Installation of Windows Server2003
1, the smallest 2 partitions, the partition format is formatted with NTFS
2. Install 2003 systems in the case of disconnected network
3, install IIS, install only the necessary IIS components. (Disable unwanted FTP and SMTP services, for example)
By default, the IIS service is not installed, select Application Server in the Add/Remove Win component, and then click Details.
Double-click Internet Information Services
Before the whole CentOS, the whole Ubuntu only found that Ubuntu is much simpler ~ ~ Do not know how to compare performance.Take Ubtuntu 14.04 as an example to record the construction process.One, SSH serverThe first thing is of course ssh, the default after installation Vi/etc/ssh/sshd_config, modify the configuration file.Modify/etc/host.allowsshd:192.168.1. , 192.168.0. : AllowModify/etc/host.denySshd:allSecond, system updatesUpdate Apt-get Firstsudo apt-get updatesudo apt-get upgradeRe-updat
Article Title: Secure and Efficient Web mail server in Linux. Linux is a technology channel of the IT lab in China. Includes desktop applications, Linux system management, kernel research, embedded systems, open source, and other basic classification services or technologies that use web browsers to send and receive em
modified.Click the new option at the bottom right and we'll see the interface in Figure four, check the second item, click OK At this time we have entered the rules of the interface, the specific set up method, please refer to figure Five. The E:\wwwroot in the diagram is our web site directory,E:\wwwroot**.asp means to prohibit the creation, modification, and deletion of any ASP-formatted files in all directories in the E:\wwwroot folder.So our goal
-name ‘*.old*’Delete these files by using the-delete option of the Find command.10, limit the Nginx connection outgoingHackers will use tools such as wget to download your server's local files. Use Iptables to block outgoing connections from Nginx users. The Ipt_owner module attempts to match the creator of the locally generated packet. In the example below, only user users are allowed to use the 80 connection outside.# /sbin/iptables -A OUTPUT -o eth0 -m owner –uid-owner vivek -p tcp –dport 80
/nginx/html-user Nginx
Make sure you have more ownership of root or other users, a typical permission setting
/usr/local/nginx/html/
Ls-l/usr/local/nginx/html/
Example output:
-rw-r–r–1 root root 925 Jan 3 00:50 error4xx.html
-rw-r–r–1 root root, Jan 3 10:00am error5xx.html
-rw-r–r–1 root root 134 Jan 3 00:52 index.html
To delete a backup file created by vi or another text editor:
# Find/nginx-name '.? * '-not-name ht*-or-name ' *~ '-or-name
Web|web Service |web Server | security
Update! A system that is not updated with the latest security patches will soon be called the attacker's target.
After you have completed all the work required to configure your security system, remember that CGI scripts will be the biggest security risk. Most successful attacks
Web|web Service |web Server | security
The Web server is the most exposed server on the Internet. In order for the customer/target user group to access the information provided, the
The common methods of server security setting for Linux system and the security optimization of server are introduced in detail to the security settings of Novice Linux system, security is no trivial matter, as a full-time system administrator, to build a secure Linux system is a basic quality of administrators, The following 15 are the Sinesafe for customers to
apache|server|web| Security Preface: In the current internet age, the home page has become a corporate image and display the world of an important means, the configuration of a strong and secure Web server is particularly important. Apache is one of the most widely used prod
Q: I need to put the web server into DMZ, and the server needs to access the data in the network attached storage NAS box on the Intranet. Is there any best practices for building a secure DMZ web server?
A: This is a good questi
core of the server. We need to make sure that no one can access unauthorized data or change the page. For this purpose, the page must be specially protected and then given the Apache secure configuration.
All pages must be managed by the site administrator and are locally protected for everyone except him. The Web server
You may have attempted to access this web site from a secure browser on the server. Please enable the script and reload this page. I logged in to the SharePoint2010 server using the Domain Admin group's account, and when I opened the SharePoint home page, I found the following error message: "You may have attempted t
The security of Win2003 Server is indeed greatly improved compared with that of Win2K, but is it really safe to use Win2003 Server as a Server? How can we create a secure personal Web server? The following is a brief introduction.
★ Welcome to The Guardian God · V Classroom, website address: http://v.huweishen.com★ Guardian God · V Classroom is a Web site dedicated to providing server instructional video for the Guardian God, updated weekly video.★ This section we will lead you: Manually create a secure site• Each site is set up with an independent IIS anonymous account, which prevents cro
★ Welcome to The Guardian God · V Classroom, website address: http://v.huweishen.com★ Guardian God · V Classroom is a Web site dedicated to providing server instructional video for the Guardian God, updated weekly video.★ This section we will lead you: Manually create a secure site• Each site is set up with an independent IIS anonymous account, which prevents cro
The following articles are all rights reserved for extraterrestrial technology,
A small number of users as soon as the site was hacked, immediately considered to be caused by an extraterrestrial platform. This is a misconception.
Because if the customer's website code has problems, the platform outside the star can not be solved, who can not help this user. This is because hackers use the user's site vulnerabilities, using legitimate code to modify the user's
, and then run them directly through the query analyzer. For the first time, I did not succeed, if the error message shows that you do not have the user permission, re-view the SQL script and replace all the original usernames with DBO, I want to add users defined in SQL scripts to schemas through the Godaddy SQL Server Web Admin management background, but I did
script directly through the query analyzer. For the first time, I did not succeed, if the error message shows that you do not have the user permission, re-view the SQL script and replace all the original usernames with DBO, I want to add users defined in SQL scripts to schemas through the Godaddy SQL Server Web Admin management background, but I did not try this
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.