Quick Search


Tibetan singing bowl music,sound healing, remove negative energy.

528hz solfreggio music -  Attract Wealth and Abundance, Manifest Money and Increase Luck



 
Your forum announcement here!

  Free Advertising Forums | Free Advertising Board | Post Free Ads Forum | Free Advertising Forums Directory | Best Free Advertising Methods | Advertising Forums > Other Methods of FREE Advertising > Guest Books Directory

Guest Books Directory Here is a great way to get some inbound links to your site, and message heard by people who also post and read these books. (Tip: Dont use your real email address on them)

Reply
 
Thread Tools Search this Thread Display Modes
Old 05-27-2011, 11:28 AM   #1
bolsooi19
 
Posts: n/a
Default Microsoft Office 2010 Professional Practical knowl

Presently, WIN2000 SERVER is more popular server running systems, however, to the secure configuration of Microsoft's operating program, is not an simple and easy job. This article attempts to win2000 SERVER safety configuration was talked about.

Initial, customize their WIN2000 SERVER:

one. Version of selection: Win2000 many different languages, for us, you can pick English or Simplified Chinese edition, I strongly recommend: The language does not grow to be a barrier, make sure to use the English model. You know, Microsoft's product is identified for Bug & Patch, far a lot more than the Chinese version of the Bug in English, while the patch will be delayed at least half of the general (ie, generally after Microsoft announced the vulnerability of your machine is also there will be two weeks in the unprotected state)

2. Custom components:

Win2000 installed by default in some common components, but it really is the default installation is extremely dangerous (Mitre Nico said that he can enter any one installed by default server, although I hesitate to say so, but if your host is the default installation of Win2000 SERVER, I can tell you, you're dead)

you should know exactly what services you need, and only You really need to install the service, according to safety principles, at least the minimum service + permissions = maximum protection.

typical WEB servers require a minimum component choice is: only install IIS, Com Files, IIS Snap-In, WWW Server components. If you really need to install additional components, please carefully, especially: Indexing Service, FrontPage 2000 Server Extensions, Internet Service Manager (HTML) that several of the risk services.

3. Management application of option:

choosing a good remote management software is a pretty important thing, not only safety but also of the application needs.

Win2000 the Terminal Service is based about the RDP (Remote Desktop Protocol) remote control software, he's fast, simple to operate, far more suitable for routine operation.

Still, Terminal Service also has its shortcomings, because it uses the virtual desktop, along with Microsoft's programming is not strict, when you install the software using Terminal Service or restart the server, etc. interacting with the real Desktop The operation, often there will be enough to create misunderstandings of phenomena, such as: re-using the Terminal Service server from Microsoft's Certification (Compaq, IBM, etc.) might be shut down.

So, for safety reasons, I suggest you go with a remote control software as an aid, and Terminal Service complementarity, as PcAnyWhere is a good choice.

Second, properly installed WIN2000 SERVER:

1. The distribution of partition and logical drive, there are some friends in order to save, just the hard drive into a logical drive, all the software installed in the C drive, this is extremely good, it is actually recommended to establish at least two partitions, one system partition, an application partition, this is because there is often a leak of Microsoft's IIS source / overflow vulnerability, if the system and IIS on the same drive, the file will cause the system to leak or even a remote intruder access to ADMIN.

recommended safety configuration is to create three logical drives, the initial is greater than 2G, and important to install the system log file, the second put IIS, the third one FTP, IIS, or FTP either way out of the safety holes will not directly affect the program directory and program files.

to know, IIS and FTP is the external services are relatively easy problems. The separation of the IIS and FTP upload the main system is to prevent intruders to run from IIS. (This could lead to application developers and editors of distress, who cares, anyway you're an administrator)

2. The order of installation options:

Do not think: What is the order important? If installed, how to load you can actually.

wrong! win2000 installed in a certain order of a few to note:

Initial of all, when the access network: Win2000 there is a flaw in the installation, you enter the Administrator password, the system's built ADMIN $ shared, but did not use the password you just to protect it, this situation until you start again after this period, anyone can enter through the ADMIN $ on your machine; the same time, as long as the installation is complete, the types of service will run automatically, and when the server is covered with loopholes, quite simple and easy to enter, therefore, fully installed and configured win2000 SERVER, be sure not to host access network.

Second, the patch installation: the installation of the patch should be installed after all the applications, because patches often have to replace / modify certain system files, if you install the patch before installing the application could cause the patch can not be play the desired effect, such as: IIS's HotFix requires that each change the configuration of IIS to become installed on

Third, safety configuration WIN2000 SERVER:

even if installed properly WIN2000 SERVER, there are nonetheless quite a few loopholes in the program, but also the need for further detailed configuration.

one. Port:

port is connected for the computer and the logic of the external network interface, is the first barrier the computer, the port is configured properly or not directly affect the safety of the host, in general, only open the ports you will need to use safer approach is to configure the network card properties -TCP/IP- Advanced - Options -TCP/IP screening enabled TCP / IP filtering, port filtering, but for win2000, there is a bad feature: only the provisions of What ports to open, can not restrict which ports closed, so that a large quantity of ports that require users to open additional painful.

2. IIS:

IIS is Microsoft's one of the largest component in the vulnerability, an average of two to three months out of a hole should, and Microsoft's IIS is installed by default and can not compliment, so the configuration of IIS is our focus, it is now together with me:

First, the C disk that what Inetpub directory completely deleted, in the D drive to build a Inetpub (do not worry if you may use the default directory name, a name change, but they have to remember that) in the IIS Manager home directory will point to D: Inetpub;

secondly, that what the default IIS installation scripts and other virtual directory Yigai delete (source of evil ah, forget a href =

3: Application Configuration:

in the IIS Manager to delete any unwanted outside the map must be, must refer towards the ASP, ASA, and you really need to make use of other types of files , for example, you use stml, etc. (use the server side include), is truly 90% of the host with the above two maps enough, the rest of the map almost every story has a sad: htw, htr, idq, ida ... ... want to know these stories? to check it before the vulnerability list.

what? can not find where to delete?

in the IIS Manager, right-click the host -> Properties -> WWW Services Edit -> Home Directory Configuration -> application mapping, and then it started to delete one by one (which doesn't decide on all, hehe). Then, in just the bookmarks window application debugging error message within the script to send text ( ASP error unless you want to know your plan when the user / network / database structure) error text writing? whatever you like, own choice. Click OK to exit do not forget to set the virtual site inherit your property.

order to deal with the growing number of cgi vulnerability scanners, there is a little trick to refer towards the IIS will HTTP404 Object Not Found error page through the URL to redirect to a custom HTM files, can present, most CGI vulnerability scanner failure. It is actually really quite relatively easy, most of the time of writing CGI scanner in order to facilitate, through the HTTP code to view the back page to determine whether vulnerabilities exist, for example, are generally well-known vulnerabilities by taking IDQ 1. idq to test, if the return HTTP200, to think that there is this vulnerability, whereas if the return HTTP404 to think not, if you will HTTP404 error message through the URL redirected to HTTP404.htm files, then scan all vulnerabilities, whether it exists or not will be returned HTTP200, 90% of the CGI vulnerability scanner that what you have, the result will conceal your true vulnerability, so that an intruder at a loss no place to start (instead of martial arts often stated that loopholes in the body perfect, can we say is this state?) But from a personal point of view, I think that such a solid career safety settings than the additional important tips.

Finally, to become safe, you can actually use the backup feature of IIS, the setting will be just All backup set down, so that you can always restore IIS safety configuration. Also, if you happen to be afraid of the load is too high causes the server to IIS crash at full capacity, can also open the CPU limitations in performance, for example, the maximum CPU utilization IIS limit 70%.

4. Account Protection:

Win2000 account protection is another focus, first of all, Win2000 the default installation allows any user to get the program through the air all the user accounts / share list, this originally for your convenience of LAN users to share files, but a remote user can also get your list of users and crack user password to make use of violence law. a number of of my friends know that you possibly can change the registry Local_Machine Program CurrentControlSet Control LSA-RestrictAnonymous = one to prohibit 139 null,

fact, the local security policy win2000 (if that is the domain server, domain server protection and domain protection policy) had this selection RestrictAnonymous (extra restrictions for anonymous connections) This choice has three values:

0: None. Rely on default permissions (no, depending about the default permissions)

1: Do not allow enumeration of SAM accounts and shares (not enumeration of SAM accounts and shares allowed)

2: No access without explicit anonymous permissions (without explicit anonymous permissions allow access)

0 This value is the default, what restrictions No, the remote user can see all the accounts on your machine, group information, shared directories, network transmission NetServerTransportEnum, etc., within the server for this setup is particularly dangerous.

one This value is only allowed to users of non-NULL SAM account information access and share information.

2 in this value is only supported in win2000, to note that if you use this value if your share is estimated on all finished, so I advise that you set to 1 or better. Properly, now there is no way an intruder to get a list of our customers, our account safe ... ...

Wait, at least one account password can be run This is the system built-in administrator, how do? I change change change, in Computer Management -> right click administrator user account and then change its name changed to whatever you what, as long as I remember around the line.

not No, I have changed the user name, and how people nevertheless run my administrator's password? Fortunately, my password is long enough, but this is not the answer you? ah, it must be in local or Terminal Service login screen to see , well, let's put HKEY_LOCAL_MACHINE SOFTWARE Microsoft WindowsNT CurrentVersion winlogon key in the Don't Display Last User Name string data into a one, so the system does not automatically display the last logon user name.

the server registry HKEY_LOCAL_ MACHINE SOFTWARE Microsoft WindowsNT CurrentVersion Winlogon key in the Don't Display Last User Name string data revised to 1 to hide the last login console user name.

5. Safety Log:

I encountered such a situation, a host intrusion by others, the program administrator asked me to track down the murderer, I logged into a look: safety log is empty, down, remember: Win2000 the default installation just isn't open any protection audit! then invite you for the local security policy -> audit policy, open the appropriate review, the audit recommended that:

account management success or failure

logon events success and failure

object access failure

success or failure

policy changes failed

privilege to make use of the program event success or failure

directory service access failures

account logon events audit project success and failure

small drawback is that there is no record in case you want to see it at all Mozhe; too a lot of items will not only review program resources and cause you do not have time to see, so that the significance of losing the audit.

is associated with:

strategy in the account -> Password policy settings:

password complexity requirements enabled

Minimum password length 6

Enforce password history 5

maximum age of 30 days

In the Account Policy -> Account Lockout Policy settings:

account lockout 3 times the error log



locked for 20 minutes 20 minutes
lock count reset
Similarly, Terminal Service protection log is not open by default, and we can Terminal Service Configration (remote service configuration) - permissions - Advanced to configure safety auditing, in general, as long as the record of logon, logoff events on it.

6. directory and file permissions:

to control the user's permissions within the server, but also to prevent a feasible invasion and subsequent overflow, we must be very careful to set the directory and file access permissions, NT access rights are divided into: read, compose, read and perform, modify, list directories,Microsoft Office 2010 Professional, full control. In the default case, the majority of the folder for all users (Everyone in this group) is completely open The (Full Control), you need to apply the required permissions to reset.

making access control, keep in mind the following principles:

1> limit is cumulative: If a user belongs to two groups, he had allowed these two groups of all rights;

2> permission denied permission to allow higher than (denial strategy will be executed) if a Users belong to one is denied access to a resource group, no matter the permissions of other how significantly authority to give him open, he must not access the resources. so please be particularly careful to make use of reject, any refusal might have resulted in improper The system can not function properly;

3> file permissions for that folder permissions than the high (need to explain this, right?)

4> use user groups for access control is a mature system administrator one must have good habits;

5> only permissions for the users really need, the principle of least privilege is an important guarantee for your safety;

7: Prevention of DoS:

In the registry HKLM System CurrentControlSet Services Tcpip Parameters, change the following value can help protect you against a certain intensity of DoS attacks

SynAttackProtect REG_DWORD 2

EnablePMTUDiscovery REG_DWORD 0

NoNameReleaseOnDemand REG_DWORD one

EnableDeadGWDetect REG_DWORD 0

KeepAliveTime REG_DWORD 300,000

PerformRouterDiscovery REG_DWORD 0

EnableICMPRedirects REG_DWORD 0

ICMP attacks : ICMP storm attack and fragment attack is also quite daunting NT host attack methods, in fact, particularly hassle-free methods to deal with, win2000 comes with a Routing & Remote Access tool that begun to take shape router (Microsoft really, what should do? I heard recently, to do the firewall) in this tool, we can easily define input and output packet filters, for example, setting the input code 255 ICMP dropped to that drop all ICMP packets alien.

Fourth, some of the things to note:

In fact, protection and application is contradictory in a number of cases, so you need to find a balance in which, after all, the server is for users to use and not to do OPEN HACK , if the program protection policy prevents the application of the principle that the security just isn't a good principle. Network security is a systematic project, which spans not only space, there is nevertheless time span. lots of friends (including some system administrators ) considers an the protection configuration of the host is secure, in fact, of which there is a misunderstanding: we can only say that a host in certain cases some time is safe, with the network structure changes, new vulnerabilities are discovered administrator / user operation, the host of the safety situation is changing at any time, only to protection awareness and protection system throughout the entire process to be truly safe.
  Reply With Quote

Sponsored Links
Old 05-27-2011, 11:28 AM   #2
6ssjh8odf
 
Posts: n/a
Default

Reporter captured the moment the cow turn on the lights.

correspondent Guangxi News Network reporter Jiang Wei Zhang Wen-Qin Luo / map

circulating in Nandan County, where a turn on the lights when on their own to find water to drink,tory burch sales, he will keep living Lights will turn off. September 21, the reporter of this first surprising knowledge of cattle.
latent Niuquan witnessed buffalo switch lights

9 月 21 at noon, reporters from Nanning, rode all the way to eventually finding the car more than 6 hours in the evening arrived at 9 am
cattle owners called Mo illumination, is a middle-aged men. He has just brought its own reporters across the hall when suddenly the lights in front of a room lit up. Mo laugh and said illumination, where light is the buffalo live in
reporter walked into the Mo illumination, said that the first buffalo was recently repeated on the mirror will switch lights, water buffalo, buffalo is its small cubs.
order to verify that the magic of cattle, cattle with the approval of the owner's consent, a reporter off the Niuquan in the light, and then wait patiently in the Niuquan. The beginning there was dark, but after 3 minutes, the eyes gradually adjusted to the darkness, you can vaguely see the outline of cattle.
about 20 minutes later, the buffalo slowly near the light switch cable,tory burch flats, raised head, I saw it shakes his head look everywhere to find water to drink, but the owner did not give it to prepare the water, turn on the lights after the buffalo see no water to drink and took off the light.
around 10:10 that night, turn on the lights again, looking for water buffalo, MO according to a barrel of light So carry a small amount of corn flour mixed with water in, water buffalo began to drank. Drinking water,tory burch uk, this water buffalo before the probe body, mouth and nm switch line, turn off the light.
cattle owners
illumination Mok said the cow was raised from childhood that he looked at, and already has a full 10 years in a row. Age 4 Chanzai cows, one year after birth. 5 years ago, Mo illumination wife get up on the toilet at night, often found Niuquan lights lit at night, she readily Turn the lights off. Get up the next day, she found the lights still lit Niuquan, so blame Mo cattle watering illuminated at night to feed the lights, but they categorically denied Mo illumination.
What happened in the end? Mo according to the light bulb, light and his wife had an argument happened. Later, according to a stomach Mo confused Dunshou in Niuquan in light altogether, this finding is hungry to find water buffalo to start his own lights. Mo said illumination, after a period of observation, he found that the length of time lights buffalo than the length of time lights much more. When hunger and thirst when it turn on the lights for a long time to wait for host feeding, if the owner does not ignore, it will turn off the lights themselves, but not how often, it lights continue to wait, and so forth.
found that the family had a magic lamp will switch Buffalo, MO air illumination also followed up, everyone that speak, but the listener thought he was Later the same village, a man and his bet: If the cow gave 10 yuan a light switch, but if Mo is not that real illumination, it is necessary to give 10 dollars. One evening, in a few curious witness, Buffalo is really light switch, light switch 5 times that night just to help Mo win 50 dollars illumination.
the bet, MO Buffalo home phototherapy lights will switch to the news of a sudden like wings, like the village people eight miles curious look, as well as hearts softened to call the local news media , but not a journalist is believed to be true, until September this year, China Central Television was only concerned about the news.
cubs born only one will switch lights

Mok said illumination will switch to light the cow has given birth to five head of cattle have been, but only the first head will be inherited switch lights talent. However,tory burch pumps, after selling another home, this cow got lost the ability to switch lights. After giving birth to a few head of cattle will not switch lights.
It is understood that the local price of adult buffalo five or six thousand, the highest good can be sold for more than seven thousand yuan cattle. Today,tory burch bags, many people want to buy a home that the first Mo illumination lights will switch to cows, and some even offered me one million,tory burch flip flops, but refused to sell Mok illumination. He said that the buffalo gentle personality, never hurt, work without complaint. Whether it be a switch does not have the characteristics of light, will not sell it. 3 acres of land at home thanks to this water buffalo plow harrow fields, is an indispensable good helper at home, the family will be treated as a member of the family can not let go.
9 22, an interview with a zoologist at the zoo in Nanning City, Miss Chen Yuefei. Ms Chan said that cattle are not nocturnal animals, the dark, like the human eye and visual material is unclear, it is expected to eat at night to find water to drink should also help to find the light.
for Pull the light switch will bite mouth buffalo cattle class should have extraordinary spiritual
  Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off


All times are GMT. The time now is 09:04 PM.

 

Powered by vBulletin Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Free Advertising Forums | Free Advertising Message Boards | Post Free Ads Forum