Discover server security hardening, include the articles, news, trends, analysis and practical advice about server security hardening on alibabacloud.com
Windows Server 2003 Security Guide
Language: English
Manual Introduction:
Brief Description This updated technical guidance provides information about you to harden computers that run Microsoft Wi Ndows Server 2003 with Service Pack 1 (SP1). A Collection of security templates, scripts, and additional tools are als
For a long time, network security has paid more attention to the external prevention technology based on network application, but the protection of confidentiality, integrality and reliability of users ' information through the system kernel is becoming an effective technical means after the application Layer network security products.
Network security has limita
log out, rename the service file related to S headers (note that the file name is S or another file with K headers ).
For example, rename/etc/rc2.d/S80sendmail to X80sendmail.
Rename/etc/rc3.d/S13portmap S14nfslock S28autofs S80sendmail to X13portmap X14nfslock X28autofs X80sendmail
RPC has always had many security problems. Be sure not to open port 111.
After the change, restart the Linux server.
If your
verification, the operation is as follows:
[email protected] ~]# rpm-va....l ... c/etc/pam.d/system-auths.5 ... c/etc/security/limits.confs.5....t c/etc/sysctl.confs.5....t/etc/sgml/docbook-simple.cats.5....t c/etc/login.defss.5 .... . c/etc/openldap/ldap.confs.5....t c/etc/sudoers
6. Re-install the system Recovery dataIn many cases, the compromised system is no longer trusted, so the best way to do this is to back up the data on the
ServerRunningPhysical securityThe environment is very important, and many people ignore this. The physical environment mainly refers to the facilities of the server hosting machine room, including the ventilation system, power supply system, lightning protection and fire prevention system, and the temperature and humidity conditions of the machine room. These factors will affect the service life of the server
Windows server, FreeBSD are two common types of servers. The first is Microsoft's products, convenient and easy to use, but you have to constantly patch it. FreeBSD is an elegant operating system that is moved by its simplicity of the kernel and its superior performance. With regard to the security of these operating systems, you can write a book for each of them. I'm not going to describe them in detail he
, too petty.
The least service if implemented
Black for automatic Green for manual red for disabled
Alerter
Application Experience Lookup Service
Application Layer Gateway Service
Application Management
Automatic Updates [Windows Automatic Updates, optional]
Background Intelligent Transfer Service
ClipBook
COM + Event System
COM + System Application
Computer Browser
Cryptographic Services
DCOM Server Process Launcher
DHCP Client
Dist
Server Security Maintenance Tips 1: Start from basics
When we talk about network server security, the best advice I can give you is not to be a layman. When a hacker starts to launch an attack on your network, the hacker first checks whether there are common security vulnera
. Because some commonly used keywords (or sensitive words) are difficult to distinguish between malicious and not malicious.
2. You can provide better security by using stored procedures instead of directly accessing base tables . You can control how the data is modified at the row or column level. As opposed to table access, you can confirm that a user with permission to execute has executed the appropriate stored procedure. This is the only way to
15th. Web server configuration Security 15.1 ApacheSafetyIt is important to use the "least privilege Principle" when installing Web Server on a Linux deployment . Try not to use root deployment. 15.2 NginxSafetyNginx Security Configuration Guide Technical manual PDF DownloadFree in http://linux.linuxidc.com/user name a
Security Configuration 1. Nginx Nginx itself does not handle PHP, it is just a Web server, when a request is received, if it is a PHP request, then sent to the PHP interpreter to process and return the results to the client. Nginx is generally the request to send fastcgi management process processing, FASTCGI management process Select the CGI subprocess processing results and return to be nginx. Nginx i
The CentOS server is supported by many netizens. How to set the security of the CentOS server? Next, let's talk about centos6's security settings from the following aspects: System security record files, startup and login security
The network circulated a lot about the security configuration of the Windows Server 2003 system, but the careful analysis found that many are not comprehensive, and many still configured not reasonable, and there is a lot of security risks, today I decided to carefully do under the extreme BT 2003 server
Introduction: This is the dedecms server environment security settings. The Dede security configuration method is displayed on the details page. It introduces PHP, related knowledge, skills, experience, and some PHP source code.
Class = 'pingjiaf' frameborder = '0' src = 'HTTP: // biancheng.dnbc?info/pingjia.php? Id = 344028 'rolling = 'no'>
Dedecms
In the age of network technology, SOHO (Small Office Home Office) or Tele-office (Tele-Office) has been gradually accepted by some companies and individuals as a new way of working and living. With the help of the ubiquitous network, many people stay in their own space to work. This is a more free and environmentally friendly life. SOHO allows employees to avoid heavy traffic during commuting, on the other hand, it also reduces the company's expensive office rental expenses and gives employees m
Windwos server security-common security check list
Recently, a security check was conducted on the website server, and the following lists were checked separately to prevent unburned attacks.
Serial number
Regular check
1
Part 1ArticleHttp://www.cnblogs.com/Leung/archive/2009/10/29/1592328.html we talked about how to build a system environment with basic security.
This section describes how to provide security services based on this platform. The platform has a certain degree of security. We should continue this feature in all future work. Therefore, all our operations must take
line "net share IPC $ Delete" (excluding quotation marks)(2) Add one or more startup. CMD tasks to Windows scheduled tasks. The scheduled time is "run at computer startup ". You can also put this file in "start-Program-start" to delete IPC $ sharing as soon as it is started.(3) restart the server.2.2 Delete ADMIN $ shareModify the registry:HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ LanmanServer \ ParametersAdd the autoscaling wks su
The server installs McAfee + color Shadow arp firewall very good. (For more information, see the contents of the s.jb51.net.) )
This is a very bad the hacker told me, said only installs these two kind of he not to have.
Server Antivirus.
360safe Check server security issues (delete when you're done, don't keep it)
A)
depends on your network environment. In general, if your server uses a real IP address (the address is usually allocated to you by the IDC), the firewall's transparent mode will be selected. In this mode, your server looks like you are directly facing the internet, and all access requests to the server are directly sent to the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.