Novice to see: Network server Security Maintenance skills

Source: Internet
Author: User
Keywords Security server hacker can network services
First, we can analyze the malicious network behavior of the network server includes two aspects: first, malicious attacks, such as denial of service attacks, network viruses, etc., which are designed to consume server resources, affect the normal operation of the server, or even the network paralysis of the server; the other is malicious intrusion, This behavior will cause the server sensitive information leakage, the intruder is able to do whatever, wanton destruction of the server. So we want to ensure that the security of the network server can be said to minimize the network server is affected by these two behaviors. Based on the share of Windows operating system servers in the Chinese market and how well people know about the operating system, I'm here to talk about personal opinions on maintaining the security of Windows network servers. How to avoid Internet servers from malicious attacks on the Internet. (a) Build your hardware security defense system to choose a good security system model. A complete security model should include the following necessary components: firewalls, intrusion detection systems, routing systems, etc. The firewall plays a security role in the security system, can guarantee to a large extent from the network of illegal access and data traffic attacks, such as denial of service attacks, intrusion detection system is to play a role in the monitor, monitor your server access, very intelligent filter out those with intrusion and attack nature of the visit. (b) The use of English operating system to know, after all, windows U.S. Microsoft Things, and Microsoft has always been a bug and patch, the Chinese version of the bug far more than the English version, and the Chinese version of the patch has always been more than the English version of the night, that is, If your server is loaded with a Chinese version of Windows, you will need to wait a few days for the patch to be patched, and maybe hackers and viruses will use this time to invade your system. How to prevent the network server from being hacked: first, as a hacker admirer, I would like to say that there is no absolute security system in the world. We can only try to avoid being invaded, and to the greatest extent to reduce casualties. (i) using the NTFS file system format We all know that the file system we usually use is fat or FAT32,NTFS, which is supported by the Microsoft Windows NT kernel's series of operating systems, and a disk format designed specifically for network and disk quotas, file encryption, and other management security features. In the NTFS file system, you can set access permissions for any single disk partition. Place your own sensitive information and service information on separate partitions. This way, even if hackers gain access to the disk partitions where your service files are located, you need to find ways to break the security settings of your system to further access sensitive information that is stored on other disks. (b) Do a good system backup as the saying goes, "preparedness", although no one wants the system to be suddenly destroyed, but not afraid of 10,000, afraid in case, the server system backup, in case of damage can be restored in time. (c) To close unnecessary services, only open the port to shut down those unnecessary services, good local management and group management. Windows system has many default services that are not necessarily open, or even dangerous, such as: The default shared Remote registry access (Registry service), the system a lot of sensitive information is written in the registration table, such as pcanywhere encryption password. Close those unnecessary ports. Some seemingly unnecessary ports can disclose sensitive information about many operating systems to hackers, such as the IIS services that Windows Server defaults on to tell each other that your operating system is Windows 2000. Port 69 tells the hacker that your operating system is most likely a Linux or Unix system, because 69 is the port used by the default TFTP service under these operating systems. Further access to the port can also return some information about the software and its version on the server, which provides a great help for hacking. In addition, open ports are more likely to become hackers into the server portal. In short, do a good job of TCP/IP port filtering not only helps prevent hackers, but also to prevent the virus has some help. (d) Software firewalls, anti-virus software although we already have a set of hardware defense system, but "bodyguard" a few more is not bad. (v) Open your event log although opening the log service does not directly affect the hacker's intrusion, but by recording the whereabouts of the hackers, we can analyze what the intruders have done on our systems, and what damage and pitfalls the system has caused, What kind of backdoor does the hacker have left on our system, what security vulnerabilities do our servers have, and so on. If you are a master, you can also set up a secret tank, waiting for hackers to invade, in his invasion when he caught him. Responsible Editor Zhao Zhaoyi#51cto.com TEL: (010) 68476636-8001 to force (0 Votes) Tempted (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title of the party (0 Votes) passed (0 votes) by the original: Novice See: Network server Security Maintenance skills return to the column recycling station home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.