Discover how to disable norton security, include the articles, news, trends, analysis and practical advice about how to disable norton security on alibabacloud.com
How to disable the file security warning first, "gpedit. msc "Open Group Policy user configuration -- manage template -- windows component -- attachment manager point moderate dangerous file type inclusion list -- Right-click -- attribute select Enabled And then input .exe in the designated medium dangerous extension name. Therefore, an exclusive method 3 is provided here., if you do not like to reset the p
reason is not known.With the range of Sysctl-a|grep Ip_local_port_range, 2201 should be allowed to be used, the actual unsuccessful, pending further study.Second, prohibit the root user remote loginFirst step: Add a user with normal permissions first#useradd Ssh_user#passwd Ssh_userSet Password, Confirm passwordStep Two: Disable root remote SSH login:Vi/etc/ssh/sshd_configPutPermitrootlogin YesSwitchPermitrootlogin NoSave and restart the SSH serviceS
After the previous "Modify SSH port" set our Linux VPS Security performance, continue to complete other methods today. Whether you want to try to invade our website is software scanning, or artificial operation of the port scan Weak command is a method, the second is to guess Root rights account. In general, we use the account login directly with root login. If we disable the root account and add an account
件的时间4Block_service =sshd #在HOSTS_DENY中定义要阻止的服务5Deny_threshold_invalid =5#系统不存在用户失败次数6Deny_threshold_valid =Ten#除root外, the system has a user failure number7Deny_threshold_root =1#root用户失败次数8deny_threshold_restricted =1#针对WORK_DIR下定义的限制用户名的失败次数9Work_dir =/usr/share/denyhosts/Data #将deny的host或ip记录到WORK_DIR中TenSuspicious_login_report_allowed_hosts=yes #来自于allowed-can try in the hosts, whether to report Onehostname_lookup=YES #是否做域名反向解析 ALock_file =/var/lock/subsys/denyhosts #保证同时只有一个denyhosts程序运行的锁
To facilitate system management, Windows 2000, XP, 2003, and other systems often enable hidden sharing of some special resources after the system is started successfully, for example, C $, D $, IPC $, admin $, etc. These hidden shared resources do not need to be set manually, users cannot directly view their sharing status in the "my computer" window. If a user knows the IP address of the local system and the account of the system administrator, the user can remotely access Special shared resour
Article Title: Linux Server Security Settings disable useless ports. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Currently, many small and medium users are constantly updating or upgrading their networks due to business development, which leads to great differences
Modify SSH port for CentOS VM instance security and disable ROOT login
In fact, Linux is safe, but if the password is not complex enough, if the lower case + number is 12 digits in total, your SSH uses the default port, A powerful hacker can crack your password in less than half an hour. Therefore, the best way is to modify the SSH port.
1. Modify the file:/etc/ssh/sshd_config
Port 22# In row 3 or Row 4, i
"/" Indicates a server error in the application.
Runtime error
Note:An application error occurs on the server. The current custom error settings of this application Disable remote viewing of detailed information about application errors (for security reasons ). However, you can view it in a browser running on the local server computer.
Details:To enable others to view detailed information about this spec
Link to the original article: Disable rising 2009 anti-virus software security protection at the user layer
I write this as a hacker. If it is abused and used as a virus or Trojan, it doesn't matter to me.
The principle of very is simple. I found that rising monitoring is mainly in the ravmond process. If we break its connection with the kernel, rising monitoring cannot work normally. How can we break the
Windows 2003 has the same operations as windows.
Since Windows2003, the IE browser has enabled "Enhanced Security Configuration" (ESC) by default ). Each time you open IE, a prompt is displayed asking if you want to add the currently accessed site to the trusted site list. If you do not trust it, you can only disable it. If you trust it, you must add it to the list of trusted sites.
If our PC does not have
Windows Vista continues the network services of the Windows NT System and still has the default shared security problem. Although the default share of Windows Vista is the same as that of Windows XP, by default, even if the administrator privilege IPC $ cannot access the default share, however, some users modify the Guest account permissions to ensure smooth sharing of different computers. This means that the entire hard disk is exposed on the Interne
In some cases, for security and anti-virus purposes, we need to disable the USB device in WinXP. refer to the following methods.
If the USB interface is not connected to a USB device, you can directly modify the user or group's "deny" permission on the USB stor. pnf and USB stor. inf in the "inf" directory in the system directory. Start the resource manager, find the % SystemRoot % Inf folder, and right-cl
PHP uses WSH breakout function to disable execution of commands (security mode same)Premise. Requires the server to support WSH. And know the PHP installation directoryHowever, PHP uses WSH to execute commands that are highly privileged without ASP.Breakout CodePHP$cmd= ' Net user ';$path= ' C:\\php\\php.exe ';$cmd= '-R ' System (\ ').$cmd.‘ \ '); "-D disable_functions = ';//redefining the Disable_functions
How do I disable the computer system's security alerts ?, Turn off computer alarms
How to turn off the computer system security alarm, always pop up
First, right-click the Blue Box property and check the hidden inactive icon.
Then, start-Control Panel
Find the security center. Different system icons ma
Disable service bypass and set security
1. Create a user
"My Computer"
On the right side,
Remove "the next time a user logs on, the password must be changed." the user cannot change the password. "The password never expires ."
2. Set User affiliation
In the newly created user "kali"
Delete the "Users" user and click "add"-à "Advanced ..." -À "Search now" select "Guests" and "OK", and then confirm in th
From bad wolf Safety Net
Enable or disable the IP Security policy using the command lineProgram codeNetsh ipsec static set policy name = Yourpolicy as sign = yIn fact, the netsh ipsec command can control many aspects of the IP Security Policy. If you are interested, please take a look.C: InetpubAdminScripts> netsh ipsecThe following commands are valid:Commands i
Following the previous article "Modify SSH port" to set the security performance of Linux VPS, we will continue to complete other methods today. Whether it is to try to intrude into our website is software scanning, or manual port scanning weak commands is a way, followed by guessing the ROOT account. Generally, we use ROOT to log on directly with an account. If we disable the ROOT account and add an accoun
For Web security, prevent hackers from getting useful information through the Web error page information, close the IIS error page to display details
1. Open the IIS function view and open the error page.Click Edit function settingsDetailed error is returned by default.Select custom error
650) This. width = 650; "Title =" 1412942538507.jpg" src = "http://s3.51cto.com/wyfs02/M01/4D/C7/wKiom1RZqCqT8fGOAAEpx_ODvOc273.jpg" alt = "wkiom1rzqcqt8fgoaaepx_o
1200
Running ActiveX controls and Plug-ins
1201
Initialize and script ActiveX controls that are not marked as safe
1405
Execute scripts on ActiveX controls marked as safe to execute scripts
2201
ActiveX Control Auto Prompt *
Registry key for Pop-up Blocker
Hkey_current_userhkcu\software\microsoft\internet Explorer\New Windows\popupmgr
The specific script is as follows:
Like adding www.jb51.net to the customer
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.