Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall
Database, is the enterprise or institution data storage "warehouse" is a long-term storage in the computer, organized, shared, unified management of the data. Database is a new method and technology of data management, he can better organize data, more convenient maintenance data, tighter control data and more efficient use of data. From the side, we understand that the database and a enterprises and institutions of the importance of its security, the database is the lifeblood. Today, the IDC review network shares 5 databases for virus detection.
1. Use software scanners.
Some database servers try not to take or take limited malware precautions because of concerns about performance degradation or system crashes. In fact, if there are too many data resources to protect in real time, the database and other highly active directories can be excluded from the real-time scan. Or, install antivirus software at least, but make sure that its virus library is up to date. Perform a comprehensive system scan at irregular times to ensure database security.
2. View the database server's memory.
Looking at memory usage, you can use Task Manager to search for seemingly malicious software to see if there is a large amount of memory or if you have a large CPU application. In all systems on your network, you have a thorough understanding of the database, including the processes that record the run and should not run.
3. Check open ports.
Use Windows built-in tools to check those ports that are already open and link to the server. or enter Netstat–an more at the command line to view the open and listening TCP and UDP ports on a page by page.
4. Focus on network traffic.
The easiest way to determine whether a database has malicious behavior is to see if it is communicating on the network. If you have a network analyzer, you can find it in a matter of minutes. You can also use a parser that you carry, or from somewhere else, connect to an Ethernet switch or mirror port. Look at which protocol you're using, look for huge traffic, strange traffic, and the tendency of other networks to access SQL Server systems.
5. Confront malicious software head-on.
Trojans create remote access tunnels, intercept keystrokes, delete data, and more-especially on the most important servers. The best way to do this is to not use SQL Server for Internet access, Web browsing, e-mail, and more. But that's not realistic. (or someone else) may need it ultimately not just as a database server. Once it appears, you need to ensure that it is protected. Be aware that anti-virus software is not foolproof anytime. Analyze and resolve malware: If you want to attack, or install a fraudulent software that can help on the network, there is nothing better than being directly on the SQL Server. If there is a problem on the server, it can be easily detected.
Article by China IDC Review Net original edit, original address:
Http://www.idcps.com/Article/20101029/19636.html (if you want to reprint, please specify the source)