Alibabacloud.com offers a wide variety of articles about chromebook security settings, easily find your chromebook security settings information here online.
Several Registry settings in server security settings do not display the user name of the last logon
The code is as follows:
Windows Registry Editor Version 5.00[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Lsa]"Restrictanonymous" = dword: 00000001
3389 modify the reg file on the port number
The code is as follows:
Windows Registry Edi
you decide (note that Windows2000 and Windows XP are under System32).
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX compatibility\ under active Setup Controls creates a new key value {6e449683_c509_11cf_aafa_00aa00 b6015c} based on the CLSID, and then creates a REG_DWORD-type key compatibility under the new key value. and set the key value of 0x00000400 can be.
and Windows\command\debug.exe and Windows\ftp.exe to change their names (or delete them).
Some of the latest popul
Ftp security settings and ftp Security
1. File Introduction
Description of ftpuser and user_list files in/etc/pam. d/vsftpd; (ADD and change the file path after file =)Description of userlist_enable and userlist_deny in/etc/vsftpd. conf.
For the sake of security, the Administrator does not want accounts with excessi
requirements to specific settings, basic to some ports to open and close.
Action 8: Only allow the/etc/init.d/service to be operated on root
Methods: chmod 700-r/etc/init.d/.
Action 9: Do not upgrade the kernel when updating the system with Yum update only the package
Method: Edit the Yum configuration file/etc/yum.conf add exclude=kernel* at the end of [main].
Action 10: Modify the history command record
Methods: Edit the/etc/profile file and
Vps security settings, server security dog
It is suitable for new users and friends who have access to VPS. It focuses on VPS security.
Prohibit ROOT login to ensure security;
Use DDoS deflate to defend against attacks;
Iftop Linux traffic monitoring tool;
Automatically back
add Mongodb to zookeeper settings and change it to a password authentication before you can log on, in the future, we will also teach you how to set logon IP address restrictions.
Education: http://www.mongodb.org/display/DOCS/Security+and+AuthenticationMongodb zookeeper settings
In Mongodb, Zookeeper settings are som
Wireless network technology is developing rapidly. In the face of growing network technology, how should we set it to be safer for enterprises? Here is a detailed introduction.
As the WEP and WPA encryption methods gradually break through, enterprise wireless networks become increasingly insecure, for intruders, as long as they can receive wireless communication packets from wireless networks, they will certainly be able to obtain the encryption key through brute-force cracking, so that the ente
Deploy Windows Mobile 6.5 when connecting devices todaySmartphone ApplicationProgramThis error occurs. "The device security configuration does not allow connection. Make sure that you have the appropriate certificate for the device you are developing. For the correct security settings for connecting to this deviceAn error occurred while checking the SDK documenta
Install a lot of IIS SERV-U SQL2000 php mysql above.Ordinary people, that is, using these services ???1. Local security policies or Nic port restrictionsLocal security policy:External> Local 80-> Local 20-> Local 21Outside-> Some ports used by the local PASV (SERV-U, usually open 9000-9049 these 50 ports)-> Local 3389Then, open the ports of SQL SERVER and MYSQL according to the actual situation.-> Local 143
)
Description: We assume that the site is all in the e-disk Wwwsite directory, and for each virtual machine to create
A guest user named Vhost1...vhostn and created a webuser group
, all the Vhost users into the WEBUSER group to facilitate management
E:\
Administrators all (this folder, subfolders and files)
E:\wwwsite
Administrators all (this folder, subfolders and files)
System all (this folder, subfolders, and files)
Service All (this folder, subfolders and files)
E:\wwwsite\vhost1
Admini
modify Terminal Services 3389 ports to 6868 ports based on security considerations, as follows:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal
Server\wds\repwd\tds\tcp, find the PortNumber item, double-click Select Decimal, enter the end you want to change
, here we enter 6868. And then find the key value:
Hkey_local_machine\system\currentcontrolset\control\terminalserver\win
Stations, locate the portnumber in the right window and enter
remember to back up your data often!!!To date, we have found a malicious script file that hasplus/ac.phpplus/config_s.phpplus/config_bak.phpplus/diy.phpplus/ii.phpplus/lndex.phpdata/cache/t.phpdata/cache/x.phpdata/config.phpdata/cache/config_user.phpdata/config_func.php, wait.Most of the uploaded scripts are concentrated in the plus, data, data/cache three directories, please double check the three directories recently whether there are uploaded files.Dede CMS article Content Management system
Several registry settings in server security settings do not display the User Name of the Last Logon
The Code is as follows:
Windows Registry Editor Version 5.00[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Lsa]"Restrictanonymous" = dword: 00000001
3389 modify the reg file on the port number
The Code is as follows:
Windows Registry Edi
ACTIVEMQ is using the jetty server, open the Conf/jetty.xml file, findChange the property name Authenticate attribute Value= "false" to "true",The login user name password for the console is saved in the Conf/jetty-realm.properties file with the following contents:## ---------------------------------------------------------------------------# # Licensed to the Apache software Foundation (ASF) under one or more# # Contributor license agreements. See the NOTICE file distributed with# # This work f
/pw_dictThere is no need to add. pwd after pw_dict, because the default is to bring[Email protected] ~]# passwd testChanging password for user test.New Password:/usr/share/cracklib/pw_dict.pwd.pwd:no such file or directory
Parameter meaning:Number of attempts: 5Minimum different characters: 3Minimum password Length: 10Minimum capital letters: 1Minimum lowercase letters: 3Minimum number: 3Password Dictionary:/usr/share/cracklib/pw_dictThis is set up, you can do the test, but you need to exit
read-only file, and the modification finishes saving to use "wq!" when exiting Command.If you want Zhangsan to execute only part of the command, you can specify the file path of the command that Zhangsan can execute in/etc/sudoers, and the file path of the command can be found through the which command.For example: Authorization Zhangsan can only execute useradd and Userdel commands.650) this.width=650; "title=" 1.jpg "alt=" wkiom1rnfr-htdpuaabxn2orjf8416.jpg "src=" http://s3.51cto.com/wyfs02/M
In fact, many friends often search for some information about 2003 will come to the cloud habitat community but the lack of a series of articles list, later we will be the topic of the way to organize, the following for you to share the security of Win2003 server settings considerations and procedures.
First, the security of the server is generally divided into:
Related Settings for IIS:
Delete the virtual directory of the default established site, stop the default Web site, delete the corresponding file directory c:inetpub, configure the public settings for all sites, and set up the relevant number of connection limits, bandwidth settings, and other settings such as performa
IIS settings:
Delete the virtual directory of the default site, stop the default web site, delete the corresponding file directory c: inetpub, configure public settings for all sites, and set the connection limit, bandwidth settings, Performance Settings, and other settings
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.