FileSystemObject can perform normal operations on files. You can change the name of this component by modifying the registry to prevent such Trojans.
HKEY_CLASSES_ROOT\\Scripting.FileSystemObject\\
Renamed other names, such as: changed to FileSystemObject_ChangeName
You can use this component to call this component when you call it later. BR>
Also change the clsid value
The value of the HKEY_CLASSES_ROOT\\Scripting.FileSystemObject\\CLSID\\ project
can also be deleted to prevent such Trojans from harming.
2000 Unregister this component command: RegSrv32 /u C:\\WINNT\\SYSTEM\\scrrun.dll
2003 Unregister this component command: RegSrv32 /u C:\\WINDOWS\\SYSTEM\\scrrun.dll
How do I prevent Guest users from using scrrun.dll to prevent this component from being called?
Use this command: cacls C:\\WINNT\\system32\\scrrun.dll /e /d guests
Second, prohibit the use of WScript.Shell components
WScript.Shell can Calling the system kernel to run DOS basic commands
You can change the name of this component by modifying the registry to prevent such Trojans.
HKEY_CLASSES_ROOT\\WScript.Shell\\ and HKEY_CLASSES_ROOT\\WScript.Shell.1\\
Renamed another name, such as: WScript.Shell_ChangeName or WScript.Shell.1_ChangeName
You can call this component normally when you call it later.
Also change the clsid value
HKEY_CLASSES_ROOT\\WScript.Shell\\CLSID\\Item value
The value of the HKEY_CLASSES_ROOT\\WScript.Shell.1\\CLSID\\ project
can also be removed to prevent such Trojans from harming.
Third, the use of Shell.Application component is prohibited
Shell.Application can call the system kernel to run DOS basic commands
You can rename this component by modifying the registry to prevent The hazards of such Trojans.
HKEY_CLASSES_ROOT\\Shell.Application\\
and
HKEY_CLASSES_ROOT\\Shell.Application.1\\
Renamed to another name, such as: changed to Shell .Application_ChangeName or Shell.Application.1_ChangeName
When you call this later, you can call this component normally.
Also change the clsid value
HKEY_CLASSES_ROOT\\ The value of the Shell.Application\\CLSID\\ project
The value of the HKEY_CLASSES_ROOT\\Shell.Application\\CLSID\\ project
can also be removed to prevent such Trojans from harming.
Prevent guest users from using shell32.dll to prevent this component from being called.
2000 use the command: cacls C:\\WINNT\\system32\\shell32.dll /e /d guests
2003 use the command: cacls C:\\WINDOWS\\system32\\shell32.dll /e /d guests< BR>
Note: The operation will take effect only after the WEB service is restarted.
Fourth, call Cmd.exe
Disable the Guest group user call cmd.exe
2000 use the command: cacls C:\\WINNT\\system32\\Cmd.exe /e /Dclient
2003 use the command: cacls C:\\WINDOWS\\system32\\Cmd.exe /e /d guests
The above four steps can basically prevent several popular Trojans, but most The effective method is to achieve a certain level of security for the server and program through comprehensive security settings, and it is possible to set the security level higher and prevent more illegal intrusions.
C, Serv-U to prevent privilege escalation (applicable to Serv-U6.0 the previous version, then you can directly set the password) first stopped Serv-U service
open ServUDaemon.exe
with Ultraedit
Find Ascii: LocalAdministrator and #l@$ak#.lk;0@P
Modify to other characters of equal length, ServUAdmin.exe also handles the same.
Also pay attention to the permissions of the folder where Serv-U is located. Do not let IIS anonymous users have the right to read. Otherwise, people can go through your modified files and analyze your administrator name and password.
I am a fan of web page production, a lot of code needs to be tested and modified, uploading space te
At present, there are more and more schools using Windows 2003 as a web server. However, for users w
In order to ensure the stable operation of the companys servers, it is useless to
Problem Description: How to install the memory DIMM of the R525 G2 server, how is the memory slot d
APACHE supports .htaccess method
Web.config security related configuration
Win2003 comes with a firewall to build a security line
How to set up Hyper-V virtual machine NIC?
Seven newbie skills Deadly server security maintenance
Batch modify the remote Linux server password
Teach you to assemble your own storage server
Server dual network card settings
Apache URL Redirection Avoids URL Ending Slash Issues
Add php and mysql commands to environment variables under linux system
Part of the Windows 8 system metro interface application English name
Summary of zypper command usage in SUSE Linux system
Thunder to see which formats can be played on the mobile version?
How to record win10? Windows10 recording screen video tutorial
Teach you how to solve QQ fake death in Windows 8 system
Windows 7 market share will exceed XP
Magic Shadow Factory; converted to MKV format tutorial
How to set the volume of Win8 to automatically adjust the sound of other sounds
Win10 Creator Update Preview 15014 Get Started Experience New Features and Improvements