Original
Reference
1. Install the OpenSSH server
Sudo apt-Get install OpenSSH-server openssh-Client
2. Create a personal public key and Private Key
In the default user's home directory path, run the following command to create the public key and private key as prompted
Ssh-keygen-T RSA
By default, 2048 bits are generated. To increase the security level, you can use the following command to cre
the specified source is not within the scope of the license, the server will return a normal HTTP response.4.1, the browser found that the header information of this response does not contain the Access-Control-Allow-Origin field, it is known that the error, thus throwing an error, is XMLHttpRequest captured by the onerror callback function.4.2. If the Origin specified domain name is within the permitted range, the response returned by the
list contains rows like this:
[Root @ localhost root] # rpcinfo-p
Program version protocol port
100000 2 tcp 111 portmapper
100000 2 udp 111 portmapper
391002 2 tcp 32768 sgi_fam
100011 1 udp 798 rquotad
..............................
If not, check whether the PORTMAP component is installed.
Rpm-qa | grep portmap
3. fs type nfs no supported by kernel
Kernel does not support the nfs file system. You can modify the KERNEL configuration file and re-compile the kernel.
4. can't contact portmapper:
organizational unit, create a test domain user user1. (Domain user creation is no longer operational here)4. Start----Run----input gpmc.msc----Right-click Group Policy Object-----New.5. Define a Group Policy name of "Disable USB"----OK.6. Right-click to select the "Disable USB" Group Policy----edit.7. Calculation configuration----Administrative Templates----system----Removable Storage access----Double-click all Removable Storage classes: Deny all permissions.8. Select Enabled----OK.9. Right-cli
is very appropriate, but it is a very important question to set the value of how large it is, and I am determined by the actual occupancy of the process each time a problem occurs. Our server memory is 2G, usually some other services will take up more than 600 m, I found that every process is to 1G when the time off, so set the maximum use of memory for 1000M when automatic recycling, settings have been no
You can also set access permissions on the server for specific platforms, directories, and files. These permissions apply to all users regardless of the user's original access rights. For example, if you are updating the contents of a platform,VPS host then you can temporarily stop the platform Read permission to prevent users from accessing. If the user tries to access it, the server responds with a "no ac
"/" Indicates a server error in the application.
Runtime error
Note:An application error occurs on the server. The current custom error settings of this application Disable remote viewing of detailed information about application errors (for security reasons ). However, you can view it in a browser running on the local ser
are a lot of energetic guys will scan ssh password all day, of course, directly close SSH password login can prevent, but in order to give them a lesson, can install Fail2ban, shielding, but also can automatically write a report letter to the ISP IP.Installation under CentOS:Import Epel Source:CentOS 6.x 32-bit:RPM-UVH http://download.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpmCentOS 6.x 64-bit:RPM-UVH http://download.fedoraproject.org/pub/epel/6/x86_64/epel-release-6-8.noarch
First step: Add allowed IP segments
Start, Run, gpedit.msc, Computer Configuration, Windows settings, security settings, IP Security policy, often to network dedicated IP Security strategy, double hit Open, and then double hit open, then point Add, Next, enter the description, next, the source address selected a specific IP subnet, the following IP address input, such as your
allows only non-null users to access SAM account information and share information; "2" is only supported by Windows 2000, and it is important to note that if you use this value, Can no longer share resources, so it is recommended to set the value of "1" is better.10), Prevent ASP Trojan1. ASP Trojan based on FileSystemObject componentcacls%systemroot%\system32\scrrun.dll/e/d guests//disable guests use regsvr32 scrrun.dll/u/s//delete2. ASP Trojan based on Shell.Application componentcacls%system
Debugging the Silverlight program today, after you remove the. xap file under the ClientBin folder, you experience an issue that says: Error code 2104: The Silverlight application could not be downloaded. Check your Web server settings. On the Internet, many of the workarounds are to configure the MIME type of IIS, for example: http://silverlightchina.net/html/tips/2012/0922/19072.html. However, opening the
Article Title: Fedoracore2 server platform security settings secrets 2. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
#! /Bin/bash
PATH =/sbin:/bin:/usr/sbin:/usr/bin
# L Internet Nic interface connecting to the Internet
EXTIF = "eth0"
# Set the IP address of the Inter
The first one is comprehensive. We recommend that you use the first one.
Copy codeThe Code is as follows: @ ECHO OFF
CLS
TITLE SERVER SAFE SETUP PRO
COLOR 0A
Echo y | cacls.exe C: \/p Administrators: f system: f "network service": r
Echo y | cacls.exe D: \/p Administrators: f system: f servU: f "network service": r
Echo y | cacls.exe E: \/p Administrators: f system: f servU: f "network service": r
Echo y | cacls.exe "C: \ Program Files"/t/p Administra
) are more complex than shared permissions, and NTFS permissions (security permissions) are six: Full Control, modify, Read and Execute, List Folder contents, read, write, special permissions.When a user accesses a folder directly from the local computer, it is not constrained by the share permissions, but only by NTFS permissions (security permissions). In the above permission process, as long as you grasp these three points to note:One, the user through the Network Access folder sharing eff
-content/uploads directory5. Testing the websiteWebsite access is normal, background upload pictures, files are normal.At this point, WordPress security settings have been completed, after Setup, although the hacker may also upload Trojan, but can not runHas greatly improved the site's security.If you can work with security aids again, the level of security can continue to improve.6. Safety Aid ToolsIt is recommended to use the "security package" deve
To facilitate Linux host management, we write common system security configurations as a shell script. When a new host is installed or the Linux system is upgraded, you only need to simply execute this script to complete the security settings, which makes the work easier. shell is really a good thing.The Shell script for Linux system security settings is the second update. It has been widely used in a large
can query the hosts of the entire NIS domain;
Each NIS server (regardless of the master/slave) can respond. Basically, the "First responder is preferred 』.
Ii. settings of the NIS server.
1. Check whether the following four rpm files are installed.
[Root @ linux etc] # rpm-qa | grep ^ yp
Ypbind-1.19-8.el5
Ypserv-2.19-3
Yp-tools-2.9-0.1
[Root @ linux etc] # rpm-
How to change the SA password and default port number of the SQL Server database qq752923276 csdn blog I want to comment () font size: T | T
This article describes how to change the SA password, change the default port, and set the port number specified by the ADO connection string in the SQL Server database.
AD:
You can change the SA password of an SQL Server d
vulnerabilities, after installation with Ghost again back up the system.
6. First turn off unwanted ports open firewall import IPSec policyIn "Network Connections", delete all the unwanted protocols and services, install only basic Internet Protocol (TCP/IP), and install the QoS Packet Scheduler in addition to the bandwidth flow service. In Advanced TCP/IP Settings--"NetBIOS" setting disables NetBIOS (S) on TCP/IP. In the advanced option, use Intern
Article Title: proxy server settings in Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Author: H2KILL
Preface:
This document describes how to use squid and squidGuard to configure proxy servers in linux. The www Proxy service is used as an example to descri
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.