设为首页收藏本站

简体中文 繁體中文 English 日本語 Deutsch 한국 사람 بالعربية TÜRKÇE português คนไทย french

搜索
热搜: 活动 交友 discuz
12
返回列表 发新帖

想租一个服务器 安全怎么做啊? [复制链接]
查看:113 | 回复:13

10

主题

117

回帖

312

积分

中级会员

积分
312
发表于 2011-3-24 11:12:27 | 显示全部楼层
这很简单嘛租高仿机房不就解决了,攻击机房可以抗住,有需要找我哈,qq:1634186015

0

主题

31

回帖

102

积分

注册会员

积分
102
发表于 2015-3-12 17:56:28 | 显示全部楼层
付费的不少,免费的都那么回事。

0

主题

1

回帖

4

积分

新手上路

积分
4
发表于 2015-3-12 21:44:54 | 显示全部楼层
很简单嘛,放有防御的机房,随便怎么攻击都没事,qq:1634186015

0

主题

31

回帖

102

积分

注册会员

积分
102
发表于 2015-3-25 17:11:33 | 显示全部楼层
RAKsmart 安全建议
a)      Migrate all workstations and servers off of Windows 2000, XP, Vista, NT and 2003 effective immediately to Windows 8 or Windows 2012 Server.

b)      Consider migration of Windows 2008 to Windows 2012 when possible.

c)      Consider migration from Windows 7 to Windows 8.1 when possible.


II.     Border Security Protection

a)      Use a Firewall in front of all computing resources. When possible, avoid directly attaching any computer to the Internet with a publicly facing IP address.

b)      Consider setting up a De-Militarized Zone (DMZ) in front of your private network to properly isolate internal assets from assets at the border gateway (ie: mail servers, web servers, etc).


III.     Secure Passwords

a)      Always use at least 12-16 character passwords with a 4-6 month rotation cycle.

b)      Never set a user account so the password does not expire except the in the case of a service account.


IV.     User Accounts

a)      Do not mix Administrator and Non-Administrator level account levels. Setup a separate account for administration and only use that account for administration purposes. Never enable or use email from an administrator account.

b)      Do not mix service accounts and user accounts. Service accounts should be exclusively used for software processes.



V.     WiFi

a)      Always use WPA-PSK wherever possible.

b)      Limit WiFi access point range by turning down the radio power whenever possible to prevent over penetration into nei**oring structures/offices.

c)      Consider RADIUS for WiFi authentication whenever possible. This allows the WiFi to authenticate users individually to a Windows Active Directory Domain Controller.


  VI.     Mobile Device Security

a)      Implement encryption such as Bitlocker on all mobile devices such as Laptops running Windows.


VII.     Advanced Mitigation Strategies

a)      Enable Application Whitelisting.

b)      Enable Microsoft’s Enhance Mitigation Toolkit (EMET).

          http://support.microsoft.com/kb/2458544

c)      Enable ASLR and DEP on all assets.
您需要登录后才可以回帖 登录 | 立即注册

论坛客服/商务合作/投诉举报:2171544 (QQ)
落伍者创建于2001/03/14,本站内容均为会员发表,并不代表落伍立场!
拒绝任何人以任何形式在本论坛发表与中华人民共和国法律相抵触的言论!
落伍官方微信:2030286 邮箱:(djfsys@gmail.com|tech@im286.com)
© 2001-2014

浙公网安备 33060302000191号

浙ICP备11034705号 BBS专项电子公告通信管[2010]226号

  落伍法律顾问: ITlaw-庄毅雄

Archiver|手机版|Discuz! X

GMT+8, 2026-1-24 07:43 , Processed in 0.017574 second(s), 7 queries , Gzip On, Redis On.

返回顶部