As a network administrator, do you know what is happening on your host or server--who has visited it. What they have done. What is the purpose. What the. You don't know. In fact, Windows 2000 to provide us with a security audit function, we do administrator this line, the most need to be familiar with this function, otherwise you how to tube it. Security audits can record several security-related events in
First, security policy
It is well known that the Windows 2000 system itself has many security vulnerabilities. Patching is a way to reduce most vulnerabilities, but it does not eliminate small vulnerabilities, which are often important ways to attack or invade. The "Local security policy" that comes with Windows 2000
It is believed that most of the people currently using the ASP version are built in the IIS3.0 or IIS4.0 in the ASP2.0, server platform is also more NT4.0, with Windows 2000 will be in February 17, since the previous magazine media has been reported on Windows 2000 expansion of server performance and versions (server v
First, Introduction:
A security template is a new feature of Windows 2000. It is a physical representation of the security configuration, consisting of a file (. inf) of the security properties supported by Windows 2000. It organizes all existing security attributes into one location to simplify security management. Se
As one of the most popular network operating systems, Windows 2000 Server Edition and Advanced Server Edition have been favored by many network management, but their heavy consumption of system resources also makes people headache! In fact, for normal operations, many of the services in Windows 2000 are unnecessary, an
In Windows XP and Windows 2000 systems, there is a command that I am not generally familiar with, but powerful, that is: Syskey command.
This command can effectively enhance your system security. Perhaps you would say that it is not safe to enter your account and password when you enter Windows XP or
Monitor and manage TCP/IP in Windows 2000 pro
Monitor and manage TCP/IP in Windows 2000 pro
Http://ct.techrepublic.com.com/clicks? C = 448961-55382566 brand = techrepublic Ds = 5 FS = 0
By Jim BoyceBy Jim BoyceTranslated by endurer 2005.09.13
Keywords:Operating systems | Windows
I purchased a new founder computer (configured as 2.8GC/512 MB/120 GB), installed Windows 2000 operating system and Norton Antivirus software, and installed Shock Wave patches. I often went online (1 ~ 2 hours) sudden shutdown and restart, no prompt. I thought that I had just got a virus and got a trojan while surfing the Internet. I did not agree that Windows
How to block CTRL + ALT + DEL in Windows NT/2000Author: ac952_z_cn
PrefaceIn Windows 9x, we can use systemparametersinfo (spi_screensaverrunning, 1, null, 0); To block CTRL + ALT + DEL, but it does not work in NT/2000, even the wh_keyboard_ll low-level keyboard hook cannot be intercepted! By replacing Gina DLL, the function of blocking CTRL + ALT + DEL
Oracle|window
How to Kill a single Oracle thread in a Windows 2000 environment
Source: http://metalink.oracle.com
Key word: Oracle Thread Kill
Description: This article describes the use of Orakill tools in Windows environments
Body:
Have you ever experienced anything like this? A user process that consumes resources for a long time without releasing it ca
, protocols) are stored. These files are used by the Windows Sockets interface. Forwardbroadcasts: forward broadcastKey: TCPIP/parametersValue Type: REG_DWORDValid value: 0 or 1 indicates false or true.Default Value: 0 (false)Description: This option is ignored because broadcast Forwarding is not supported. Usezerobroadcast: use zero BroadcastKey:/parameters/TCPIP Note: in Windows
In Microsoft's earlier Windows operating systems, we generally use proxy server software such as Wingate and Sygate for shared connections. Windows 2000 provides us with the Internet sharing feature, which is easier to use and easier to set. It is suitable for small office and home networks.
Setting up network sharing in Win
connection and management through the management unit of Internet Information Service. (System Service)Tlntsvr.exe allows a remote user to log on to the system and run the console program using the command line. (System Service)
Allows you to manage web and FTP services through the management units of Internet Information Services. (System Service)Tftpd.exe implements the TFTP Internet standard. The user name and password are not required for this standard. Part of the Remote Installation servi
Computer security includes not only protecting your computer's local data, but also securing your data on your network. A good operating system can identify people who attempt to access computer resources, prevent specific resources from being inappropriately accessed by users, and provide users with a simple and efficient way to set up and maintain the security of the computer.
Currently, PC users are often windows, compared to previous versions,
Host and expert introduction guide_wendy_ms: Let's welcome this afternoon's expert: MVP Yan Weifeng vfanyan [MVP]: Hello, everyone. I'm Yan Weifeng guide_wendy_ms. The Chat officially started, you can freely ask: vfanyan [MVP]: Today's content is about Windows 2000 group policies. vfanyan [MVP]: Let's get started with any questions!
Q: Why is my group policy not "Folder Redirection? [A]: on the console menu
removed, with Notepad to open it, the contents of the
[Boot Loader]timeout=30Default=D:\[Operating Systems]D:\="Microsoft Windows 2000 Professional"multi(0)disk(0)rdisk(0)partition(2)C:\="Microsoft Windows 98" /fastdetect
To
[Boot Loader]timeout=0Default=C:\[Operating Systems]C:\="Microsoft Windows 98"multi(0)disk(
With the rapid development of the Internet and the increasing demand for mobile office, more and more people want to remotely access the LAN located in the company. Thus, remote access technology emerged. Next we will discuss how to implement remote access service-ras in a Windows 2000 network ).
The remote access service is a standard C/S mode (Client/Server) service, divided into two parts: remote access
To view this type of files, you need to set to show hidden files. The specific settings are as follows:Open the Control Panel (classic view)-> Folder Options-> View-> advanced settings, and deselect the "Hide protected operating system files (recommended)" check box )", replace "hidden files and folders" with "show all files and folders", and leave.
The "[user name]" in the following section is the user name currently logged on, usually as administrator.
20
"Open Parent Path" is the concept started in Windows 2003, before Windows XP, Windows 2000 brought IIS is not "Windows 2003" this argument. The default setting for Windows 2003 IIS6.0 after installation is not to open the parent
Remote Terminal Services in a Windows 2000 system is a very powerful service, but also become an intruder in the host of the channel, the intruder can use some means to get the administrator account and password and intrusion into the host. Next, let's look at how to prevent hacking by modifying the default port.
As we all know, remote Terminal Services is based on port 3389. Intruders usually scan the hos
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.