Database drag Library Guide

About all in

A few years ago with the traditional areas of Fujian, a second-generation rich investors talked to a similar topic, he felt, was his money out, but the other input of manpower and effort. He believes that he generously shares are to each other, the other fishes should be grateful to him, I say you think is not right, people business, risking their own life, How about you, say something nasty, where there is no money? A project failed, for you, but is 1 / n of investment failure only, for entrepreneurs, energy is a few years, one hundred percent effort.

Internet era, far more than the value of talent and capital resources, and this is the Internet age people are particularly expensive, founder rather than the capitalists want to be the most important cause of major shareholders. The other side expressed understanding and agreed with my point of view, a few years later, I found that he voted several projects did a good job.

About "Tuoku"

"Tuoku" is a commonly known fact is dragging library, or that dragged down the entire database by hackers.
Drag library possibilities:

1, this github password disclosure, a lot of tragedy already.

2, the inner demon.

3, SQL injection, tragedy is also very much, and enduring.

4, the server was invaded other reasons, and it gets dragged database

5, development or operation and maintenance of personal computers have been hacked, trojaned

6, the backup server security policy properly, or third-party backup system problems, as well as data analysis server. In many cases this is a conscious problem, anyway, is not that the online business, whatever that running data.

7, penetrate clouds, cloud hosting is now too popular, although not the case might not have the risk is still there, but certainly not a small problem.

8, authorizing abuse, such as interfaces to third-party rights are too high, or not aware of the risk on the authorization validation logic.

9, scrapped improper disposal server, hard drive data recovery is what people, not to mention good to be true, as long as the information valuable, someone will be pondering these. Some companies shut down operations, bulk sale of second-hand server, if not handled properly, this risk is still there.

10, based on social work, get the password database, such as the micro-channel counterfeiting operation and maintenance engineers, technical director looking to go to the password.

11, sniffer interception, password intrusion server administrator to get through sniffer. But now there is no administrator should use telnet instead.

12, fishing, such as the engine room if the security configuration is nonsense, put forward a server in the same room, get hold of arp spoofing, the administrator fool honey pot, password relaxed hand.

Case:
Unfortunately, the same problem, you see, China will stay committed the same mistake because the database password is passed to the github, data dragged library, now circulating in the underground black market. Think of hundreds of millions of records open room, I still live in China Gold membership will do. Not to shiver it?

Released eight original articles · won praise 1 · views 2988

Guess you like

Origin blog.csdn.net/hello250sunshine/article/details/104086511