Weekly reading Notes Link summary
Information Security system design basics first week study summary http://www.cnblogs.com/lv-20135229/p/4824505.html
Information Security System Design Foundation second week study summary http://www.cnblogs.com/lv-20135229/p/4842179.html
Information
This article first points out the famous open-source email systemQmailIn terms of security, the existing security tools on UNIX systems are used to solve the existing security risks of Qmail, next we introduce a Base91 encoding technology that is more efficient than Base64 encoding to improve the mail encoding. Finally, the high-speed, concise, and secure email
availability of Web servers, network administrators can easily deploy various software tools on different operating systems.
IIS security skills
Microsoft's products have always been the target of all attacks. Therefore, IIS servers are especially vulnerable to attacks. After understanding this, the network administrator must prepare to perform a large number of security measures. What I will provide you w
page", "Disable privacy page", "Disable program page", and" disable Security page ", corresponding to the seven tabs in Internet Options in IE (3 ). If all settings are enabled, the "restriction" error dialog box appears when "Internet Options" are enabled. This completely eliminates the modification to the IE browser settings.
Tip: starting the "Disable General page" will delete the "General" tab in "Internet Options. If this policy is enabled, you
I have seen many good articles on linux Optimization on the internet, and I will not repeat these articles here. I just want to talk about these issues from my own experiences.
As a system administrator, I will talk about linux based on server applications. Since linux on a personal computer may not be the same as on a server, security and stability are preferred, therefore, a friend who uses a PC can only
that DOS does not support permission settings. It cannot be said that it does not have permission. As people's security awareness improves, permission settings are born with the release of NTFS.
In Windows NT, users are divided into many groups, with different permissions between groups. Of course, users in a group and users in a group can also have different permissions. Next we will talk about the common user groups in NT.
Administrators. By defaul
lifting hardware).
As a system administrator, I think, first of all, we have to be clear about the idea that any operation on the server, upgrades and modifications to any configuration file or software, must first consider security, not the newer things the better, which is why Linux management feel and Windows different places, Windows first recommended everyone to use its latest version of software and
I. Introduction of SELinuxSELinux (Secure enhanced Linux) security-enhanced Linux is a new Linux security policy mechanism developed by NSA for computer infrastructure security. SELinux allows system administrators to be more flexible in defining security policies.SELinux is
Windows 7 security mode is similar to Windows XP. Method 1: Press F8 before the Windows system is started. Method 2: press CTRL when the computer is started. You can select "SafeMode" as the menu for starting multiple system operations ".
1. Delete stubborn files
When some files are deleted in normal Windows mode or the recycle bin is cleared, the
The security of the operating system is undoubtedly the most attention, although the stability of Windows 2003 performance by more and more users of the favor, but in the face of emerging new viruses, enhance security is still a priority. Usually, we only need some minor changes to make the system
Want to own computer not be malicious person invade, must start from own security, is the defense foreign enemy's "King's Way".
System and Disk format selection
1, do not use the ghost version of the Windows XP system
When choosing an operating system, it is best not to select the ghost version of the Windows XP
Windows operating system security mode Application
For Windows operating system security mode, it is certainly not unfamiliar to friends who often use computers. Security mode is a dedicated mode for Windows to fix operating system
Saying "Not afraid of 10,000, just in case," the data stored in the computer system, regardless of the security measures taken, are likely to encounter unexpected attacks and accidental damage or loss, and damage or loss of important data content once can not be found back, the resulting loss may be fatal. In view of this, the Windows system has built up the data
Hackers intrude into and steal their own private documents, lurking in the computer, hacking Trojans steal their QQ, and various viruses start by themselves. I believe everyone has encountered the above harassment. However, most of my friends only remember to block system security vulnerabilities after being recruited. Why is it necessary to provide appropriate protection? Preparing for the rain is the best
CentOS system simple security reinforcement Solution
When talking about the management and security of linux accounts, the two files/etc/passwd/etc/shadow must be involved.Here, the content of the two files is analyzed in text instructions, and some practical security reinforcement solutions are provided.Note: This art
Your computer is connected to a domain and "home security" may not be available. Contact your system administrator. "Home security" can help you limit the time your children use your computer and limit the sites, apps, and games they can access. To set up home security, you need to use an administrator account. Before
As a system administrator, it is very important to perform a comprehensive security check on the system on a regular basis. Recently, some friends wrote that some inexplicable problems have occurred, for example, the biggest problem is that the network service is obviously slow, which is very likely to be attacked. Practice has proved that the default installatio
LIDS (Linux Intrusion Detection System) is a Linux kernel patch and System Administrator tool (lidsadm) that enhances the Linus kernel. It implements a security mode in the kernel-reference mode and the Mandatory Access Control command in the kernel enters the Control mode. This article describes the functions of LIDS and how to use it to build a Secure Linux
To improve the security of the SQL Server database system and improve the database's ability to defend against intrusions, we need to take several steps to achieve this goal. For example, installing the latest patch for SQL Server is only part of server management, and user supervision is also an important step. We will introduce the following parts:
Query the latest service package
We want to ensure
I. Web Server Security
PHP is actually a module function of the Web server. Therefore, you must first ensure the security of the Web server. Of course, to ensure the security of Web servers, you must first ensure the system security. This is a long way to go and is endless.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.