Discover k9 web protection settings, include the articles, news, trends, analysis and practical advice about k9 web protection settings on alibabacloud.com
The following are the corresponding security dog settings and attack screenshots:
Figure 1 Opening Windows short file name Vulnerability interception
Figure 2 Windows short file name Vulnerability interception screenshot
At the same time, in the website Security Dog's protection log, the user may inquire to the corresponding protecti
In the background of the Public Account administrator, click the message link that I sent. The public account introduction and other settings will be modified (bypassing csrf protection)
The public account administrator clicks the link I sent to him in the background. His profile, profile picture, privacy settings, address and other
and try to escape protection measures. With rich experience in open-source software such as Linux, these are not a problem.
All products, whether purchased or open source code, software-based or application-based, should be supported. Commercial Products are supported by suppliers. Open source provides an opportunity for value-added vendors and system integrators to integrate security knowledge. Provides continuous support for
signs of an invasion. We can generally deal with security in the following ways:1, Web software development Security A, the program has a file upload vulnerability, attackers exploit the vulnerability to upload Trojan files. B, anti-SQL injection, riot Control library, anti-cookie spoofing, anti-cross-site scripting attacks. 2, the security of the server and the security of the Web server A, the server to
" + err.getmessage () + "File:" +j+ "on line 251"; //out.println ("Error in Upload" +err.getmessage ()); //Allright=false; //return;} out.print (Wrongmessage+ "num:" +j); }3, prompt error, serialversionuid conflict.
class class Serialversionuid = 8915824483106432775Serialversionuid Detailed Description: http://www.cnblogs.com/guanghuiqq/archive/2012/07/18/2597036.htmlWorkaround:If you don't want to define it, you can also turn it off in Eclipse settings
the Web page.
We first look at the use of tracking protection function to filter the effect of advertising, a Web page before filtering the advertising situation:
After filtering and removing ads, the Web page is much cleaner:
Set method
1, click on the IE10 right corner of the gear icon, a
security options of IE to disable or prompt the running of "active script" and ActiveX.
Or set the security level to high in IE security settings. The privacy option is also set to high.
Iii. Server Security
Disable useless ports
Download patches/update operating systems
Install anti-virus software
Install firewall
If there are multiple sites on the server and each site is assigned permissions, each site cannot operate other files and directories or
Related Settings for IIS:
Delete the default established site virtual directory, stop the default Web site, delete the corresponding file directory c:inetpub, configure all the site's public settings, set the relevant number of connection limits,
Other settings such as bandwidth s
. This article takes the typical configuration in the Web System (Win2000 Server + SQL + iis5.0) as an example to focus on the system security settings of the Web server and the security policies of SQL injection.
II.
Network Security Risk Analysis and Security Technology
In general, network security refers to the protection
not expect anti-virus software to kill all Trojans, because the characteristics of the ASP Trojan Horse can be through a certain means to avoid the killing of anti-virus software.
set port protection and firewalls, delete default shares
It's all about server protection, and even if you don't have IIS on your server, these security measures are best done. This is the blind area of the arjunolic, probably
Related Settings for IIS:
Delete the virtual directory of the default established site, stop the default Web site, delete the corresponding file directory c:inetpub, configure the public settings for all sites, and set up the relevant number of connection limits, bandwidth settings, and other
IIS settings:
Delete the virtual directory of the default site, stop the default web site, delete the corresponding file directory c: inetpub, configure public settings for all sites, and set the connection limit, bandwidth settings, Performance Settings, and other
-displaylastusername", Reg_ The key value of SZ is changed to 1.8, Password security settingsA, using a secure passwordSome corporate administrators often create accounts with the company name, computer name, and then set the password too simple, such as "Welcome" and so on. Therefore, pay attention to the complexity of the password, but also remember to change the password frequently.b, set the screen protection passwordThis is a very simple and nece
modify/$HOME/.bash_logout in the user's home directory, and add the above line.
Action 23: Set up an IP that allows remote SSH
Methods: 22-s/ip-j input-i eth0-p TCP ACCEPT network segment in iptables plus rule iptables-a.
[Web aspect]
Action 24: Turn off the Apache default directory browsing
Method: Edit the httpd.conf file and clear "Indexs" for each "Directory" directive.
Action 25: Clear the server information in Apache header information
M
. This article takes the typical configuration in the WEB System (Win2000 server + SQL + IIS5.0) as an example to focus on the system security settings of the WEB server and the security policies of SQL Injection.2. Network Security Risk Analysis and Security TechnologyIn general, network security refers to the protection
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.