In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/03 Report--
Hong Kong server "target=" _ blank "href=" http://undefined" > server is record-free, network access to China Telecom CN2, China Unicom and China Mobile enables Chinese mainland users to access at high speed, while accessing Hong Kong Broadband and PCCW operators to ensure high-speed experience in Asia. At present, it has adopted the latest generation of Intel ®strong ®extensible processing.
Where there are people, there will be competition, even the website servers that build the Internet. Now, every day, the webmaster's server interrupts the website business because of the competitive means of network attack, and the main reason why the server is breached is that the security deployment of the server itself has not been completed. even if the server has high performance-to-price ratio and advanced external advantages, it is as easy as a child wearing adult armor to be found and broken in one fell swoop. Therefore, if you want to ensure the security of the server, you must first start with the security deployment of the server itself, so how should the webmaster deploy the security settings of the server? What are the measures for secure deployment of servers in Hong Kong?
Server security settings
1. Hong Kong server security settings
The deployment purpose of the basic security policy of the website server is: minimum permissions + minimum application + minimum settings + daily checks = maximum security.
1. "minimum permissions" means that various services and applications run within the minimum scope of permissions.
2. "minimum application" means that the server installs only the necessary application software and programs
3. "the most detailed setting" means that you must be thorough and careful in the application of security policies.
4. "Daily inspection" refers to routine maintenance work such as daily inspection of the server, system optimization, cleaning of temporary garbage files, analysis of Log data, and so on.
Server security scope
2. Security scope of servers in Hong Kong
Can be divided into the following categories: operating system itself security; password / password security; WEB server security; all-TCP/IP protocol related; database security; FTP server security; security data backup and security system
Third, the third-party software security of the server
1. Try to install unnecessary third party software on the server as little as possible.
2. Ensure the security of all third-party software on the server, update and upgrade in a timely manner
3. Ensure the security of personal computers that often connect remotely to the server.
4. Ensure the security of the network operating environment of the computer room.
5. If it is not necessary, do not open a web page on the server, such as QQ; it is best to close the external connection of the server.
Try not to run unknown programs on the server, the server is not a testing machine.
7. If the webmaster has no bottom on the security of the server, it is best to install a good antivirus system and update the virus database in time; and add a firewall and set up security rules.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.