With the advent of Windows Server 2003, many people can use the leaked version, relative to the workstation system, where the server is
To do more kernel optimization, so there is a great improvement in stability and security. However, many people do not need the full server
department, and the server system shuts down the services required by some workstation systems, below, we will optimize the
As Windows 8 is still in the pre-release version, major software vendors and online service providers are gearing up for development and testing to prepare for Windows 8 compliant programs. At that time, I wrote a piece about the construction Bank Network Silver Shield is unable to use the problem and its solution. With the official listing of Windows 8, the comp
First, close unwanted ports
I'm more careful, I turn off the port first. It only opened 3389, 21, 80, 1433, some people have been saying what the default of 3389 unsafe, I do not deny, but the use of the way can only one of the poor lift blasting, you have changed the password set to 66, I guess he will break for several years, haha! Method: Local Connection--attribute--internet protocol (TCP/IP)--Advanced--Option--TCP/IP Filter--attribute--Put the ti
The specific list is as follows:
Primary safety Articles
1. Physical Security
The server should be placed in the isolation room where the monitor is installed, and the monitor should keep the camera record for more than 15 days. In addition, the chassis, keyboard, computer desk drawer to be locked to ensure that others even enter the room can not use the computer, the key should be placed in another safe place.
2. Stop Guest Account
The Guest acc
Win7 system users in the process of operating using the system, will set the power-on password, but very few users will encrypt the drive. In fact, encrypting the drive protects the data in the system, and we are more aware of Windows BitLocker Drive Encryption, which protects the data on the computer by encrypting all the data stored on the system volume. So what should we do if we're going to encrypt the
following is an example of a standard VM.System: Windows2003Service: [IIS] [SERV-U] [IMail] [SQL Server 2000] [PHP] [MySQL]Description: The most services are bound for demonstration. You can perform screening and subtraction based on the actual situation.
1. Windows Local Security Policy port restrictionsA. For our example, we need to activate the following ports:External> Local 80-> Local 20-> Local 21->
view, export lists, and import policies.
1. Security log settings: Because the security log is an important means of recording a system, you can view some of the running state of the system through the log, while the default installation of Windows 2000 does not open any security audits, so you need to open the appro
Open the Run dialog box in the Start menu, enter "Gpedit.msc" to open the Group Policy Editor, and then browse to local Computer policy--Computer Configuration--Windows Settings--"Security settings"--"Account Policies"-"Password Policies", You will notice that there are six items on the right that are set for the password
When Microsoft began to launch the Windows7 program, the new operating system had long been controversial. After all, will the advent of Vista bring a better user experience? For users who have been paying attention to Windows operating systems for a long time, whether security can be improved is worth more attention. Although Apple said that "Windows 7 is just a
Windows 7 is called the most secure platform in the history of Windows operating systems. In fact, this is also true. I have been in close contact with the Windows 7 System for nearly a year and have not encountered any serious security problems. In use, it is found that the securi
Summary of MySQL configuration and security hardening under WindowsIn the actual use of the network management, MySQL database in the installation of the configuration and security hardening content, in the customer gradually increased demand. From the question of feedback, it is generally by the third-party software company software scanning the entire system, MySQL related content does not meet the requir
1. Upgrade to new windows
For users who use Windows XP, upgrading to the Windows 7 operating system can improve security, and Windows 7 has a lot of security that Windows XP does not h
mobile devices are lost, other people will not easily steal the data content, so that there is no need to worry about privacy information leaked.
When configuring BitLocker enabled in the Win 7 system, we can open the Start menu of the system, tap the Control Panel option, open the Control Panel window of the corresponding system, and select the system and security, BitLocker Drive Encryption feature icon in turn. Enter the disk drive list interface
Intelligent account Password
It's not easy to secure your own account, some of the main users of the account password set too short, long time not to change the password and so on are the important impact on account security, but now we from the technical point of view of these users to make restrictions, that is the
indows XP security can be compared with the older system has a great improvement, we can set up a personal user password to protect their own secrets, but if one day we forget the login password then what to do? Is there no other way besides formatting the HDD reload system? It is understood that If forgotten, the computer can be cracked by the third-party softwa
In Windows XP and Windows 2000, a powerful command is the syskey command.This command can effectively enhance your system security. Maybe you have to enter your account and password when entering Windows XP or Windows 2000. Isn't
change any information of the system.
Password Layer 3: syskey password protection, that is, the last password of the windows Password, that is, the password of the windows system is
Security for IIS:
Delete the C:/inetpub directory and remove unnecessary mappings for IIS
The first is that each Web site uses a separate IIS user, for example, to create a new name named Www.315safe.com, with permission for guest.
In the site properties in IIS the username password for setting anonymous access to use the following Windows user accounts in
Now we will discuss the security configuration in transportcredentialonly security mode. First, add the configuration section as shown in code list 11-84 in the configuration file to configure windows verification. Windows creden are authenticated Based on Windows group acco
In fact, Windows XP also has a safer "Start password", which is displayed before the user password and can also generate a key disk. If you set it, your Windows XP is more secure. Let's create this "Start password ".
1. Set the start Pa
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.