Use the following 10 steps to protect IIS:
1. For IIS applicationsProgramAnd data to install an NTFS device. If possible, do not allow iuser (or any other anonymous user name) to access any other device. If the application fails because the anonymous user cannot access the program on other devices, use the Filemon of sysinternals to check which file cannot be accessed, and transfer the program to the IIS device. If you cannot do this, iuser is allow
Story: Before the day before yesterday, IIS still works normally. after one night, the HTTP 401.3 Access Denied error will be returned when you access the folder again, apparently because the permissions of the Web Folder have been changed, in addition, many friends on the Internet also said this), so they checked the ACL of each folder related to IIS, but found that these folder settings are correct. we are worried that the permission settings for a file are incorrect, but we cannot determine w
For details about jstat, refer:
Http://docs.oracle.com/javase/1.5.0/docs/tooldocs/share/jstat.html
Download a copy of jvmstat3.0, which can be found on Google.
1) create a policy file under c: \: jstatd. All. Policy
Grant codebase "file :$ {java. Home}/../lib/tools. Jar" {permissionjava. Security. allpermission ;};
2) Run (take a 64-bit machine as an example) and download the sysinternals toolkit in advance.
Export xec-s jstatd-J-Djava.secur
Set QTDynamic Link generation of EXE and dependent DLL packaging method
Original article: Workshop.
The EXE file generated by the QT static compilation link does not need to rely on a bunch of DLL files of the seven aunts and eight aunts. It can be run independently and released conveniently. However, the vast majority of applications use open-source QT versions. If static links are used, there will be some restrictions. Is there a way to enjoy the convenience of static compilation without the
Author: Chen Xi
Date: 13:05:34
Environment: [win7 32-bit OS intel I3 support 64-bit command vs2010; wrk-v1.2; source insight]
Reprinted please indicate the source
Q1: A simple thread example for Windows.
A: Save As thread_test.c as follows:
#include
Compile thread_test.exe and run:
We can see that the thread ID and process ID are obtained. We can also view the thread ID in the task manager:
We can also see that the PID is indeed output, and the number of threads is 1, which indicates that th
Familiar with Unix/linux should know that unix/linux with LN to establish a hard link, ln-s to establish a soft link (symbolic link).The difference between hard links and symbolic linksThere are also linker characters under NTFS: https://docs.microsoft.com/zh-cn/sysinternals/downloads/junctionJunction.exe similar to the Linkd.exe tool, you can only add, view, and delete directories.fsutil hardlink Create Hard Links: add only to Fileshttps://support.m
1. Use paping to test the connectivity Linux platform:wget http://www.updateweb.cn/softwares/paping_1.5.5_x86-64_linux.tar.gzOrwget https://zhangtaostorage.blob.core.chinacloudapi.cn/share/paping_1.5.5_x86-64_linux.tar.gzThis is a compressed package, decompression method tar zvxf paping_1.5.5_x86-64_linux.tar.gzHow to use./paping–p 80-c www.xxx.com (the example command is a connectivity test for 500-time Destination IP 80 ports)2, use psping to test the connectivity win platform:Psping:http://ww
21.Linux process Explorer-linuxLinux Process Explorer is a graphical browsing tool for Linux. It can display different process information, such as the number of processes, TCP/IP connectivity, and performance metrics for each process. As a replacement for Linux under Windows procexp , it was developed by Sysinternals , with the goal of being more than top and PS Provide a better user experience.See the Linux Process Explorer article for more informa
lists current system open filesn lsof-p PIDN http://blog.csdn.net/guoguo1980/article/details/2324454Øfusern is used to display all process information that is using the specified file, file system, or socketsN http://www.cnblogs.com/yuboyue/archive/2011/07/18/2109838.htmlView Netstat SS for network informationHttp://stackoverflow.com/questions/11763376/difference-between-netstat-and-ss-in-linuxhttp://blog.163.com/[email protected]/blog/static/132229655201222502510543/ProcfsWindows has the
number, the return value has a blank text indent for the specified number at each level. If space is greater than 10 o'clock, the text indents 10 blanks. if space is a non-empty string, such as "\ T", the return value text is indented with the character of the string at each level. if space is a string greater than 10 characters, the first 10 characters are used. return Value: The text string that the JSON contains. Example:var New = "Leinov"= "Famle"= "Chaoyang"; var jsonstudent = json.string
Open the Registry Editor window.
4
5 Select access to Directory
Hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun
Hkey_local_machinesoftwarewow6432nodemicrosoftwindowscurrentversionrun
6
7
8 Enter the location indicated, keep the most basic startup items, such as input method, system drive, etc. other items to be deleted.
End
Using System protection software to realize
1 The current general Butler software has this function, to QQ security
://chenccc.nease.net/ProcessManage.exe
Download page: http://www.newhua.com.cn/soft/25720.htm
Launch Item viewing tool:
QUOTE:
Autoruns V8.31
Description: Sysinternals company produced, can view, delete the registry and Win.ini files and other places of the self-starter project. If you suspect a Trojan or virus, or if the system starts too slowly, use this tool to look at the startup item.
The first time you run, the font
language of the network era must have strong network processing ability, PowerShell is such a language. Microsoft's products generally have a very strong security view, so PowerShell has a lot of restrictions on network processing. For example, PowerShell can not display the interface on the remote machine, even the interface of the program, can only run in the background. Bear Paws and fish can not be both, but we always find some solutions. For example, the above problems can be achieved with
process priority (see the thread priority description of the multithreaded series in C #).
4. Other
There are two more points to note:
(1) Thread safety: The timer runs on a stand-alone thread, and its exposed members should implement thread safety, otherwise a problem may arise when the timer runs.(2) Timely release of resources: Multimedia timer, wait handle, thread, etc. these are system resources, should be released/destroyed in time when they do not need them.How do I view system timer
address: http://technet.microsoft.com/en-us/sysinternals/ Bb896649.aspx, look at the following methods:
If you do not modify this value to install a variety of services may have unexpected problems, win2003 after the system has been unable to use the NewSID generation, need to be rebuilt with the system's own Sysprep tool. The default path for the tool is C:windowssystem32sysprepsysprep.exe, which defaults to a graphical configuration interface (s
00", as shown in Figure 2.
Figure 2
(4) Important: Don't forget to restart the computer!
(5) After restarting, create a new account with the same name admin, its SID should be exactly the same as before. If you don't believe it, you can test it with tools like GetSID or PsGetSid.
2. "Hack" EFS
The next method is very simple, with the new Admin account login system, arbitrarily encrypt a file, and then log off, log in with the Administrator account system, the original reserved configuratio
also delete the original folder. To delete a mapping also use Shjunction (description as Write)There is no problem with Microsoft's junction (measured)。 If the image destination in the source folder is inside the source folder, the result is a dead loop. Oh, like below.Tools ListSince the operation is very simple, it is determined that the source folder and the mapping point are then applied,Do not introduce, just list out the people will use it.Shjunc Small mapping tool with interface (network
get the dump file of the current process in Task Manager, process-Create dump file, I use the following program to generate the dump file:Procdump: https://technet.microsoft.com/en-us/sysinternals/dd996900.aspxFor the use of the Prodump program, you can refer to the following 2 blog posts:High CPU Dump Collection tool-procdump how to use Introduce a handy tool to grab the dump-procdump On the command line, run this program: Procdump-ma MydotNetApp.ex
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.