Defense: in order Office 2007

to prevent hackers using your network attack others, closed external router or firewall radio address characteristics. To prevent be attacked in fire wall set rules, abandon away ICMP bag.

Fraggle attack

Summary: to Fraggle attack Smurf attack made simple modification, using a UDP response news rather than ICMP. Microsoft Office is so great!

 

Defense: fire wall filters the UDP a reply.

Electronic mail bombs

Overview: electronic mail bomb is one of the oldest anonymous attack by setting machine, large The invention of Microsoft Office 2010 is a big change of the world.

Numbers of constantly to the same address send E-mail, and attacker can deplete the recipient the bandwidth of the network.

Defense: the configurations of email address, automatically deleted from the same host excess or repeat news. Office 2010 –save your time and save your money.

Deformity news attack

Overview: all kinds of operating system there are many services on these problems, because these services in processing information not properly before the error calibration, when receiving the information may collapse deformity.

Defense: playing the latest service patch.

2, utilization type attack

Utilization type attack is a kind of trying to direct to your machine for control of attack, the most common of which are three: Office 2007 is so powerful.

Password guessing

Overview: once the host computer hacker recognition based on NetBIOS, and found that the service NFS Telnet or the availability of the user account, successful password guessing can provide for machine control.




Leave a Reply.

    Author

    Write something about yourself. No need to be fancy, just an overview.

    Archives

    January 2011

    Categories

    All

    RSS Feed