In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/02 Report--
How to ensure security when operating a CVM? I believe that many inexperienced people are at a loss about this, so this article summarizes the causes and solutions of the problem. Through this article, I hope you can solve this problem.
With the development of the Internet, some network risks have gradually increased, and network attacks and other problems have emerged one after another. Now there are many kinds of network attacks on the Internet, such as pre-attack behavior, port penetration, the use of system vulnerabilities, system services, or password cracking, horse websites and so on.
In the face of these insurmountable server security attacks, in addition to relying on the security measures already done by cloud computing service providers, how can individuals operate CVM to improve the security of CVM?
Modify or close the port
Many attacks are implemented using ports, for example, the commonly used remote control port is 3389, which is the default setting, so there is a risk of being used by interested people to remotely control and invade local workstations and steal privacy information stored on local workstations, but if the port value of remote control is changed to other values, the security of the host will be greatly improved. Similarly, shutting down unwanted ports will greatly improve the security of the host.
Windows system to modify the port needs to use the registry editor to modify, online tutorials are quite many, it is easy to learn; Linux system to modify the port, then you need to change the corresponding service configuration file.
Effective use of blacklist and whitelist
No matter it is windows system or Linux system, you can use the blacklist and whitelist to improve the security of CVM. The whitelist corresponds to the "blacklist". Operating systems, firewalls, antivirus software, mail systems, application software, etc., almost all related to the control of the application of blacklist rules.
After the blacklist is enabled, the users who are blacklisted (or IP addresses, e-mails, viruses, etc.) cannot be passed, on the contrary, after the whitelist is enabled, the users on the whitelist (or IP addresses, e-mails, viruses, etc.) will be given priority.
To set up the whitelist in the Windows system, you can find the firewall from the control panel and add the corresponding port number, while Linux can enter the command directly, edit the firewall rule configuration file first, and then enter the released whitelist. With this layer of setting, your CVM has an extra layer of security.
After reading the above, have you mastered how to ensure security when operating a CVM? If you want to learn more skills or want to know more about it, you are welcome to follow the industry information channel, thank you for reading!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.