enable the TCP scaling windows and timestamps options (RFC 1323 ). with these new parameters in place (and after the obligatory reboot), My Win2000 box is able to achieve 7 Mbps throughput, downloading large files from well-connected distant FTP sites. previusly, it cocould do no better than about 1.8 Mbps throughput.
The parameters I installed go
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ Tcpip \ Parameters]
The names/values I i
Recently installed the server version of Windows 2000, when not installed Active Directory, access to Windows about 1.5 (my machine configuration is k6-2 64M memory hard disk is the West number of WD205BA). Because of DCOM, active Directory is installed. As a result, it took about 10 minutes to get into
sets the appropriate permissions, and often checks the system's account to remove accounts that are no longer in use. These accounts are often a breach of the hacker's intrusion system, the more the system accounts, the more the hackers are likely to get the permissions of legitimate users. Domestic nt/2000 Host, if the system account more than 10, generally can find one or two weak password account. I onc
ADSL Hard Equipment installation In fact, there is not much mystery, simply said to use a network card to connect the computer and ADSL modem. and ADSL installation, most of the line providers will be dedicated to send technicians to the user's home to the on-site installation, commissioning, no need for user affinity, so no longer to say more. This article will focus on the user in the Windows 2000 environ
these shared directories
admin$%SYSTEMROOT% A shared directory for remote administration. Its path is always
Point to the installation path for Win2000, such as C:winnt
fax$ in Win2000 server, fax$ will arrive when fax client sends faxes.
ipc$ NULL connection. Ipc$ sharing provides the ability to log on to the system.
NetLogon This shared net Login service in Windows 2000 Server is
Used when Riden land dom
address and the address that the computer can recognize.
Although all network systems connected to the Internet use the DNS address resolution method, the domain name service has the disadvantage that all data stored in the DNS database is static and cannot be updated automatically. This means that when a new host is added to the network, the administrator must add the host DNS name (for example, www.happy.com.cn) and the corresponding IP address (for example, 147.23.234.6) to the database. Th
1, using Win2000 Security Configuration tool to configure the policy
Microsoft provides a set of security configuration and analysis tools based on MMC (management Console) that you can use to configure your server to meet your requirements. Please refer to the Microsoft Homepage for specific content:
Http://www.microsoft.com/windows2000/techinfo/howitworks/security/sctoolset.asp
2, the closure of unnecessary services
Windows
of the hacker's intrusion system, the more the system accounts, the more the hackers are likely to get the permissions of legitimate users. Domestic nt/2000 Host, if the system account more than 10, generally can find one or two weak password account. I once found that a host of 197 accounts in which 180 are weak password accounts.
4. Create 2 Administrator accounts
Although this may seem contradictory t
of the hacker's intrusion system, the more the system accounts, the more the hackers are likely to get the permissions of legitimate users. Domestic nt/2000 Host, if the system account more than 10, generally can find one or two weak password account. I once found that a host of 197 accounts in which 180 are weak password accounts.
4. Create 2 Administrator accounts
Although this may seem contradictory t
Hi folks,
??? As a result of a recent engagement looking at Windows Host hardening, I came
Using SS this little trick and thought it might be useful at some point. The MICR
Osoft IPSec filters used by window 2000 XP can be bypassed by choosing a sour
Ce port of 88 (Kerberos ).
First off, Microsoft themselves state that IPsec filters are not designed as a fUll featured host based firewall [1] and it is
ObjectiveIn fact, in the server security settings, although I have some experience, but there is no research, so I write this article when the heart is very not practical, always afraid to say wrong will be mistaken for others.
This article is more focused on the prevention of ASP vulnerabilities, so the server black and other aspects of the explanation may be slightly too little.Basic server security SettingsInstall PatchesAfter installing the operating system, it is best to install the patch
1, set the life timeHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
DefaultTTL REG_DWORD 0-0xff (0-255 decimal, default value 128)
Description: Specifies the default time to Live (TTL) value set in outgoing IP packets. The TTL determines the maximum time that an IP packet survives on the network before reaching its destination. It actually qualifies the number of routers that the IP packet is allowed to pass before it is discarded. This value is sometimes used to detect rem
to control panel"
Double-click "password Account Management" in the control panel to open it. What can we do?
· Reset the password. Select a user and Click Reset Password.· Add a new user. Click "add" and then follow the wizard.· Manage passwords. For example, if you want to clear your MSN Messenger login password, switch to the "advanced" tab, click "manage password", and then delete it.· Enhanced security. Friends who have used Windows 2003 Serve
I think you should have been brushed by Windows 10 in the last few days. Upgrade or not upgrade, this is a problem. But whether you're an XP die-hard or Win7 iron powder, you have to admit that Microsoft's release of WIN10 is notable for its reputation as a separate product. From now on, Microsoft will stop making a big version of the update, but use frequent update iterations (perhaps a few days to upgrade
If you are the administrator of the computer, in Windows 10, you can display a message for each user who tries to log on to Windows 10. This message tip includes the message title and message body, and the text content in the title and body can be defined by you.As far as I know, the display of information on the login
World War I Windows 10 (43) and World War I 43
[Download source code]Apsara stack 10 (43)-C #7.0 New Features
Author: webabcdIntroductionA new feature in C #7.0 of Windows 10
Introduce new features of C #7.0
Example1. C #7.0 Example 1: out variable, numeric syntax improve
Microsoft recently launched a new Windows 10 firmware system and driver update for Surface Book and uploaded it to Microsoft's Download Center in MSI's file format. The update focuses on improving the stability of the Surface Book system and the reliability of the battery, which is the version of Microsoft's Surface Book device with the Windows
the database creation script8. Execute catalog to create a data dictionary.9. Run catproc to create a package.10. Run pupbld.11. Create a spfile file from the initialization parameter file12. Execute the Scott script to create the Scott mode.
After completing the above steps, you can use "SQL> alter database open;" to open the normal use of the database.
Next, I will use the above steps as an experiment. Lab System Platform:
HD anime big picture 10th set 380 sheets size 3000*2000 or above 115 download Oracle 10g database migration experience Windows Environment
13:58:11 | category:Development | label: Oracle programming Import and Export| Large font size, medium/small subscriptionMigrate from the old server to the new server. The old server is Windows2003 and the new server is windows2008 R2.
All databases are Oracle
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.