Discover how to change google security settings, include the articles, news, trends, analysis and practical advice about how to change google security settings on alibabacloud.com
import policies.
1. Security log settings: Because the security log is an important means of recording a system, you can view some of the running state of the system through the log, while the default installation of Windows 2000 does not open any security audits, so you need to open the appropriate audit in the loca
7 has improved significantly, and the distinction between illegal operations and legitimate operations is much more intelligent, And we can according to the actual security needs to control the UAC security level freely, strives for the operation efficiency and the security performance two not to be mistaken. In order to improve the level of
As Web servers are increasingly targeted by hackers and worms, IIS has become the primary concern of Microsoft's trusted computing program. Therefore, IIS 6.0 is completely redesigned to achieve default security and design security. This article describes how IIS 6.0 makes security changes in its default settings and d
, maximum download speed (kb/seconds)" option in the general. We generally do not fill out the default, we recommend that users set a specific number to limit this speed. Also, it is a good idea to set a specific value on the option "Idle timeout, task timeout, maximum number of users". Generally, the default of 10 minutes is sufficient (see Figure 2).
3. Overflow prevention
Recently found no software caused by the buffer overflow vulnerability, but advised users to pay attention to
exist or is opened.
Wireless Network Security Settings-monitoring network intruders
Users should always monitor network activities and ensure that they can track their trends. The more users, especially administrators, learn about malicious hacker activities, the easier they will find coping strategies. Network administrators should collect logs about scanning and access attempts, and use a large number of
, and then set the passwords of these accounts to N, for example, "welcome", "iloveyou", "letmein", or the user name is the same. Such an account should require the user to change to a complex password when logging on to the account first, but also pay attention to changing the password frequently. When IRC discussed this issue with people a few days ago, we defined a password that could not be cracked during the
Delete the virtual directory of the default established site, stop the default Web site, delete the corresponding file directory c:inetpub, configure the public settings for all sites, and set up the relevant number of connection limits, bandwidth settings, and other settings such as performance settings. Configures ap
Guest account and change the name and description, then enter a complex password2, the system administrator account is best less built, change the default Administrator account name (Administrator) and description, the password is best to use the number of small letters plus the number of the upper file key combination, the length of the best not less than 10 bits3, create a new trap account named Administ
support the IPSec protocol, and there is almost no need to change the existing network infrastructure. This is precisely why the IPSec protocol ensures the security settings of vrouters for various applications, such as remote logon, client, server, email, file transmission, and Web access.
Firewall protection technology: vrouters using the firewall function mod
. User passwords are the most basic starting point for Linux Security. many users use simple 'password', which opens the door to intruders, although theoretically there is no uncertain user password, it can be used as long as there is enough time and resources. A good user password is a string of characters that can only be easily remembered and understood by himself, and should never be written anywhere.
5./etc/exports file. If you use the NFS networ
First, pay attention to AP login password
For the network master, it is not difficult to make some wireless security settings, but for the vast majority of users, it is not very understanding of these settings, so we start from the basics. First of all, to ensure your wireless LAN security, you must
antenna close to the window because glass cannot block wireless signals. The ideal position of the antenna is the center of the target coverage area, and the signal leaked to the antenna is as few as possible. However, full control of wireless signals is almost impossible, so other measures need to be taken at the same time to ensure network security.
Wireless Network Security
First, perform one of the steps in these steps:
if
execute
You are using a workstation or server that is joined to a domain, you can repair the Group Policy object security settings
on the File menu, click Add/Remove Snap-in.
in Add/Remove Snap-in, click Add, and then in Add Standalone snap-in, double-click "Group Policy."
configured (hosted, leased, or leased).
The skills of mass file copying and backup-mass file service techniques, with permission file copying (permissions for individual files) skills.
Modify Telnet 3389 Port-as we all know, remote Terminal Services is based on port 3389. Intruders usually scan the host open ports first, and once they are open to port 3389, the next step is to invade, so we just need to modify the default port to avoid the eyes and ears of most intruders.
Five tips for remotely
IIS settings:
Delete the virtual directory of the default site, stop the default web site, delete the corresponding file directory c: inetpub, configure public settings for all sites, and set the connection limit, bandwidth settings, Performance Settings, and other settings.
-displaylastusername", change the REG_SZ key value to 1.Password security settings1, the use of security codeSome corporate administrators often create accounts with the company name, computer name, and then set the password too simple, such as "Welcome" and so on. Therefore, pay attention to the complexity of the password, but also remember to
has nothing to do with other users. Implicit permission is the permission granted to the group account, that is, the permissions granted to the group when the user joins the group. If a user has both of the preceding permissions, when the user accesses a database with security settings, the permissions of the user are the intersection of the two permissions.In an Access database, you can only set the permi
prompt, and click OK ". After this setting, when you use IE to browse the Web page, it can effectively avoid malicious code attacks on the malicious web page.
3. Block the hacker's "backdoor"
As the saying goes, "no wind and no waves", since hackers can access it, it means that the system must have a "backdoor" for them. As long as the backdoor is blocked and hackers have nowhere to start, there will be no worries!
1. Delete unnecessary protocols
Generally, only the TCP/IP protocol is enough
Network settings and security issues are a common problem. How can we improve network security performance while ensuring effective network settings? The following is a detailed introduction.
Wired networks have always been a frequent network type for home and enterprise users. However, with the popularity of wireless
Firewall also known as the Wall, is a network between the internal network and the external network security system, can prevent the virus intrusion. A bit Win7 system users want to change some of the firewall settings, the situation can not be changed, the system error "0x80074200", how to do? The following small series to tell you two solutions Win7 cannot
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.