|
Ä¿ÇÇÇâÀÌ ³ª´Â *NIX
Ä¿ÇǴнº
½Ã½ºÅÛ/³×Æ®¿÷/º¸¾ÈÀ» ´Ù·ç´Â °÷
|
|
|
|
ÀÌÀü ÁÖÁ¦ º¸±â :: ´ÙÀ½ ÁÖÁ¦ º¸±â |
±Û¾´ÀÌ |
¸Þ½ÃÁö |
truefeel Ä«Æä °ü¸®ÀÚ
°¡ÀÔ: 2003³â 7¿ù 24ÀÏ ¿Ã¸° ±Û: 1277 À§Ä¡: ´ëÇѹα¹
|
¿Ã·ÁÁü: 2010.3.29 ¿ù, 6:42 pm ÁÖÁ¦: 3.25~26 À̾߱â (À©µµ¿ì¿¡¼ ÆÄÀÏ µ¿±âÈ µî) |
|
|
< IT ÀÏ¹Ý >
1. Native iPhone/iPod Touch support arrives on the Linux Desktop
http://blog.sukimashita.com/2010/03/23/native-iphone-ipod-touch-support-arrives-on-the-linux-desktop/
¸®´ª½º¿¡¼ ¾ÆÀÌÆù, ¾ÆÀÌÆÌ ÅÍÄ¡ Áö¿øÇÏ´Â ÇÁ·Î±×·¥. µåµð¾î 1.0.0ÀÌ ³ª¿Ô´Ù.
2. À©µµ¿ì¿ë ÆÄÀÏ µ¿±âÈ Åø
1) 'À§µå¿£ÄÄÆÛ´Ï'ÀÇ 'CA XOsoft Contents Distribution' (¿¹Àü¿¡ WANsyncCD)
- ½Ç½Ã°£ µ¿±âÈ
- ÆÄÀÏ ½ÌÅ©, ºí·Ï ½ÌÅ©
- ¶óÀ̼¾½º´Â ¼¹ö´ç
- 64ºñÆ® Áö¿ø
- ÀÎÅÍÆäÀ̽º´Â °£´ÜÇϸç, ¼Óµµ°¡ ºü¸§
2) File SyncForce
http://www.objectforce.com/file_sync.htm
http://www.objectforce.com/FileSyncForce/Help/index.php?Video=FileForceFeatures.wmv
3) SyncBack (freeware)
http://groups.google.com/group/sysadminstudy/browse_thread/thread/56d78a7aded3e1dc/ab6a45bed8b6668a?show_docid=ab6a45bed8b6668a&pli=1
http://www.2brightsparks.com/downloads.html#freeware
4) À©µµ¿ì¿ë RsyncÀÎ cwrsync´Â µ¿±âÈ ¼Óµµ°¡ ´À¸° Æí
3. [Å×½ºÆ®¼¾ÅÍ ¸®ºä]µ¨-HP-IBMÀÇ ¿þ½ºÆ®¹Ì¾î ºí·¹ÀÌµå ¼¹ö 3Á¾
http://www.bloter.net/archives/27779
¡Ø 3.25(¸ñ) 13:20ºÐ´ë bloter ºí·Î±× ÀϽÃÀûÀ¸·Î ÆäÀÌÁö ¾È¶°.
Àοë: |
Error establishing a database connection
|
< º¸¾È >
1. ½º¸¶Æ®Æù ¾Ç¼ºÄÚµå À§Çù °íÂû¿¡ ´ëÇÑ Q&A
http://teamcrak.tistory.com/278
Àü¿¡ jailbreakÇÏÁö ¾ÊÀº »óÅ¿¡¼µµ, Á»ºñ ÇÁ·Î¼¼½º·Î ¸ÖƼŽºÅ·ÀÌ °¡´ÉÇÏ´Ù´Â ¾ê±â¸¦ Çߴµ¥,
±×¿¡ ´ëÇØ Áú¹®ÀÌ ¸¹¾Æ¼ Q&A¸¦ º°µµ·Î ÀÛ¼ºÀ» Çϼ̴ٰí.
2. SQL injectionÀ» ¹æ¾îÇÏ´Â »õ·Î¿î ±â¼ú
Researcher develops new technique for SQL injection defensea ( 2010.3.25 )
http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1506846,00.html
Àοë: |
could aid vulnerability hunters by speeding up the discovery of SQL injection vulnerabilities so they can be fixed before attackers use them.
This helps find and exploit SQL injection vulnerabilities in an automatic way," Russ said. "The coolest feature is a SQL abstraction that permits you to execute a SQL statement directly to the back-end database."
... »ý·« ...
|
- ÀÚµ¿ÈµÈ ¹æ¹ýÀ¸·Î SQL injectionÃë¾àÁ¡À» ºü¸£°Ô ã¾Æ ¼öÁ¤ÇÑ´Ù´Â °ÍÀε¥, ¿ªÀ¸·Î °ø°Ý¿ëÀ¸·Îµµ »ç¿ëÇÒ ¼öµµ ÀÖÁö ¾ÊÀ»±î.
- SQL Ãß»óȸ¦ »ç¿ë
- 2010 CanSecWest Applied Security Conference¿¡¼ óÀ½À¸·Î ¼Ò°³ ( http://cansecwest.com/agenda.html ¿¡ ÀÖ´Â 'Automated SQL Ownage Techniques - Fernando Federico Russ, Core' ¼½¼Ç)
- http://www.coresecurity.com/content/corelabs-projects-index ¿¡ ¿¬±¸ ¹®¼ ¿Ã¸± ¿¹Á¤.
< ±âŸ >
1. °Ç°
Çö´ëÀÎÀÇ º´ 60%´Â »ýÈ°½À°üº´À̶ó´Â Åë°èµµ ÀÖ¾î.
ÀϺ»¿¡¼´Â »ýÈ°½À°üº´À» °íÄ¡±â À§ÇØ 'ÀϹ« ÀÌ¼Ò »ï´Ù(ìéÙí ì£á³ ß²Òý)' Ä·ÆäÀÎÀ» ÇÏ°í ÀÖ´Ù.
- ÀϹ«(¾øÀ» ¹«) = ±Ý¿¬ÇÏ°í
- À̼Ò(ÀûÀ» ¼Ò) = ¼Ò½Ä, ¼ú Àû°Ô ¸¶½Ã°í
- »ï´Ù(¸¹À» ´Ù) = ¿îµ¿À» ¸¹ÀÌ ÇÏ°í, »ç¶÷À» ¸¹ÀÌ ¸¸³ª°í, ÈÞ½ÄÀ» ¸¹ÀÌ °®´Â´Ù.
±âŸ
- ½º¸¶Æ®ÆùÀ» À§ÇØ »ç¹«½Ç¿¡ º°µµ ¹«¼± °øÀ¯±â¸¦ ¼³Ä¡ÇÏ´Â °æ¿ì°¡ ¸¹¾Æ. (Ä¿ÇǴм ºÐµéÀÇ ÀÇ°ß)
¡Ø Âü¿©ÀÚ : ¹ü³ÃÀÌ, spy, Äí»ç¸®ÁÙ±î, ÁÁÀºÁøÈ£, ¾çµéÀÇ Ä§¹¬ |
|
À§·Î |
|
|
|
|
»õ·Î¿î ÁÖÁ¦¸¦ ¿Ã¸± ¼ö ÀÖ½À´Ï´Ù ´ä±ÛÀ» ¿Ã¸± ¼ö ÀÖ½À´Ï´Ù ÁÖÁ¦¸¦ ¼öÁ¤ÇÒ ¼ö ¾ø½À´Ï´Ù ¿Ã¸° ±ÛÀ» »èÁ¦ÇÒ ¼ö ¾ø½À´Ï´Ù ÅõÇ¥¸¦ ÇÒ ¼ö ¾ø½À´Ï´Ù
|
Powered by phpBB © 2001, 2005 phpBB Group
|