Although the security performance of the Windows Server 2008 system is unparalleled, it does not mean that the system itself has no security holes. For the Internet or LAN hackers, the security vulnerabilities in the Windows Server 2008 system are still abound, but their concealment is relatively strong; if we can not be important The privacy vulnerability is blocked in a timely manner, and “hackers” can still exploit these vulnerabilities to attack the Windows
Server 2008 system. To this end, we need to take action and take practical measures to block privacy loopholes. Guarding Windows
Virtual Memory Vulnerability
When we enable the virtual memory function of Windows Server 2008 system, this function supports the default saving of the memory page to the local disk when the memory page is not used. In this way, some illegal users with access to the system page file may be able to access the private information stored in the virtual memory. In order to block the virtual memory vulnerability, we can force the Windows Server 2008 system to automatically clear the virtual memory page file when the system is shut down. Therefore, some private information that appears during this operation will not be sneaked by illegal users. Is the specific steps to block the system virtual memory vulnerability:
First click on the Windows Server 2008 system desktop, click "Start", "Run" & rdquo; command, in the pop-up system run dialog box Enter the string command <;gpedit.msc”, click the Enter key to open the Group Policy Console window of the corresponding system;
Secondly expand the “ computer in the list area on the left side of the console window Configure the node branch, and then click “Windows Settings>,“Security Settings>,“Local Policies>,“Security Options" in the corresponding “Security Options" In the right list area, find the target group policy "Shutdown: Clear virtual memory page file” option.
Then right-click the "Shutdown: Clear Virtual Memory Page File" option and execute the "Properties" command from the pop-up shortcut menu to open the target group policy attribute as shown in Figure 1. Set the window, select the "Allowed" option, and click the "OK" button to save the above settings, so that Windows Server 2008 system will automatically save in virtual memory before shutting down the system in the future. When the privacy information is cleared, other users cannot steal the operating privacy of the local system by accessing the system page file.
2, blocking system log vulnerability
If the Windows Server 2008 system is not used for the server system, but only as a normal computer, we need to beware of the corresponding system log vulnerability, because The system's logging function will automatically save our every move, including when the system is started, when it is closed, what applications the user ran during the startup process, what websites were visited, and so on. For example, to view a user's online record, we simply open the Server Manager window of the Windows Server 2008 system, expand the Event Viewer node option from it, and find the event record from RemoteAccess under the "System" Then, double-click the event logging option with the mouse, and then we can see the specific online time of the target user in the window that appears later. In order to block the system log vulnerability, we can set up the Windows Server 2008 system by following the steps below:
First click on the Windows Server 2008 system desktop, click "Start", /"Program”/&ldquo The "Administrative Tools" dialog box is displayed in the Server Manager console window that pops up, and then expand the "Configure" option to expand the "Services" branch option.
Secondly, in the pop-up service configuration window, double-click the Windows Event Log system service, open the target system service property setting window as shown in Figure 2, click the “stop” button, The target system service is forcibly stopped, and finally click the “OK” button to save the above settings, so that we can successfully block the Windows Server 2008 system log vulnerability.
3. Blocking application vulnerabilities
Windows Server 2008 system security " IQ" is very high when we attempt to run an application downloaded from the Internet During the program, the firewall program in the system may prompt that the target application has a security vulnerability. In order to prevent this application vulnerability from being illegally exploited by network viruses or Trojans, many friends often mistakenly believe that the Windows Server 2008 system is online as soon as possible. Updates can block application vulnerabilities; in fact, updating system vulnerabilities can only block vulnerabilities in Windows Server 2008 itself, and can not block application vulnerabilities. In order to run the target application properly and prevent application exploits from being exploited illegally, we can block the application vulnerability as follows:
First click on the Windows Server 2008 system desktop. Start ”/“Program”/“Administrative Tools”/“Server Manager” command, in the list area on the left side of the pop-up Server Manager console window, expand “Configure”,&ldquo "Advanced Security Windows Firewall" branch option, click on the "Inbound Rules" option from the target branch;
Second from the corresponding "Inbound Rules" "Operations" Click on the “New Rule” item. At this time, the system will automatically pop up the New Inbound Rules Wizard window, select the “Program” option, and click the “Next” button to set the window. “ This program path & rdquo; option is selected, then enter the specific path of the application with security holes in the application path text box, of course we You can also select and import the target application by clicking the "Browse" button to open the file selection dialog;
Next, the Inbound Rules Wizard will pop up a prompt asking us what to do, we must "block" Connect & rdquo; project selected, continue to click the "Next" button, set the applicable conditions of the current inbound rules, we try to select the "public", "private" & rdquo;, & ldquo; domain & rdquo; To ensure that the Windows Server 2008 system is connected to any different network, any illegal program can not exploit the vulnerability of the target application to attack the Windows Server 2008 system through the network;
After completing the above setting operation, we only need to set The name of the current new rule, and click the “Complete” button to save the above creation operation, so that we can use the target application to access the Internet normally, but the Trojan or spyware cannot exploit the target application vulnerability. And attack the local computer system through the network.
Some users will encounter the problem that the application can not be opened when using the Win10 pr
The more reliable Twitter account opening account Core Insider Program brings us the latest Win10 Mo
Win10 push a large wave of free users through the win10 upgrade tool, and then rose to win10 system
The normal program operation can not be separated from the use of memory, and the operation of malic
How can I delay or prevent the automatic software update of the official version of Win10?
What is the difference between Win8.1 mobile version and Win10 mobile version? A picture to see
How to reinstall Edge browser Win10 Win10 Edge browser reloading method diagram
How to enter the Windows 8 system security mode
Upgrade Win10 9926 for a long time in the check for update status how to do
Win10 build9888 version of the new discovery: set page integration search function
Win10 night mode with the registry open process graphic explanation
Win7 Ultimate system play League of Legends landing server is not responding to the solution
Windows 10 10159 mysterious changes revealed New login interface
What should I do if the Win10 administrator cannot activate the built-in application?
Win8 system can't use F1 key to open help and support how to do
Two ways to install the Windows 10 Store app without switching to a Microsoft account
Windows XP Common Security Settings List
How to make win7 pure version through the group policy to restore the default menu
Win10 Mobile RS2 preview version of the WiFi settings page will be the same as the pc page
Exclude various faults in Win8 system
The latest version of Windows 8: Build 8156
XP Device Manager application skills three
Is the software that Win8 can use compatible with 8.1?
Win10 mobile payment how to use win10 mobile payment using graphic tutorial
How to solve Win7 hard disk can not pop up BitLocker decryption window