Home > Article > Operation and Maintenance > 10 course recommendations on system security
This article mainly introduces the group policy and user settings of the win2008 R2 WEB server security settings guide. Friends in need can refer to the optimization settings of group policies, renaming the system default administrators and users, and creating trap accounts. and other measures to improve system security. Continuing from the previous article, we have changed the remote connection port and can reject some attacks, but these settings are not enough. When doing the following security measures, you must make sure that your server software has been fully configured and can be used normally. Otherwise, if you install the software after setting the security settings, the installation may fail or other errors may occur, causing the environment configuration to fail. Password policy The strength of the system password is directly related to the security of the system. If your password is too simple, if your remote connection port is scanned, it will take minutes to crack your password. Therefore, our system password must set a password that meets security requirements, such as using uppercase and lowercase English, numbers, special symbols, and a length of not less than 6 characters to strengthen password security. In Windows 2008 and above systems, the system provides a "Password Policy" setting. Let's set it. First enter the "Local Security Policy"
1. Summary of the points to note about installing software
Introduction: This article mainly introduces the Group Policy and Users of the win2008 R2 WEB Server Security Settings Guide Settings, friends in need can refer to the following measures to improve system security by optimizing group policy settings, renaming the system's default administrators and users, and creating trap accounts. Continuing from the previous article, we have changed the remote connection port and can reject some attacks, but these settings are not enough. When doing the following security, you must make sure that your server software has been fully configured and can be used normally. Otherwise, if you install the software after the security settings, you may be in trouble...
2. Summary of points to note about group policy
Introduction: This article mainly introduces After reading the win2008 R2 WEB Server Security Settings Guide for Group Policy and User Settings, friends in need can refer to the following measures to improve system security by optimizing and setting group policies, renaming the system's default administrators and users, and creating trap accounts. Continuing from the previous article, we have changed the remote connection port and can reject some attacks, but these settings are not enough. When doing the following security, you must make sure that your server software has been fully configured and can be used normally. Otherwise, if you install the software after the security settings, you may be in trouble...
Introduction: Generally, when designing a fastReport report, the database connection information can be saved directly into the report. However, there is a serious security problem in this way, which is how the client can see the database account and password when reopening the report using the designer. Password is very unsafe for the database system, so here we have made some settings to remove the account information from the report. Open the report designer, find the data connection item, and delete the connection information stored in the ConncetionString in the property.
4. In-depth analysis of the seven habits of writing secure PHP applications_PHP tutorial
Introduction: Writing Security An in-depth analysis of the seven habits of PHP applications. When it comes to security issues, it's important to note that in addition to actual platform and operating system security issues, you also need to ensure that you write secure applications. When writing PHP applications,
Introduction: Detailed explanation of PHP-FPM's Chroot execution environment, detailed explanation of php-fpmchroot. Detailed explanation of PHP-FPM's Chroot execution environment, detailed explanation of php-fpmchroot. Setting up chroot in PHP-FPM has a good isolation effect and improves system security, but if you want to establish a reasonable PHP-FPM Chr
6. Seven Habits for Writing Secure PHP Applications
Introduction: Seven Habits for Writing Secure PHP Applications Improve web application security Security in PHP applications includes remote security and local security. This article will reveal the habits that PHP developers should develop when implementing web applications with both types of security. ? When it comes to security issues, it's important to note that in addition to actual platform and operating system security issues, you also need to ensure that you write secure applications. When writing PHP applications
7. In-depth analysis of the seven habits of writing secure PHP applications
Introduction : An in-depth analysis of seven habits for writing secure PHP applications. When it comes to security issues, it's important to note that in addition to actual platform and operating system security issues, you also need to ensure that you write secure applications. When writing PHP applications,
8. Seven Habits for Writing Secure PHP Applications
Introduction: Seven Habits for Writing Secure PHP Applications Improve Web Application Security Security in PHP applications includes remote security and local security. This article will reveal the habits that PHP developers should develop when implementing web applications with both types of security. ?When it comes to security issues, it's important to note that in addition to actual platform and operating system security issues, you also need to ensure that you write secure applications. When writing PHP applications, please apply the following
9. PHP-FPM Chroot execution environment detailed explanation, php-fpmchroot detailed explanation
Introduction: Detailed explanation of PHP-FPM's Chroot execution environment, detailed explanation of php-fpmchroot. Detailed explanation of PHP-FPM's Chroot execution environment. Detailed explanation of php-fpmchroot. Setting up chroot in PHP-FPM has a good isolation effect and improves system security. However, if you want to establish a reasonable PHP-FPM Chr
##Introduction: All enterprises The business database system is a top priority. How to ensure the security and stability of the system requires the DBA to carry out relevant records through corresponding inspection indicators every day. Today we will briefly talk about the OS health detection of CPU
[Related Q&A Recommendations]:
Server - How to safely patch Centos?
The above is the detailed content of 10 course recommendations on system security. For more information, please follow other related articles on the PHP Chinese website!