Discover server security hardening, include the articles, news, trends, analysis and practical advice about server security hardening on alibabacloud.com
Eight security setting skills for CentOS server to ensure Apache Web Server Security
Apache server is an open-source WEB Server supported by the Apache Software Foundation, a non-profit organization. Many of our virtual hosts and
WindowsServer2003 + IIS6.0 + ASP Server security Settings--component security Settings Chapter A, uninstall the Wscript.Shell and Shell.Application components, save the following code as one. BAT file Execution (minutes 2000 and 2003 systems) Windows2000.bat
Copy Code code as follows:
Regsvr32/u C:/winnt/system32/wshom.ocx
Del C:/winnt/system32/
You can also run the input gpedit.msc into the computer configuration →windows settings → security settings → local Policy
Security Policy Automatic Update command: Gpupdate/force (Apply Group Policy automatically does not need to be restarted)
Start Menu-> Administration Tools-> Local Security Policy
A, local policy--> audit policy
Audit policy Change faile
Currently, the network security market is dominated by firewall, IDS/IPS, network switches, SOC, and other application-layer network security products. In addition to the above products, Wangyu Shenzhou Technology Beijing) Co., Ltd, introducing a new kernel reinforcement concept in the technical fields of Windows, Linux, and Unix systems, we have successfully developed dual kernel reinforcement and manageme
Increase the server security level and server securityI am so worried all day long that my mood is always influenced by the server's security factor. How can I prevent the server from being attacked? How is routine server
glacier default connection port is 7626, WAY 2.4 is 8011, Netspy 3.0 is 7306, Yai virus is 1024 and so on.
(ii) By type of agreement:
Can be divided into ports such as TCP, UDP, IP, and ICMP (Internet Control Message Protocol). The following are mainly about TCP and
UDP port.
(1) TCP port
The TCP port, the Transmission Control protocol port, requires a connection between the client and the server to provide a reliable
of data transfer. Common include
--IP security Policy for server security (lists only the ports or protocols that need to be masked or blocked)
Protocol IP Protocol Port source Address Destination Address description method
ICMP------ICMP blocking
UDP 135 Any IP address my IP address 135-udp block
UDP 136 Any IP address my IP address 136-udp block
UDP 137 Any IP address my IP address 137-udp b
1. No ping
/etc/rc.d/rc.localEcho 1 >/proc/sys/net/ipv4/icmp_echo_ignore_all
2. Permissions control of user and password fileschmod 600/etc/passwdchmod 600/etc/shadowchmod 600/etc/groupchmod 600/etc/gshadow3. Add non-change attributes to the following fileChattr +i/etc/passwdChattr +i/etc/shadowChattr +i/etc/groupChattr +i/etc/gshadow4. Access Control for VSFTPVI Hosts.denyvsftpd:all– first to ban all VSFTP requests.VI Hosts.allowvsftpd:192.168.2.1– again allow the VSFTD request of Intranet5.
Zhou minyao Jin Li Sheng Yang qishou(College of Manufacturing Science and Engineering, Sichuan University, Chengdu 610065, China)Abstract: This paper uses a variety of network security technologies to analyze the security risks of typical configurations (Win 2000 SERVER + SQL + IIS5.0), and puts forward corresponding countermeasures. Focuses on the
Tencent Cloud was first purchased when the only Windows Server 2008 R2 system, the original use of Windows Server 2003 to 2008 is not very skilled, for some basic settings and basic security policy, search the Internet, Finishing probably have the following 17 aspects, if have not mentioned hope everybody enthusiastically propose ha!
Some of the more important
Label:Keep your servers and data confidential, and SQL Server has everything you need to prepare for the current complex attacks. But before you can effectively use these security features, you need to understand the threats you face and some basic security concepts. This article provides the basics, so you can take advantage of the
Enabled
Enabled
Enabled
Microsoft network server: automatically deregister a user when the logon time is used up
Enabled
Disabled
Enabled
Disabled
Network Access: allows anonymous SID/Name Conversion
Disabled
Disabled
Disabled
Disabled
Network Access: Do not allow anonymous enumeration of SAM accounts and shares
Enabled
Enabled
Enabled
Enabled
Network Access: Do not allo
are correct and reboot the server before each step.
Restart Remote Desktop Connection, with the new port number set after the IP address,
As long as the previous settings are correct, you should be able to connect to the server properly.
After you log on to the server, disable or remove the remote connection rules that come with your system because it is no
The security group upgrade rule failed error: Rule "Security Group Sid (Security Identifier)" failed was reported in the forum today. This error occurs because the Windows Local Group Sid information created by SQL Server does not match the SID in the registry. You need to use whoami/groups to find the correct Sid and
based on cloud computing technology, the security dog clothing cloud is the best server security operation Cloud Platform in the cloud era in the early 2014 , and its "cloud security, new operations" approach provides users with all the services they need for server
Label:This article is the fifth of the SQL Server Security series, please refer to the original text for more information.
A schema is essentially a database object, a container for other objects that can easily manage groups of objects in a complex database. The architecture has important security features. In this article you will learn how to give prin
Zhou minyao Jin Li Sheng Yang qishou (College of Manufacturing Science and Engineering, Sichuan University, Chengdu 610065, China)
Abstract
To:This article uses a variety of network security technologies to analyze the security risks of typical configurations (WIN 2000 SERVER + SQL + iis5.0) and propose corresponding countermeasures. Focuses on the
Undoubtedly, improving server security is one of the most important tasks for system administrators. Therefore, there are many articles, blogs, and Forum posts for this topic.
CentOS server security skills
Undoubtedly, improving server
PHP Security ramble on Apache server security settings
1, to nobody users to run
In general, Apache is installed and run by root. If the Apache server process has root user privileges, it poses a significant threat to the security of the system and should ensure that the Ap
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.