search
HomeDatabaseMysql TutorialWin2003服务器安装及设置教程 MySQL安全设置图文教程

Win2003服务器安装及设置教程,一般脚本之家为客户都是将MySQL运行于普通用户下,这样才会尽量避免提权,新建用户什么的

为什么要将MySQL数据库必须运行在“普通用户”的状态下呢?与MSSQL SERVER一样,因为如果使用了“超级管理员”或者“本地系统用户”来运行“MySQL数据库”,就会被利用,利用SYSTEM用户权限入侵服务器。因此,为了服务器安全,务必将MySQL运行在“普通用户”的状态下。同时,要对硬盘的权限做好对应的权限设置MySQL才能正常运行。

建立普通用户;
单击“开始”—“管理工具”—“计算机管理”,进入计算机管理界面。
单击“系统工具”—“本地用户和组”—“用户” ,进入用户管理;

在“用户”上右击,选中“新用户”,添加新用户;

进入新用户建立界面;

输入MySQL运行用户“mysqlrun” ,并设置密码,单击“创建”建立该用户;

打开mySQL安装盘根目录的安全属性(在安装盘盘符上右键单击,选择“属性”,在弹出的属性框中单击“安全”标签)。

单击“添加”,在“选择用户或组”里输入刚刚添加的mySQL运行用户“mysqlrun”,单击确定给MySQL安装盘根目录添加用户;

设置“mysqlrun”用户的权限,将默认的“读取和运行”权限取消,保留“读取”和“列出文件夹目录”权限,单击“确定”,保存该设置并退出;


进入MySQL安装目录,同样在文件夹内右键选择“属性”;

打开MySQL安装目录属性的“安全”属性,删除“SYSTEM”用户,添加“mysqlrun”用户,权限为完全控制;

设置完目录的权限后,就需要将MySQL的运行用户设置为mysqlrun;

单击“此帐户”,设置帐户;

单击“浏览”,在输入框中输入MySQL的用户“mysqlrun”;

在密码和确认密码中输入mysqlrun用户的密码,单击“应用”,系统弹出服务警告窗口“新的登录名只有在您停止并重启服务时才可生效。”,单击确定即可。

此时重启一下服务,MySQL就运行在mysqlrun这个普通权限的用户之下了,服务器安全将大大增强。
将MySQL运行于普通用户下(如需引用或者转载此文,请注明作者:聚友,出处:http://www.juyo.org)
Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
How do you alter a table in MySQL using the ALTER TABLE statement?How do you alter a table in MySQL using the ALTER TABLE statement?Mar 19, 2025 pm 03:51 PM

The article discusses using MySQL's ALTER TABLE statement to modify tables, including adding/dropping columns, renaming tables/columns, and changing column data types.

How do I configure SSL/TLS encryption for MySQL connections?How do I configure SSL/TLS encryption for MySQL connections?Mar 18, 2025 pm 12:01 PM

Article discusses configuring SSL/TLS encryption for MySQL, including certificate generation and verification. Main issue is using self-signed certificates' security implications.[Character count: 159]

How do you handle large datasets in MySQL?How do you handle large datasets in MySQL?Mar 21, 2025 pm 12:15 PM

Article discusses strategies for handling large datasets in MySQL, including partitioning, sharding, indexing, and query optimization.

What are some popular MySQL GUI tools (e.g., MySQL Workbench, phpMyAdmin)?What are some popular MySQL GUI tools (e.g., MySQL Workbench, phpMyAdmin)?Mar 21, 2025 pm 06:28 PM

Article discusses popular MySQL GUI tools like MySQL Workbench and phpMyAdmin, comparing their features and suitability for beginners and advanced users.[159 characters]

How do you drop a table in MySQL using the DROP TABLE statement?How do you drop a table in MySQL using the DROP TABLE statement?Mar 19, 2025 pm 03:52 PM

The article discusses dropping tables in MySQL using the DROP TABLE statement, emphasizing precautions and risks. It highlights that the action is irreversible without backups, detailing recovery methods and potential production environment hazards.

How do you create indexes on JSON columns?How do you create indexes on JSON columns?Mar 21, 2025 pm 12:13 PM

The article discusses creating indexes on JSON columns in various databases like PostgreSQL, MySQL, and MongoDB to enhance query performance. It explains the syntax and benefits of indexing specific JSON paths, and lists supported database systems.

How do you represent relationships using foreign keys?How do you represent relationships using foreign keys?Mar 19, 2025 pm 03:48 PM

Article discusses using foreign keys to represent relationships in databases, focusing on best practices, data integrity, and common pitfalls to avoid.

How do I secure MySQL against common vulnerabilities (SQL injection, brute-force attacks)?How do I secure MySQL against common vulnerabilities (SQL injection, brute-force attacks)?Mar 18, 2025 pm 12:00 PM

Article discusses securing MySQL against SQL injection and brute-force attacks using prepared statements, input validation, and strong password policies.(159 characters)

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

Hot Tools

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

EditPlus Chinese cracked version

EditPlus Chinese cracked version

Small size, syntax highlighting, does not support code prompt function