Alibabacloud.com offers a wide variety of articles about antivirus for windows 2000 server, easily find your antivirus for windows 2000 server information here online.
Introduced
ICS (Internet Connection Sharing) is a network Connection Sharing service built into Windows 2000 that makes it easy for home or small office network users to connect to the Internet.
To use ICS, there are a few things to note:
(1) ICS-enabled computers must have two network interfaces: one connected to an internal LAN, typically a network adapter, and one connected to the Internet, usually a
operations. (System Service)-> remoteregister
Winmgmt.exe provides system management information (system services ).
Inetinfo.exe-> msftpsvc, w3svc, iisadmn
Tlntsvr.exe-> tlnrsvr
Tftpd.exe implements the TFTP Internet standard. The user name and password are not required for this standard. Part of the Remote Installation service. (System Service)
Termsrv.exe-> termservice
Dns.exe responds to queries and updates requests for Domain Name System (DNS) names. (System Service)
======================
As Microsoft's latest server operating system, Windows Server 2003 not only inherits the ease-of-use and Stability of Windows 2000/XP, but also provides higher hardware support and more powerful security functions, it is undoubtedly a choice for Small and Medium network appl
Steve Riley
Do you know what happens on your server-who is accessing them, what are your users doing, and what are their purposes? Like most administrators, you may not know. Do you want to know? Windows 2000 provides a security audit function that records several security-related events. You can use the information to generate a summary file of a regular activit
server| problem my newly installed operating system is the Windows 2003 Standard Edition, which installed an enterprise version of SQL Server 2005 a few days ago, and the installation went well. Last night I loaded SQL Server 2000, and I found it on the internet, saying SQL
port. 8. Reject detection from port 1434 because there is no limit on port 1434, some database information can be detected by others, and DOS attacks may also increase the CPU load on the database server, therefore, for Windows 2000 operating systems, the IPSec filter rejects UDP Communication at port 1434, which can hide your SQL
Description
Linux Server system: CentOS 5.5
Web environment: Lamp or LNMP
Windows Server System: Windows Server 2003
Windows Server IP Address: 192.168.21.134
Database environment:
consolidated write operations. Instead, you may want to refer to the counters of other SQL Server and Microsoft Windows 2000 to tune the system.As mentioned in chapter 24th, when the system is updated frequently, you may need to modify the BCP batch operation capacity and the merge batch operation capacity. If the BCP batch operation capacity is increased, the e
of the hacker's intrusion system, the more the system accounts, the more the hackers are likely to get the permissions of legitimate users. Domestic nt/2000 Host, if the system account more than 10, generally can find one or two weak password account. I once found that a host of 197 accounts in which 180 are weak password accounts.
4. Create 2 Administrator accounts
Although this may seem contradictory to the above, it is in fact subject to the abo
appears, including "edit", and then move the mouse to "edit". The next menu is displayed automatically, click "select all", and then click "copy" to paste it into the notepad window and save it.
According to the displayed information, the content is different from the content described in the second section above. It is also a tool with its dedicated help documentation and usage /? The help information obtained is different. It was not the first time in SupportTools. I have never figured out th
template to create a new security template, you can save the built-in Template under the new name. To copy the built-in template with a new name, perform the following steps:
Right-click the template to be copied, and then clickSave.
InSaveIn the dialog box, type a new name for the template, and then clickSave. The console will automatically refresh and you will see the new template in the left pane of the console. Then you can use custom settings to configure the new template. Remember to s
As a network administrator, do you know what is happening on your host or server-who has visited? What have they done? What is the purpose? What the? You don't know! In fact, Windows 2000 to provide us with a security audit function, we do administrator this line, the most need to be familiar with this function, otherwise how do you manage it? Security audits can
follows:
USE masterGO-- Set two variablesDECLARE @ serverproperty_servername varchar (100 ),@ Servername varchar (100)-- Obtain information about the Windows NT Server and the instance associated with the specified SQL Server instanceSELECT @ serverproperty_servername = CONVERT (varchar (100), SERVERPROPERTY ('servername '))-- Returns the name of the l
Js|window System Environment:
1, operating system: Windows 2000
This example uses the software to download the address:
1, J2SDK1_3_0-WIN.EXE[29.4MB]
Http://java.sun.com/products/jdk/1.2/
2, JAKARTA-TOMCAT-4.0-B3.ZIP[5.0MB]
http://jakarta.apache.org/builds/tomcat/release/v4.0/
Installation method:
First, install the JDK
The first step is to install J2sdk1_3_0-win.exe using the default configuration
The d
server| Data | database
One, data file type:
Each SQL Server 2000 database has a master data file that can have multiple secondary data files, which can only be used by the database.
Second, the data file name:
Each data file is a stand-alone operating system file. The main data file is usually a file suffix with. mdf (this suffix is not required, but is usefu
instances of SQL Server on the network. This way, others cannot use 1434来 to detect your TCP/IP port (except with Port Scan).
7. Modify the port used by TCP/IP
On the basis of the previous configuration, change the original default port 1433. Select the properties of the TCP/IP protocol in the network configuration in the instance properties to change the default port used by TCP/IP to a different port.
9. Reject probes from 1434 ports
B
What to consider before you outline removing Microsoft SQL Server 2000
To delete SQL Server
To delete a specific instance of SQL Server
Remove all known instances of SQL Server
Remove the default instance of SQL Server
To del
Regedit.exe ----- Registry
Win chat ------ XP built-in LAN chat
Progman ----- Program Manager
Winmsd ------ system information
Perfmon. msc ----- computer performance monitoring program
Winver ------ check the Windows version
SFC/scannow ------ scan for errors and restore
Taskmgr ------ Task Manager [2000/XP/2003
Write ------ WordPad
Wmimgmt. msc ------ open the management architecture [WMI]
Wupdmgr ------
Before you create a SQL Server 2000 failover cluster, you must configure Microsoft Cluster Service (MSCS) and use the Cluster Administrator in Microsoft Windows NT4.0 or Windows 2000 to create at least one cluster disk resource. Before running SQL
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.