We recommend two free web server software for running ASP. NET websites in Linux.
1. kangle
Kangle Web Server is a high-performance Web server and reverse proxy server software that is
Apache originated from the NCSAhttpd server and has been modified many times to become one of the most popular Web server software in the world. Apache is taken from the pronunciation of "a patchy server", which means a server full of patches, because it is a free software,
the third is OA (office automation) services. Because the service is in the WEB mode, you can directly access the OA server on the Internet, so he is deployed on this server. Because the configuration of this server is still relatively high, it is not difficult to run the three services, and the performance will not b
Basic Web Site Security Configuration
To set the security of the site's partition, allow only two groups of users, administrators and system, to have secure access, as shown in the following figure:jquery110205402204316312018= "1" data-original= "/wp-content/uploads/2009/12/iis_d.png"/>
Set site information all put in D: In the Wwwroot folder, where the attention can not directly put the site informati
is not high, even if it is cracked, there is little practical value. If attackers are not profitable, they will not spend so much energy on the website server. To direct attackers to the honeypot server, you need to increase the access volume of the honeypot server. In fact, it is very easy to do this. There are now many teams that use interactive traffic. You o
it does not affect communication between the Web server and other servers.
3. Remove the Default Web site:
Many attackers target the Inetpub folder and place some sneak attacks on it, causing the server to be paralyzed. The easiest way to prevent this attack is to disable the default site in IIS. Then, because
reading, writing, and viewing directories. If you can set the browsing directory, the user will see a list of all the files in the main directory in the browser. This is very secure. We recommend that you do not give this permission easily.
After the operation is complete, a new IIS server Web site will be generated in MMC. Right-click a
ObjectiveAs the amount of traffic increases, a Web server may not be able to meet the demand, which requires increasing the number of Web servers, so the problem is: how to ensure that the two server data synchronization? This article explains how to implement load balancing and data synchronization for
BKJIA: Web Proxy Server allows enterprise employees to quickly and securely browse the network. The Web Proxy Server can cache the memory so that the user can then process requests for the same Web page by the local cache, which is faster than returning the website multiple
Create a Web server-Linux Enterprise Application-Linux server application under openSUSE12.1. For more information, see below. Source: Zhongguancun online
OpenSUSE 12.1 Web Server Construction
With the continuous development of Internet technology,
Original Blog Address: http://blog.csdn.net/heiyeshuwu/article/details/1753900Accidentally see a few small and interesting web server programs, feel the need to share, so that everyone in addition to know Apache, IIS, there are more interesting choices. The main introduction: MICRO_HTTPD, MINI_HTTPD, thttpd, LIGHTTPD, SHTTPD and other small and easy to use httpd."Micro_httpd-really Small HTTP
and production professionals to better maintain the update. Dynamic website is developed by the use of the program, the use of database functions can be unlimited increase the site data, and generally will develop the site management, maintenance updates convenient, very suitable for people without any technical management site. At present, most websites belong to dynamic websites. 1 , IIS Introduction to Server SoftwareThe translation of IIS into C
host system, damage some important data, and even cause system paralysis.
4. CGI security vulnerabilities:
(1) intentionally or unintentionally missing buckets in the host system to create conditions for illegal hackers.
(2) When a program written in CGI script involves a remote user entering a Form in a browser and performing Search index ), or form-mail or other commands on the host may cause danger to the Web host system.
5. There are some simple
The business community quickly saw its value. Many companies have established their homepages, used Web to publish messages on the Internet, and used them as interfaces for various services, such as detailed descriptions of customer services, specific products and services, wide promotion, and increasing product sales and services. Commercial use has promoted the rapid development of global information networks.If you want to introduce yourself or you
database driver -- with-pdo-mysql = mysqlnd \ use php built-in database connection driver -- with-mysqli = mysqlnd \ Use php built-in database connection driver -- with-openssl \ enable support for ssl -- enable-mbstring \ support for more word sets -- -freetype-dir \ -- with-jpeg-dir \ supports jpeg images -- with-png-dir \ supports images in png format -- with-libxml-dir \ supports Extended Markup Language x Ml -- enable-xml \ -- with-apxs2 =/usr/local/httpd-2.4.9/bin/apxs \ edit php to the h
As commercial transactions expand the number of customers and the scope of suppliers, it is wise to update user access control to ensure that confidential data in corporate folders, files, and web documents still follows the 'locks and key. Fortunately, it is easy to create rules on the Internet Information Server (IIS) to specify or limit which information can be accessed. Let's take a look at how to confi
.
IP address and domain name restrictions, using this feature, you can use the IP address or domain name to restrict access to your Web site. The default Web site defaults to no restrictions, and the default management site defaults to allow only 127.0.0.1 IP addresses, that is, localhost native access.
Secure communication, you can encrypt certain information on
. For some infrequently used accounts to be closed, such as anonymous login account.
5. Monitoring System Log
By running the System log program, the system records all the user's use of the system, including the most recent logon hours, the account used, and the activities carried out. The log program generates reports on a regular basis, and you can tell if there is an anomaly by analyzing the report.
6. Turn off unwanted services and ports
Server
such as the author Enterprise, the OA system, the entrance of the mailbox system are bundled on the Web server. Therefore, the Web server security is the author of many work in the most important.
There are a number of ways to improve the security of your Web
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.