As a classic FTP server software, Serv-u has been used by most administrators, its simple installation and configuration, as well as the powerful management of human nature has been praised by the administrator. But as users become more and more, the security of the software is emerging.
The first is Serv-u site chmod vulnerabilities and serv-u Mdtm vulnerabilities, that is, the use of an account can easily get system permissions. The second is the s
and shares to enable
Network access: Enable for network authentication store credentials is not allowed
Network access: All shares that can be accessed anonymously are deleted
Network access: Anonymous access to all of the lives deleted
Network access: Remote access to the registry path all deleted
Network access: Remotely accessible registry paths and subpath Delete all
Account: Rename guest account rename an account
Accounts: Renaming a system administrator account renaming an account
catalog server and must have the DNS service installed, not a read-only domain controller6. NetBIOS name does not need to be set7. The AD DS database file path remains the default, and of course, putting the log files and database files on different disks can help improve performance8. After installing AD DS, the server will be restarted automatically after restarting the
version, followed by server-side settings: domain that block can choose the host name or IP address the third step is the database settings, using the standard database connection, Database driver Selection Mysqljdbc driver class is: Com.mysql.jdbc.Driver database url:jdbc:mysql://ip:3306/openfire (where IP is server-side IP) User name: openfire password : 123456The fourth step is the feature
Eight security setting skills for CentOS server to ensure Apache Web Server Security
Apache server is an open-source WEB Server supported by the Apache Software Foundation, a non-profit organization. Many of our virtual hosts and VPS use the Apache
SQL Server downgrading SQL Server 2000 run the setting method with the GUESTS permission, sqlguests
Due to vulnerabilities in the SQL2000 database, hackers can easily obtain system administrator privileges.
By default, SQL runs with the SYSTEM permission, which is extremely powerful.
To make the server more secure, we
However, the workload of maintaining these level two domain names is very high, but we can solve this problem by using a generic domain name resolution technique, so that support for the generic domain name can be achieved by slightly setting up a DNS server with its own Windows system.
The following are examples of Windows Server 2003 and Windows 2000 DNS s
setting up, land the peanut shell client again.At this time, the peanut shell software has been online, we have applied for the domain name has been bound to the current public network IP address, the Internet can be applied to the domain name directly to the current host services, if your host to connect to the router or proxy server, please refer to the intranet site documentation. Let's continue the mai
=Roothome=/# for details seeMans 4crontabs# Example of Job definition:#.----------------Minute (0- -)# | .-------------Hour (0- at)# | | .----------Day of Month (1- to)# | | | .-------Month (1- A) OR jan,feb,mar,apr ... #| | | | .----Day of Week (0-6) (sunday=0Or7) OR sun,mon,tue,wed,thu,fri,sat#| | | | |# * * * * *command to be executed~~~~Look at this file, the front four lines can be ignored regardless. In fact, there is an example here, very easy to read, the key is this line:*
.
Compiler error Message: CS0016: Failed to write output file ' c:\windows\Microsoft.NET\work\v1.1.4322\Temporary asp.net files\root\345513e7\86f1794a\ Fvmzvzp7.dll "--" Deny access. ”
Solve:
The temp plus the read, write, and modify permissions of the Users group should be in the C-disk windows.
Question five:
Compile error
Description: An error occurred during the compilation of resources required to provide services to the request. Please check the following specific error details and modify
1, upload Chinese file error:650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M01/6D/B6/wKioL1VqegbzbAPmAAEcCOJWzY4144.jpg "title=" Qq20150531105345.jpg "alt=" Wkiol1vqegbzbapmaaeccojwzy4144.jpg "/>2. Solution:Locate the Advanced settings for the FTP site and change the "Allow UTF8" entry to False.650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/6D/BA/wKiom1VqeF_ho-8GAAC-SWYp9sk921.jpg "title=" Qq20150531105608.jpg "alt=" Wkiom1vqef_ho-8gaac-swyp9sk921.jpg "/>Windows
Web site program is placed. Where wwwroot as long as the right to save D disk, and blog.postcha.com This directory, we need to add two additional permissions, namely IUSR and Iis_iusrs.
Wwwroot Permissions:
Site Directory Permissions:
The general website has uploads the file, the picture function, but the user uploads the file is not credible. So also to the upload directory for separate settings. The upload directory also needs to add "modify", "write" permission to the IIS_IUSRS grou
Frequent use of PING commands can cause network congestion, reduce transmission efficiency, and generally deny users ping servers in order to avoid malicious network attacks. For this to happen, not only can you set it up in a firewall, you can set it up on a router, but you can also take advantage of the capabilities of the Windows 2000/2003 system itself. Either way, the deny ping action is implemented by prohibiting the use of the ICMP protocol.For example, to set IP policy in Windows
Figure-FileZilla
1. Admin Interface setting (set on the administrator Interface): This is the parameter used to log on to the configuration server Interface. The port number settings also appear during installation. The following two columns can define the network interface and IP address for remote logon configuration. Change the administrator password at the bottom.
2. Logging: Set whether to enable Log
File Sharing in Windows and Linux has always been a very tangled problem. Especially when using the virtual machine's shoes, you often need to copy the items in the virtual machine but cannot find a good method.
In fact, building an FTP server is undoubtedly a good choice thanks to the powerful server functions of Linux.
It is really easy to build a server in Lin
/binmailto=roothome=/# for details see Mans 4 crontabs# Example of Job definition:#.----------------minute (0-59) # | -------------Hour (0-23) # | | . ----------Day of Month (1-31) # | | | . -------Month (1-12) OR jan,feb,mar,apr ... # | | | | ----Day of Week (0-6) (sunday=0 or 7) or sun,mon,tue,wed,thu,fri,sat# | | | | | # * * * * * command to be executed~~~~Look at this file, the front four lines can be ignored regardless. In fact, there is an example here, very easy to read, the key
allow anonymous connections, and in the Message tab, set the prompts that appear when users visit or exit your FTP server, and write as you like! There is also a "maximum number of connections" set, It refers to the maximum number of hosts connected to the local FTP at the same time, if your computer configuration is not very good, it is recommended not more than 5. Your FTP server should already be work
So how do you avoid these workstations bringing a variety of potential security threats to the server system, which can have a very large impact on the server system? To do this, we are able to secure the server system by setting the network policy of the Windows Server 2008
in system logs. We can use the default settings, and select "Errors" and "Warnings, we recommend that you do not select "Information". Otherwise, system resources will be wasted. "Idle timeout" is the time-out setting for remote logon. The default value is "0", which means no logon timeout limit is imposed.
You may still remember the personalized login information of the FTP server, and the SSH
As shown in the figure:
How to operate:
Go to the binding domain name site IIS settings, select the Site properties--Home directory--redirect to the URL write to jump to the domain name, background plus $s$q, such as
Copy Code code as follows:
Http://www.jb51.net$s$q
You must then check the "exact URL entered above" and "permanent redirection of resources", or the URL will cause problems. When set, Access http://tool.chinaz.com/pagestatus/to see if the return status is 301, the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.