Connection Sharing (firewall)
Manual
PolicyAgent
IPsec Policy proxy (IPSec Service)
Automatic
LicenseService
License Record Service
Automatic
Dmserver
Logical Disk Manager
Automatic
Dmadmin
Logical Disk Manager Management Service
Manual
Messenger Service
Messenger Service
Automatic
Mspadmin
Microsoft Proxy Server Management
Automatic
Wspsrv
Microsoft Winsock Proxy Service
Automatic
Type2 message: the proxy receives the client containing type1The message returned during the message request is placed in proxy-authentication after the base64 scrambling code. The following describes its structure.
0-7 bytes: Char Protocol [8]Indicates that it belongs to the NtLmSsp protocol, and the bitwise 'n', 't', 'l', 'M', 's', 's', 'P', '/0'
8-11 bytes unsigned int type0x02000000 (little-Endian mode), that is, 2, indicating t
original level 5
Multi-user.target is equivalent to the original level 3
Rescue.tar get is equivalent to level 1 single-user mode and does not start the service. However, the difference is that a password is required for access.
Powerof.tar get is equivalent to the original level 0
Reboot.tar get is equivalent to level 6
Emergency.tar get rescue, file system fault
Rd. break
In the past, we can define that some services are automatically started at three levels, but not at five levels.
Now grap
. conf, and add winbind to the end.
passwd: files winbind group: files winbind
8. Modify the squid configuration file. To perform group verification, you also need to add a group named Internet on the domain controller and add corresponding personnel.
auth_param ntlm program /usr/bin/ntlm_auth --helper-protocol=squid-2.5-ntlmssp --require-membership-of=TEST.LOCAL\\internet auth_param ntlm children 5 auth_param basic program /usr/bin/ntlm_auth --helper
Remote Desktop Sharing allows authorized users to remotely access this computer using NetMeeting across enterprise intranets. If this service is disabled, the remote desktop service is unavailable. If this service is disabled, any service dependent on it cannot be started.
SC config mnmsrvc start = demand
Rem Network Connections Manages objects in the "Network and dial-up connections" folder, where you can view LAN and remote connections.
SC config netman start = demand
Rem Network Loca
Type3 message: the client receives the proxy's 407 containing type2The message returned during the message request is placed in proxy-authentication after the base64 scrambling code. The following describes its structure.
0-7 bytes: Char Protocol [8]Indicates that it belongs to the NtLmSsp protocol, and the bitwise 'n', 't', 'l', 'M', 's', 's', 'P', '/0'
8-11 bytes unsigned int type0x03000000 (little-Endian mode, that is, 0x00000003)
password, see the server-side shared directory name and the protocol used and other information"#smbclient//server6.example.com/smbshare-u HXL "Enter the password, log into the/smbshare directory of your lock to share, you can view information of LS."3. Manually mount the CIFS share#mount-O USERNAME=HXL//SERVER6.EXAMPLE.COM/SMBSHARE/MNT/HXL4. Permanently mount CIFS sharesAdd the following line to the/etc/fstab:SERVER6.EXAMPLE.COM/SMBSHARE/MNT/HXL CIFS credentials=/root/userpasswd 0 0Create/root
Executable service descriptive name (service name)
Certsvc.exe certificate services (certsvc)
Cisvc.exe indexing service (cisvc)
Clipsrv.exe clipbook (clipsrv)
Dfssvc.exe distributed file system (dfs)
Dmadmin.exe logical disk manager administrative service (dmadmin)
Dns.exe dns server (dns)
Faxsvc.exe fax service (fax)
Grovel.exe single instance storage groveler (groveler)
Inetinfo.exe iis admin service (iisadmin)
Ftp publishing service (msftpsvc)
Network news transfer protocol (nntpsvc)
Simple
; determines whether authorization is required to connect to the server. determines whether the client needs to send a user and pass pair before being allowed to issue other commands."Userlist" = ""
The above notes are clearly written about the settings here, msdn address: http://msdn2.microsoft.com/en-us/library/ms901310.aspx
After compiled NK is run, it cannot be accessed through FTP. Because we have not added users to the FTP server, it is a bit difficult to add users. You need to write some
base64 encoded. "NTLMSSP" indicates that the request is verified by NTLM, and the "XXXXXXXX" section after it is binary data, telling the server, the client has now selected NTLM verification. The server is requested to send a question code to the client.
1.2.
Question code returned by the server
The server adds the Authorization: Negotiate header to the header of the http response that returns unauthenticated access. The content is:
Authorization: N
1. Install the latest version of the JDK (as a Jenkins operating environment)# mount-t CIFS//192.168.8.1/share/mnt-o USERNAME=SHARE,PASSWORD=SHARE,NOUNIX,SEC=NTLMSSPWhere NOUNIX,SEC=NTLMSSP two parameters is because I have a shared folder of OS X# cd/mnt/# RPM-IVH jdk-8u74-linux-x64.rpm2. Install the latest version of Git# yum Install curl-devel expat-devel gettext-devel openssl-devel zlib-devel gcc perl-extutils-makemaker-y# wget https://www.kernel.o
= Test//This indicates that the normal user will be the root of the upload download, deleteWrite list = test//writable in the user listSamba Multi-user mount#mount-T Cifs-o username=test,password=123456//172.25.254.164/hello/mnt#df-HSettings that are automatically hung#vim/etc/fstab172.25.254.164/hello/mnt CIFS defaults,username=test,password=123456 0 0#注意这样不 * * * Full172.25.254.164/hello/mnt CIFS credentials=/root/userpasswd 0 0#vim/root/userpasswdUser=testpass=123456[SMB Multi-user Mount]Ins
)/Internet Connection Sharing (ICS)
Recommendation: For mobile Office users, start.
14.NT LM Security Support Provider
NTLMSSP (NT LM security Support provider service). Provides a security mechanism for Remote Procedure call (RPC) programs that use transport protocols rather than named pipes. The service process is named Lsass.exe.
Dependencies: Telnet
Recommendation: If you do not use the Message Queuing or Telnet Server service, stop.
15.QoS RSVP
R
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.