Purpleendurer note:See: http://techrepublic.com.com/5100-1009_11-5692378.html? Tag = NL. E102
Here, only the specific operations are translated.
Secure the local administrator account in WindowsSecurity of the local administrator account in Windows
By Michael Mullins ccna, MCP
Takeaway:Did you know the Windows Local Administrator account is the only access someone needs to completely wreak havoc on your net
Windows 8 will include more security features to provide users with better security protection and to protect end users from threats from the network. Microsoft has strengthened the Windows Defender Security program to protect users from all types of malware, including virus
For computer security, some people say that software cost-effective, some people say the most secure with hardware, if the carrot and stick, then computer security is what? Data Execution Protection (DEP) in Windows 7 gives users hands-on experience of the security experience that comes with hardware and software fists
Windows Server 2008 is by far the most reliable Windows server, enhancing operating system security and breaking security innovations, including network Access Protection, Federated Rights Management, Read-only Domain Controller provides the highest level of security for you
Microsoft's latest windows are not just changes in the user interface, but Microsoft also brings new changes in the security, manageability, and application stores of the system. Recently, the Science and Technology Web site ZDNet on these low-level functions of the analysis and introduction.
Last week, Microsoft's official blog introduced new features in W
ASP provides a powerful access to the file system, you can read, write, copy, delete, rename and so on any file on the server hard disk, which poses a great threat to the safety of the school website. Now many campus hosts have been subjected to the FSO Trojan intrusion. But after disabling the FSO component, the result is that all ASP programs that utilize this component will not be able to run and meet the needs of the customer. How can you allow both the FileSystemObject component and the
I. Using Windows-brought firewall logs to detect intrusions the following is a firewall log record 2005-01-1300:35:04opentcp61.145.129.13364.233.189.104495980 2005-01-1300:35:04: Indicates the date time of the record open: Indicates that the connection is opened, and if this is close means that the connection is closed TCP: Indicates that the protocol used is TCP 61.145.129.133: Indicates the local IP 64.233.189.104: Represents a remote IP 4959: Repre
1. Use Windows Firewall logs to detect intrusions. Below is a firewall log record 2005-01-1300: 35: 04OPENTCP61. 145.129.13364.233.189.20.495980 2005-01-1300: 35: 04: indicates the recorded date and time. OPEN: indicates that the connection is opened. If Close is used, TCP is closed. Tcp 61.145.129.20: local IP 64.233.189.104: remote IP 4959: local port 80: Remote port. Note: If the ports here are not common ports such as 80 and 21, you should pay att
execute and Read permissions//recommend removing Write permissions//0555
/group "Circle Module Program Directory"Need to execute and Read permissions//recommend removing Write permissions//0555
The following is a detailed introduction to the official Website Directory Security Configuration Tutorial
1, directory PermissionsWe do not recommend the user to set the column directory in the root directory, because this
A group of security researchers said that because some PC manufacturers have neglected the implementation of the uniied Extensible Firmware Interface (UEFI) specification, attackers may bypass the Windows 8 Secure Boot mechanism on these PCs.
At the Black Hat USA Conference held in Las Vegas this year, researchers Andrew Furtak, Oleksandr Bazhaniuk, and Yuriy Bulygin demonstrated two computer attacks by avo
A Basic defensive thinking: backup is better than remedy.
1. Backup, after loading the machine, first back up the C disk (System disk) WINDOWS inside, and C:\WINDOWS\system32 the file directory.
Run, CMD commands as follows;
dir/a C:\WINDOWS\system32 >c:\1. Txt
dir/a C:\Windows >c:\2. Txt
This backs up the list of file
Nowadays, users are becoming more and more aware of security and their security skills are gradually improved. However, some security details in Windows are ignored or unknown by many people. Perhaps it is because of these details that we have built a security line of defens
Network security should be a focus of network management, how to build a secure enterprise network, is the important work of each enterprise management, Windows Advance serve is one of the more popular server operating system, but to secure the configuration of Microsoft's operating system, it is not an easy task. I'll talk about the security settings for
Guest account and change the name and description, then enter a complex password2, the system administrator account is best less built, change the default Administrator account name (Administrator) and description, the password is best to use the number of small letters plus the number of the upper file key combination, the length of the best not less than 10 bits3, create a new trap account named Administrator, set the minimum permissions for it, and then randomly enter the combination of the
Although the Windows operating system leaves us with many bad memories, we must admit that Windows is still one of the most widely used systems. In the face of such a large and complex operating system, it is imperative to protect its security. For the current Windows security
Hkey_classes_root\shell.application\clsid\ the value of the project
Hkey_classes_root\shell.application\clsid\ the value of the project
It can also be deleted to prevent the harm of such Trojans.
Prevents the guest user from using Shell32.dll to prevent calls to this component.
2000 use command: cacls c:\winnt\system32\shell32.dll/e/d Guests
2003 use command: cacls c:\windows\system32\shell32.dll/e/d Guests
Note: The operation will not take effect un
Windows Server2003 is currently the most mature network server platform, security relative to Windows 2000 has greatly improved, but the 2003 default security configuration is not necessarily suitable for our needs, so we have to according to the actual situation to Win2003 a full
Saying "Not afraid of 10,000, just in case," the data stored in the computer system, regardless of the security measures taken, are likely to encounter unexpected attacks and accidental damage or loss, and damage or loss of important data content once can not be found back, the resulting loss may be fatal. In view of this, the Windows system has built up the data backup, restore functionality early, and in
scanner software)
Relatively fast, but with a relatively simple function
X-scan (no need to install green software, support Chinese)
Multi-threaded approach to the specified IP address segment (or stand-alone) for security vulnerability detection
Support plug-in function, provide graphical and command line operation, scanning more comprehensive.
3> security vulnerability attack
A
Security has been a problem recently, such as Windows authentication, asymmetric encryption, digital certificates, digital signatures, TLS/SSL, and WS-Security. If time permits, I would like to write a series of articles to share and exchange with the majority of users. For many readers, Windows certification is a fami
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.