全球主机交流论坛

 找回密码
 注册

QQ登录

只需一步,快速开始

CeraNetworks网络延迟测速工具IP归属甄别
12
返回列表 发新帖
楼主: 38205564

想租一个服务器 安全怎么做啊?

[复制链接]
发表于 2011-3-3 13:29:10 | 显示全部楼层
找人做也得找个熟悉的人呀。
发表于 2011-3-24 11:12:27 | 显示全部楼层
慢慢寻觅呗
发表于 2015-3-12 17:56:28 | 显示全部楼层
这很简单嘛租高仿机房不就解决了,攻击机房可以抗住,有需要找我哈,qq:1634186015
发表于 2015-3-12 21:44:54 | 显示全部楼层
付费的不少,免费的都那么回事。
发表于 2015-3-25 17:11:33 | 显示全部楼层
很简单嘛,放有防御的机房,随便怎么攻击都没事,qq:1634186015
发表于 2015-3-25 23:29:46 | 显示全部楼层
RAKsmart 安全建议
a)      Migrate all workstations and servers off of Windows 2000, XP, Vista, NT and 2003 effective immediately to Windows 8 or Windows 2012 Server.

b)      Consider migration of Windows 2008 to Windows 2012 when possible.

c)      Consider migration from Windows 7 to Windows 8.1 when possible.


II.     Border Security Protection

a)      Use a Firewall in front of all computing resources. When possible, avoid directly attaching any computer to the Internet with a publicly facing IP address.

b)      Consider setting up a De-Militarized Zone (DMZ) in front of your private network to properly isolate internal assets from assets at the border gateway (ie: mail servers, web servers, etc).


III.     Secure Passwords

a)      Always use at least 12-16 character passwords with a 4-6 month rotation cycle.

b)      Never set a user account so the password does not expire except the in the case of a service account.


IV.     User Accounts

a)      Do not mix Administrator and Non-Administrator level account levels. Setup a separate account for administration and only use that account for administration purposes. Never enable or use email from an administrator account.

b)      Do not mix service accounts and user accounts. Service accounts should be exclusively used for software processes.



V.     WiFi

a)      Always use WPA-PSK wherever possible.

b)      Limit WiFi access point range by turning down the radio power whenever possible to prevent over penetration into nei**oring structures/offices.

c)      Consider RADIUS for WiFi authentication whenever possible. This allows the WiFi to authenticate users individually to a Windows Active Directory Domain Controller.


  VI.     Mobile Device Security

a)      Implement encryption such as Bitlocker on all mobile devices such as Laptops running Windows.


VII.     Advanced Mitigation Strategies

a)      Enable Application Whitelisting.

b)      Enable Microsoft’s Enhance Mitigation Toolkit (EMET).

          http://support.microsoft.com/kb/2458544

c)      Enable ASLR and DEP on all assets.
您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|全球主机交流论坛

GMT+8, 2024-6-29 02:17 , Processed in 0.066676 second(s), 6 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表