Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Today's harvest point 2019-9-5

2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/03 Report--

Windows2012 Log event 4426: Telnet event

Mysqlerror: error log, viewing login information

The following is a reprint excerpt:

1. The composition of MySQL log file system

Error log: record problems that occur when starting, running, or stopping mysqld.

B, general log: record the client connection established and the statement executed.

C. Update log: a statement that records change data. This log is no longer in use in MySQL 5.1.

D, binary log: a statement that records all change data. It is also used for replication.

E, slow query log: record all queries with execution time longer than long_query_time seconds or queries that do not use indexes.

F, Innodb log: innodb redo log

By default, all logs are created in the mysqld data directory.

You can force mysqld to close and reopen the log file (or in some cases switch to a new log) by refreshing the log.

When you execute a FLUSH LOGS statement or execute mysqladmin flush-logs or mysqladmin refresh, the log is aging.

In the case of MySQL replication, more log files, called replacement logs, are maintained from the replication server.

Mysql port number: 3306

-- the Windows system also has Administrator administrator privileges, which can be used for common operations. But in fact, the highest level of authority in the Windows system is the System user right, and some operations need System permission to complete, such as modifying the core key values of the registry, forcing the termination of malicious application processes, and so on. Dangerous port: TCP135 port, UDP137, 138port, TCP139, 445port is a port with mixed reputation, with which we can easily access all kinds of shared folders or printers in the local area network, but it is precisely because of it that we have the opportunity to take advantage of it. They can secretly share your hard drive through this port, and even format your hard drive quietly! In October 2017, due to the attack of the virus "bad rabbit", security agencies such as the National Internet Emergency response Center advised users to shut down ports 445 and 139 on computers and network devices in time. -- IPS:ru qin Defense system (IPS), which belongs to a sub-project of network switches, is a special switch with filtering gong ji function. It is generally placed between the firewall and the devices of the foreign network, relying on the detection of packets for defense (check the packets that enter the network, determine the true use of the packets, and then decide whether to allow them to enter the internal network). ACL: access control is the main strategy of network security prevention and protection, and its main task is to ensure that network resources are not used and accessed illegally. It is one of the most important core strategies to ensure network security. Access control also involves a wide range of technologies, including network access control, network access control, directory-level control and attribute control and other means.

An access control list (Access Control Lists,ACL) is a list of instructions applied to a router interface. These instruction lists are used to tell the router which packets can be received and which packets need to be rejected. Whether a packet is received or rejected can be determined by specific indication conditions such as source address, destination address, port number, and so on.

Access control list can not only control network traffic and flow direction, but also play a key role in protecting network devices and servers to a great extent. As the first barrier for the external network to enter the intranet, the access control list on the router has become an effective means to protect the security of the intranet.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report