In actual work, especially on servers, it is usually 7 × 24 hours. For this reason, many system programs have the function of restarting the server after the server crashes, that is, the Watchdog function ). For example, if an unattended DVR (Digital Video Recorder Digital Hard Drive Video Recorder) is abnormal, the Reset is automatically restarted ). However, if the system uses the Windows 2000 Server plat
Introduce some common setup methods for setting up security policies for Windows 2000 systems to play a security role.
First, security policy
It is well known that the Windows 2000 system itself has many security vulnerabilities. Patching is a way to reduce most vulnerabilities, but it does not eliminate small
Microsoft's Windows 2000 is a beautiful, stable, fast system platform, and with the implementation of Microsoft. NET strategy, users are becoming more and more. It is well known that Windows consumes a lot of system resources, and that it is not running with less memory. From a variety of memory collation, system optimization tools of the general popularity can b
Introduced
If you decide to develop Linux under the firewall, you will find a lot of free information and source code. But if it's difficult to develop a firewall under Windows, it's impossible to find the information and code.
So I decided to write this article about the simple way to develop a firewall under Windows 2000/XP.
Background
In
Users who use Windows 2000/XP know that it is best not to log on as a member of the Administrator group in daily work. This is because the Administrator has the power to kill system files and is not careful, the system will "stop killing innocent people" and "refuse to play ". Generally, you should log on to the system as a common user (members of Users Group). Because the account of the Users Group cannot
of the hacker's intrusion system, the more the system accounts, the more the hackers are likely to get the permissions of legitimate users. Domestic nt/2000 Host, if the system account more than 10, generally can find one or two weak password account. I once found that a host of 197 accounts in which 180 are weak password accounts.
4. Create 2 Administrator accounts
Although this may seem contradictory to the above, it is in fact subject to the abo
Install SQL server 2000 Enterprise Edition (graphic version) on Windows XP and SQL
However, the methods on the Internet only contain text instructions, but are not attached with the corresponding instructions. Therefore, it is more intuitive for me to perform the test.
The installation and testing process of Haibo is as follows:
1. Go to the installation disk or folder of the ms SQL Server software, go to t
Document directory
The information in this article applies:
Summary
On a Windows 2000-based computer, you can use the Group Policy to lock the Terminal Server session. After the following settings are performed, access to the Administrator account is restricted. We strongly recommend that you create a new organizational unit instead of modifying the policy of an existing organizational unit.
Note:: Using
Windows 2000 Server Security Settings
Security settings should be applied to all applicationsProgramAfter the installation is complete and running properly, it must be performed before the access network (LAN and Internet.
Operating system security settings include permission settings for the disk directory and system files, system running service settings, and Local Security Policy configuration.
Dis
Practical Windows2000 network tutorial for System Engineers
1. Quick configuration of Windows 2000 interfaces:Look at a tool called netsh.In the cmd shell of Windows 2000, enter netshCome out: netsh> prompt,Enter an int ip address:Interface ip>Enter dump to view the network configuration of the current system:
#-------
Now I will build the JSP platform process.I'm using Windows2000 professional+jdk+tomcat.Build the JSP platform:1. JDK Download and install:Step One: Enter the Sun company Java JDK 1.4 version of the free installation program, download home page address:http://java.sun.com/j2se/1.4/download.htmlClick Download to enter the download protocol and select Accept agreement.Step Two: JDK Installer: I installed the:J2sdk-1_3_1_07-windows-i586.exeStep three: In
address and the address that the computer can recognize.
Although all network systems connected to the Internet use the DNS address resolution method, the domain name service has the disadvantage that all data stored in the DNS database is static and cannot be updated automatically. This means that when a new host is added to the network, the administrator must add the host DNS name (for example, www.happy.com.cn) and the corresponding IP address (for example, 147.23.234.6) to the database. Th
The method for obtaining the CPU usage in Windows NT/2000 is different from that in Windows 9X. The "performance counter" is not used for obtaining the CPU usage in Windows NT/2000 ". Instead, it uses ntquerysysteminformation, an API function not publicly available in Ntdll.
Opening "Neighboring Computers" in Windows 2000 of some machines often waits for a few 10 seconds to be unbearable. Careful analysis will find that, among the computers found, there are both "printers" and "Scheduled tasks." When browsing your computer through My Network Places, Windows 2000 searches for your own share
The user and configuration information of the Exchange 2000 Server depend on Microsoft Windows 2000 Active Directory. Exchange 2000 primarily uses Lightweight Directory Access Protocol (LDAP) to communicate with domain control sites and generic Directory servers. Exchange 2000
Author: Zhang Xiaoming
Windows 2000 is widely used as the server operating system for campus networks in primary and secondary schools. However, some schools have been attacked by cyber hackers since they started running, causing network crashes. So how to solve the security problem? In fact, without any hardware or software intervention, we can build a security protection forest by the system itself.
S
Opening "Neighboring Computers" in Windows 2000 of some machines often waits for a few 10 seconds to be unbearable. Careful analysis will find that, among the computers found, there are both "printers" and "Scheduled tasks." When browsing your computer through My Network Places, Windows 2000 searches for your own share
In Windows XP and Windows 2000 systems, there is a command that I am not generally familiar with, but powerful, that is: Syskey command.
This command can effectively enhance your system security. Perhaps you would say that it is not safe to enter your account and password when you enter Windows XP or
Window Windows 2000 log files usually have application logs, security logs, system logs, DNS server logs, FTP logs, www logs, and so on, depending on the services that the server opens. When we use streamer detection, such as IPC detection, will be in the security log quickly recorded streamer detection in the user name, time, etc., with FTP detection, will immediately in the FTP log note IP, time, the user
ObjectiveIn fact, in the server security settings, although I have some experience, but there is no research, so I write this article when the heart is very not practical, always afraid to say wrong will be mistaken for others.
This article is more focused on the prevention of ASP vulnerabilities, so the server black and other aspects of the explanation may be slightly too little.Basic server security SettingsInstall PatchesAfter installing the operating system, it is best to install the patch
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.