To change your system to a copper wall, close these ports,
Mainly include TCP 135, 139, 445, 593, 1025, and
UDP ports 135, 137, 138, and 445,
Some popular Backdoor Ports (such as TCP 2745, 3127, and 6129) and remote service access port 3389. The
Source: hacker Base
Since rising to version 2005, computers often appear: rising monitoring vulnerability attack MS-4011 Exploit and blster Rpc Exploit. The window will be closed in 16 seconds. The solution is as follows.
The most direct method is
The SNMP Service, also known as the Simple Network Management Protocol, is proposed to solve the router management problem on the Internet. It acts as a proxy in the Windows operating system and collects information that can be reported to the SNMP
How to prevent local users from using fsockopen for DDOS attacks in the IIS environment
/*
From: http://bbs.it-home.org
Date: 2013/2/17
*/
$ Fp = fsockopen ("udp: // $ ip", $ rand, $ errno, $
CausePhp script source code:Copy codeThe Code is as follows:$ Fp = fsockopen ("udp: // $ ip", $ rand, $ errno, $ errstr, 5 );If ($ fp ){Fwrite ($ fp, $ out );Fclose ($ fp ); The fsockopen function in the php script sends a large number of packets to
Reason
PHP script part of the source code:
Copy Code code as follows:
$fp = Fsockopen ("udp://$ip", $rand, $errno, $ERRSTR, 5);
if ($fp) {
Fwrite ($fp, $out);
Fclose ($FP);
PHP script in the Fsockopen function, to the
Now buy a friend of the server will find that a little new point of the hard drive has not supported the WIN2003 system, mainly to drive people do not give you, coupled with Microsoft's 2003 security also does not provide support, it will be
135-Port Normally we're not going to use it, so it's better to build justice everyone off.
It is believed that many Windows 2000 and Windows XP users had a "shockwave" virus last year that exploited RPC vulnerabilities to attack computers. RPC
Windows has many ports that are open by default, and Internet viruses and hackers can connect to your computer via these ports when you surf the Internet.
In order to make your system a fortress, you should close these ports, mainly: TCP 135, 139, 4
How to prevent the computer from being hacked? The following are some simple knowledge to prevent the computer from being hacked, hoping to help.
First, the installation of security protection software: such as QQ computer Butler. Second, the
Our firewall is not often someone to attack your XXX port? If you turn off the corresponding useless port, it's okay?In general, we use a number of powerful anti-black software and firewalls to ensure our system security, this article is an easy way
In order for your system to become an impregnable fortress, you should close these ports,
The main are: TCP 135, 139, 445, 593, 1025 ports and
UDP 135, 137, 138, 445 ports,
Some popular virus backdoor ports (such as TCP 2745, 3127, 6129 ports), and
For the security of Windows system ports, open only the ports that are needed and turn off unwanted system ports to maximize the likelihood of being attacked. This article describes how to turn off some of the system's ports by using Group Policy
Nowadays, viruses and Trojans are attacked in a variety of ways, especially computer ports, which are the key part of the virus. Have you ever encountered such a situation, when we installed a firewall such as Skynet to access the Internet, we only
1. What is introspection? Introspection is self-evaluation, self-reflection, self-criticism, self-control and self-education. It is a self-moral cultivation method proposed by Confucius. He said: "You can see your inspector and introspection ." (The
How to disable port 445 and port 445
Some ports in the system are usually unavailable but dangerous, such as ports 139, 135, and 445. windows is open by default. In this case, you can manually close these ports! Next we will introduce a windows
(1) features of Route Maps:
Route Maps is similar to access lists. The difference is that Route Maps can change some attributes of Packets/Routes.
Purpose:
Route Maps is mainly used for Redistribution, Policy Routing, and BGP
How to disable ports 135, 139, 445, 593, and 1025 in TCP (record), 5931025
Procedure: Close the port to prevent access to these ports by network viruses, so as to ensure computer security and reduce the impact of viruses on Internet access
Document directory
Servlet definition:
Definition of servlet-mapping:
Definition of session-config:
Definition of mime-mapping:
Finally, the definition of Welcom-file-list is as follows:
Event listener:
Filter:
Filter Lifecycle
First, the
1. On the Start menu, select Run, enter "Gpedit.msc" and return, and open the local Group Policy Editor. Expand Computer Configuration---Windows Settings---Security settings---IP Security policy, in the local computer
2. To
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.