzed in the literature but is important for preventing currency crises? I argue that exports are an important factor to prevent currency crises that has not been frequently analyzed in the existing theoretical literature. Using the third generation model of currency crises, I derive a simple and intuitive formula that captures an economy’s structural vulnerability characterized by the elasticity of exports and repayments for foreign currency denominated debt. I graphically show that the possibility of currency crisis equilibrium depends on this structural vulnerability and also analyze how this vulnerability impacts the effectiveness of monetary policy response.  相似文献   

14.
Teamwork is seen as a key component of lean production, and often was and still is viewed as an attack on union influence in the workplace. This case study from Germany, based on its introduction in one automobile plant, shows how trade unions, works-council and management were able to create a team-concept beneficial to both sides.  相似文献   

15.
Ever wonder how an effective leadership program looks and feels to undergraduate students? As recent graduates of a program combining leadership, creativity, and innovation, we will explore how a challenging program helps students grow personally and professionally. The goal of the current article is to articulate what we see are the benefits of teaching leadership, creativity, and innovation to undergraduates. While crafting the article, the primary methods were observation and reflection as well as discussions on shared and unique experiences in the leadership program. Insights on steps to create and develop strong, effective leadership programs for more undergraduate students is provided.  相似文献   

16.
苏晗  赵延龙 《基建优化》2005,26(6):50-52
工程总承包模式为建筑企业实施低成本战略创造了一个有利条件,而要使这种有利条件变成现实,则依赖于工程总承包企业如何在专业化分工协作的基础上发挥集成化的整体组合优势,其中战略成本企划的源头管理思想对工程总承包企业的成本管理具有特殊意义。  相似文献   

17.
刘佰明 《价值工程》2012,31(21):18-19
近年来网络入侵检测系统成为计算机系统安全架构的关键性问题。异常攻击检测效果差是现有系统目前遇到的首要问题。因此,基于数据挖掘技术提出一种模型来预测新颖的攻击并实时生成防火墙规则。运用了Apriori算法来创建一个自动防火墙规则发生器用以监测新的异常攻击。结果表明改进后的算法高效的提高异常入侵检测系统的性能。  相似文献   

18.
李楠 《价值工程》2014,(5):189-190
随着网络技术的飞速发展,计算机网络安全问题也逐渐突显出来,成为了困扰人们生活的一种主要网络问题。要解决当今较为严重的计算机网络安全方面的问题,进行安全漏洞的检测非常重要。本文从计算机网络安全漏洞检测与攻击图构建两方面进行分析,探讨增强计算机安全性能的相关措施。  相似文献   

19.
关于工程项目绩效考核体系建设问题的探讨   总被引:1,自引:0,他引:1  
王卫华 《价值工程》2011,30(31):33-34
本文对工程项目绩效考核体系相关概念进行了分析;对工程项目绩效考核体系的建设和完善进行了较为详细的讨论,并提出了一些有价值的建议。  相似文献   

20.
Opportunity formation plays a central role in the entrepreneurship literature. The two dominant perspectives on this topic (discovery view and creation view) tended to consider search and action as the main mechanisms. Drawing on strategic issue interpretation view and managerial cognition perspective, we argue for the inclusion of a third mechanism (entrepreneurial interpretation). Specifically, we develop the boundary assumptions and testable propositions of an entrepreneurial interpretation model. Then, we show how entrepreneurial interpretation informs both discovery and creation processes. Overall, our theory provides an expanded understanding of how individuals form and decide to exploit opportunities.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号