寂寞的公安 发表于 2011-3-3 13:29:10

找人做也得找个熟悉的人呀。

Elisar 发表于 2011-3-24 11:12:27

慢慢寻觅呗

Augus 发表于 2015-3-12 17:56:28

这很简单嘛租高仿机房不就解决了,攻击机房可以抗住,有需要找我哈,qq:1634186015

bluehut 发表于 2015-3-12 21:44:54

付费的不少,免费的都那么回事。

Augus 发表于 2015-3-25 17:11:33

很简单嘛,放有防御的机房,随便怎么攻击都没事,qq:1634186015

rakswift 发表于 2015-3-25 23:29:46

RAKsmart 安全建议
a)      Migrate all workstations and servers off of Windows 2000, XP, Vista, NT and 2003 effective immediately to Windows 8 or Windows 2012 Server.

b)      Consider migration of Windows 2008 to Windows 2012 when possible.

c)      Consider migration from Windows 7 to Windows 8.1 when possible.


II.   Border Security Protection

a)      Use a Firewall in front of all computing resources. When possible, avoid directly attaching any computer to the Internet with a publicly facing IP address.

b)      Consider setting up a De-Militarized Zone (DMZ) in front of your private network to properly isolate internal assets from assets at the border gateway (ie: mail servers, web servers, etc).


III.   Secure Passwords

a)      Always use at least 12-16 character passwords with a 4-6 month rotation cycle.

b)      Never set a user account so the password does not expire except the in the case of a service account.


IV.   User Accounts

a)      Do not mix Administrator and Non-Administrator level account levels. Setup a separate account for administration and only use that account for administration purposes. Never enable or use email from an administrator account.

b)      Do not mix service accounts and user accounts. Service accounts should be exclusively used for software processes.



V.   WiFi

a)      Always use WPA-PSK wherever possible.

b)      Limit WiFi access point range by turning down the radio power whenever possible to prevent over penetration into nei**oring structures/offices.

c)      Consider RADIUS for WiFi authentication whenever possible. This allows the WiFi to authenticate users individually to a Windows Active Directory Domain Controller.


VI.   Mobile Device Security

a)      Implement encryption such as Bitlocker on all mobile devices such as Laptops running Windows.


VII.   Advanced Mitigation Strategies

a)      Enable Application Whitelisting.

b)      Enable Microsoft’s Enhance Mitigation Toolkit (EMET).

          http://support.microsoft.com/kb/2458544

c)      Enable ASLR and DEP on all assets.
页: 1 [2]
查看完整版本: 想租一个服务器 安全怎么做啊?