Guest account. A complicated password contains uppercase/lowercase letters, numbers, and special characters (~! @ # ¥ % "",.?) . For example, "G7Y3, ^) y.
2. Use as few accounts as possible, and frequently use scanning tools to view system accounts, account permissions, and passwords. Delete A Disabled Account. Common scanning software includes: streamer, HSCAN, X-SCAN, and stat scanner. Correctly configur
/cronjob)27. Whether the audit module is open (AUDITD)28. Time Synchronization Service (NTP)29. Encryption (e.g. SSL certificate validity period)30. Whether to apply a security framework (Selinux,apparmor, grsecurity)31. Is there a file system integrity Detection Tool (Afick,aide, Osiris,samhain,tripwire32. Is there a malicious program Detection Tool (Chkrootkit,rootkit HUNTER,CLAMAV
functions:
1. Protection Function: LIDS can protect any types of important files (such as passwd and shadow files) on the hard disk) and directory (such as/bin,/sbin,/usr/bin,/usr/sbin,/etc/rc. d) To prevent unauthorized users (including ROOT) and unauthorized programs from accessing and using them. LIDS can also protect important processes in the system from being terminated. After this function is enabled, no user on the
detect and clear viruses, it also has a vshield automatic monitoring system that will be resident in system tray, when you enable a file in a disk, network, or e-mail folder, the security of the file is automatically detected. If the file contains viruses, the system immediately warns, it also supports the shortcut me
As long as you access the Internet, poisoning will definitely continue. What should we do if we get poisoned?
Do we always use anti-virus software? However, the magic weapon is not omnipotent. Many stubborn emergencies cannot be killed by anti-virus software. At this time, do you often ask your close friends and friends on the forum once or twice, but after N times, will you be bored by others? Therefore, you must learn everything, learn to be strong, and learn to analyze viruses on your own. Th
, expand the Hkey_local_machinesystemcurrentcontrolsetcontrollsa branch in turn, and locate the "RestrictAnonymous" subkey in the right window. Change its value to "1".
3. Turn off the AutoPlay feature
The AutoPlay function not only plays a role in light drive, but also works on other drives, so it is easy for hackers to use to execute hacker programs.
Open the Group Policy Editor, expand Computer configuration → administrative Templates → system i
related to the installation of hardware devices, as shown in:
There are many settings related to device installation restrictions. These settings are not necessarily and specifically associated with removable devices, but are generally associated with hardware devices. The basic idea here is that if you restrict the user from installing the device, it will block any device that you have not enabled.
For more information about removable devices, pay special attention to the following two policy
Article Title: Check the security of the VM system by intruding an instance. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
In fact, I have long had the idea of writing this article, but I have never written it because I am a
Windows 2003 is increasingly favored by users for its steady performance, but you still need to tighten Windows 2003 security in the face of new viruses.
1. User Password setting
Set a key password to a large extent to avoid password attacks. Password set character length should be more than 8, preferably letters, numbers, special characters of the combination, such as "psp53, @pq", "skdfksadf10@" and so on, can effectively prevent violent cracking.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.