Everyone usually pays attention to their system is not good, how can we make the system faster, but some things that everyone does not pay attention to, in fact, some are Very important, talk about DoS and DDoS right from today.
I believe that everyone will not be unfamiliar with these two words, yes, Denial of Service, and distributed Denied Denial of Service.
The so-called denial of service means that after a specific attack occurs, the attacked object cannot provide the proper service in time. For example, the website service (HTTP Service) should be provided instead of providing the website service, and the email server ( SMTP, POP3) can not provide the function of sending and receiving mail, etc. Basically, blocking service attacks usually utilize a large number of network data packets to smash the network and host of the other party, so that normal users cannot obtain timely service from the host.
Distributed denial of service, in short, consumes available systems and network bandwidth with massive data packets that far exceed the target processing power, causing network services.
Perhaps it is related to the media's excessive attention. DoS attacks, especially DDoS attacks, seem to be popular overnight. The network administrators of large and small, as long as the server is faulty, are very excited. Shouting & ldquo; I was DDoS! & rdquo;, the face seems to write incomparable glory and pride.
In fact, there are not many DDoS in the real sense around us. After all, the resources required to launch a DDoS attack are very many, but the actual attacks continue to happen. Inside, the vast majority are ordinary denial of service attacks. Ordinary level of attacks, how to protect, has become the most headaches of many network administrators, so I have to ask around, the results are often the same, "buy our hardware firewall".
Hardware firewalls, including dedicated anti-denial-of-service attack products, are really good, but the basic price is very expensive, although the effect is good, from the perspective of investment and investment protection, it is too much.
In fact, from the perspective of the operating system, there are a lot of functions hidden in it, but many of them need us to slowly explore. Here I will give you a brief introduction on how to modify the registry in the Win2000 environment to enhance the system's anti-DoS capabilities.
Details:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Services/Tcpip/Parameters]
Close the check for invalid gateways. When the server is set up with multiple gateways, the system will try to connect to the second gateway when the network is not smooth, and the network can be optimized by turning it off.
"EnableDeadGWDetect"=dword:00000000
Disable response to ICMP redirect messages. Such packets may be used for attacks, so the system should refuse to accept ICMP redirect messages.
"EnableICMPRedirects"=dword:00000000
The NETBIOS name is not allowed to be released. When the attacker issues a request to query the server NETBIOS name, the server can be disabled.
Note that the system must be installed above SP2
"NoNameReleaseOnDemand"=dword:00000001
Send verification keep-alive packets. This option determines how long the TCP interval is to determine that the current connection is still connected. If the value is not set, the system checks whether the TCP has an idle connection every 2 hours. The setting time is 5 minutes.
"KeepAliveTime"=dword:000493e0
When the computer is used for a long time, you will find that the computer will run slower. In addit
Account password intelligent Security to protect your own account is not an easy task, some careles
Most people know that IE cache and most software temporary folders are placed in the C drive, Uncle
Many friends know that running Rundll32 netplwiz.dll, UsersRunDll (Windows) or Control userpasswords
Use XP Resource Manager file a
Set tips to share! xp hidden account how to set
The system does not recognize the mouse expert reason and provide a perfect solution
I forgot my computer's user password. How do I crack my password?
"Unable to browse the web" Ten strokes to solve intractable diseases (1)
Put IE8 shortcuts with "Internet Options" on your desktop
Windows Server game Raiders (2)
Set Windows invisible password Secret login dual system
How to add fonts to XP system?
In the win xp system, the ALT key of the button function is explained.
Why does Win7 boot with a black screen and only how the mouse should be solved?
Easily help you solve the problem that the computer search function can not be used
How to convert ISO to esd format? Win10 system image esd format converted to ISO format method
New hardware will push Win8 sales
Reasons for XP system fake death
How to open Win10 power saving mode? How does Win10 release the power saving mode?
Windows XP SP3 restarts PC continuously