How to avoid malicious attacks
(a) build up your hardware security defense system
choose a good security system model. A comprehensive security model should include the following necessary components: firewall, intrusion detection system, routing system, and so on.
The firewall plays a security role in the security system, which can largely guarantee illegal access from the network and data traffic attacks, such as denial of service attacks; the intrusion detection system plays the role of a monitor. Monitor your server portals and intelligently filter out those that are intrusive and offensive.
(2) Use English operating system
You must know that Windows is something of Microsoft in the United States, and Microsoft’s things have always been known for bugs and patches. The Chinese version of the Bug is far more than the English version, and the Chinese version of the patch has always been later than the English version, that is, if your server is loaded with the Chinese version of the Windows system, after the Microsoft vulnerability is announced, you still It takes a while to get a patch, and maybe hackers and viruses use this time to invade your system.
How to prevent hacking
First of all, there is no absolutely secure system in the world. We can only avoid being invaded as much as possible to minimize the number of casualties.
(1) Using the NTFS file system format
As we all know, the file system we usually use is FAT or FAT32. NTFS is a series operation of Microsoft Windows NT kernel. A disk format supported by the system specifically designed for management security features such as network and disk quotas, file encryption, and more. In the NTFS file system you can set individual access permissions for any disk partition. Put your own sensitive information and service information on separate disk partitions. In this way, even if the hacker gains access to the disk partition where your service file is located by some means, you need to find ways to break through the security settings of the system to further access sensitive information stored on other disks.
(B) make system backup
As the saying goes, & ldquo; & rdquo ;, although be prepared for who do not want the system to suddenly destroyed, but not afraid Ten thousand, I am afraid that if you do a backup of the server system, you can recover it in time if it is damaged.
(c) shut down unnecessary services, and only the open ports
Close unnecessary open service, good local management and group management. Windows system has a lot of default services, it is not necessary to open, it can even be said to be dangerous, such as: the default shared remote registry access (Remote Registry Service), the system a lot of sensitive information is written in the registry, such as Encrypted passwords for pcanywhere.
Close those unnecessary ports. Some seemingly unnecessary ports can indeed disclose sensitive information of many operating systems to hackers. For example, the IIS service that Windows 2000 server opens by default tells the other party that your operating system is Windows 2000. The port 69 tells the hacker that your operating system is extremely It may be a linux or Unix system, because 69 is the port used by the default tftp service under these operating systems. Further access to the port can also return some information about the software and its version on the server, which is a great help for hackers. In addition, open ports are more likely to be the gateway for hackers to enter the server. In short, doing a good job of TCP/IP port filtering will not only help prevent hackers, but also help prevent viruses.
4) Software firewall, anti-virus software
Although we already have a hardware defense system, but "something" is not a bad thing.
(five) to open your event log
Although the open log services, though said to prevent hackers and has no direct effect, but through his records The hacker's whereabouts, we can analyze what the intruders have done on our system, what damages and hidden dangers have been caused to our system, what kind of backdoors hackers have left on our system, our servers in the end There are also security vulnerabilities and so on. If you are a master, you can also set up a canister, wait for the hacker to invade, and catch him when he invades.
1. Go to the Control Panel and click on Windows Update; 2. Cli
At present, there are many ways to upgrade Win8.1 to Win8, such
Recently, many Win8.1 system users found the KB3000850 patch in the Windows system
Win8 install personalized theme graphic tutorial
Win8: Correctly set up to use Windows To Go
Windows 8 System Task Manager's two modes
How to calibrate the Win8.1 system screen?
Under the Win8 system Metro application shows offline can not be connected to the network
Pre-installed Win8 models Replace Win7 and WinXP How to set up
Detailed description of common touch gestures and corresponding keyboard shortcuts in Win8 system
Win8 computer install win7 computer driver method in compatibility mode
Win8 system screen background becomes black how to fix
Windows 8 to get the method of expanding the display
Fun Win8 system positioning function
Make file backup and restore in Windows 7
Tips for Windows 7 Command Prompt
Teach you to understand the meaning of the registry key
Win10 system quick start task manager skills
What do the options in the XP System Start Menu mean?
Revitalize the PC market! Windows8 or PC manufacturer savior (Figure)