software (such as: thunder, QQ, etc.) installed anti-virus software and firewalls.
Install winrar, turn off redundant system service items (such as your own firewalls, schedule tasks, printers, etc.). Note: Please close according to the actual situation of the server, if you do not understand the system background service is not recommended to modify. can refer
security and usage issues.
Before you make a secure configuration of your SQL Server 2000 database, you must first configure your operating system securely to ensure that your operating system is in a secure state. Then you want to use the operation of the Database software (program) to carry out the necessary security
. You may need another machine to obtain important tools and security patches from the Internet, and then transfer them to a separate "configuration Network.
When you place the machines to be used as firewalls in an isolated network, you can start the next step.
The first step is to select the software package to be installed on the operating system. For red hat 6.0, three installation options are available
measures may be required. In the complete security audit process, we can connect our Linux server hard disk to another computer and check all the files on it manually or using mainstream Linux anti-virus software. In some cases, if the server suffers a serious fault, starting the computer through an external hard disk
", enter" 80, 443 "in the input box, click" Next "to select" Allow Connection ", click" Next "to select all the check boxes, click" Next "to enter" Web Services "in the name, click" Finish "
Four, open IE enhanced Security configuration
After IE's enhanced Security configuration is enabled, the server IE browser can only access the whitelist site. This can eff
Security Configuration of nginx on Linux server, nginx on linux Server1. Common sense
In linux, to read a file, you must first have the execution permission on the folder where the file is located, and then read the file.
The execution of php files does not require the execution permission of the files. You only need the read permission of the nginx and php-fpm running accounts.
After a trojan is upload
Apache has always been the top three Web server software in the world. Enterprises need to comprehensively consider the security of their Web applications to ensure they can respond to network threats such as denial of service (DoS) attacks, traffic eavesdropping, and data leakage, this ensures the security of enterpri
and some complex Screen ProtectionProgram, A waste of system resources, let him black screen. Also, it is better to add Screen Protection passwords to the machines used by all system users.
10. partition using NTFS format
Change all partitions on the server to the NTFS format. NTFS file systems are much safer than fat and FAT32 file systems. Needless to say, everyone must have NTFS servers.
11. Run anti-virus
SECURECRT software and Linux system. 4, the rational use of Su, sudo command su command: is a tool to switch users, often used to switch the ordinary user to the Superuser, of course, can also switch from the super user to the ordinary user. In order to ensure the security of the server, almost all servers prohibit the superuser to log into the system directly,
Yesterday's server was hacked by the event that I also have some responsibility, because usually lazy to the server security settings, some settings in fact, can be set up in a few minutes, can be lazy, the result should the server is malicious damage, it will take more time to recover the data, so the
system through MD5 verification. it also scans the server to find the loaded rootkit at the kernel level.
Call server drive from external Mount
The steps mentioned above are more than enough to cope with the risks in most Linux Server deployment, including web pages, emails, DNS and database tasks. however, if our Linux serv
Server security Settings
1, the system disk and site placement disk must be set to NTFS format, easy to set permissions.
2, the system disk and site placement disk in addition to administrators and system user rights are removed.
3, enable Windows with a firewall, only to retain useful ports, such as remote and Web, FTP (3389, 80, 21), and so on, there are mail ser
This article details the security configuration issues in Windows Server 2003, including ports, auditing, default sharing, Disk Management, and firewalls and databases, which I believe will help you gain.
First, close unwanted ports
I'm more careful, I turn off the port first. Only opened 3389 21 80 1433 Some people have been saying what the default 3389 unsafe, on this I do not deny, but the use of the w
considerations
Windows 2000 security considerations
IIS 5 security considerations
General security considerations
This section describes general security issues.
Read your enterprise security policies
It is very important to have securi
Note: This problem exists in remote desktop protection of server security dog 4.2. If remote desktop is enabled, the server cannot be accessed or remotely logged on to the server. No specific solution is provided for this problem.Solution 11. If remote desktop login is disabled, the
$ _ SERVER variable and PHP use $ _ SERVER ['php _ SELF '] to obtain the current page address and its security issues. _ serverphp_selfPHP $ _ SERVER ['php _ SELF ']
$ _ SERVER ['php _ SELF '] indicates the address of the current PHP file relative to the website root directo
-- Brief Introduction to SQL Server Security (users, roles, permissions)/*Users are divided into Server login and database users.Roles are divided:Server role (inherent, cannot be deleted or customized );Database roles (inherent, cannot be deleted or custom roles can be added );View online for more help*/
-- Practical application description
-- SQL
The installation of the McAfee + shadow arpfirewall on the server is good. (For more information, see the content in s.jb51.net .)
The hacker told me that only the two installation methods were available.
Server antivirus.Safe check server security issues (delete when used up, never retained)A) Clean Up malicious pl
requires you to enable the module when compiling the source code. It is disabled by default.8. run apache in "prison""Prison" means to use the chroot mechanism to change the root directory that can be seen when a software is running. Simply put, it is restricted to the specified directory, ensure that the software can only act on the directory and subdirectory files, so as to ensure the
1, Security settings recommendations
(1) Check whether the SP2 patch has been installed! Change to daily 3:00 Automatic Update patching!
(2) When the firewall and port restrictions function settings, please be careful to avoid the loss of remote administrative rights!
------Right-click > properties in the Network Neighborhood advanced, open Win2003 Firewall feature, set to allow only 20,21,25,80,110,1433,3306, Remote Desktop 3389,33000~33003 (FTP PAS
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.