Strictly following the video settings of the extra-star security package can ensure the security of the server. In China, thousands of servers have been running stably with the security package structure for many years. If your server is still hacked, check the following content:
1. Whether SQL 2000 and mysql are run under normal user permissions is the most important point. Most of the intrusions are carried out using database permissions. For specific settings, please see the video of the Out-of-Star Security Pack.
2. Use the security package to close all useless ports. For specific settings, you need to see the video of the security package from the extra-star.
3. The root directory of all disks cannot have read and run permissions for everyone, users.
4. Strengthen PHP security: /support/freehost/php/
5. Do not install or use CGI, as CGI poses inherent safety hazards.
6. Do not install any third-party software. For example, XX optimization software, XX plug-ins, etc., do not register unknown components on the server.
7. Do not use IE to access any website on the server.
To use version 4.1 or above, there are security issues with version 4.0.
9. Do not install PCanywhere or Radmin because they have security problems themselves. You can directly use 3389, which comes with Windows 2003, which is safer than any remote control software.
10. Don’t double-click to run any program on the server, otherwise you won’t know if you are hit by the *.
11. Do not use IE to open web pages on the user's hard disk on the server, this is a dangerous behavior.
12. Do not browse pictures on the server, Windows has had GDI+ security vulnerabilities in the past.
13. Make sure your own computer is safe. If your own computer is not safe, the server cannot be safe.
14. If you use imail, you must use version 8.2 or above. 8.1 has serious security vulnerabilities.
15. Check the system32 directory,,, can only have full permissions to adms and system. (The security packages in version 0.5 have automatically processed their permissions.)
16. Pay attention to using the extra-star security package after 2007-2-14, and click [Set temp directory permissions] and use the controlled end after 2007-2-1 to prevent potential damage from *s.
17. Any asp, php, and programs on the server must not use sql2000 sa user or root user in mysql to connect to the program, which will cause intrusion of the server.
18. After Zend is installed by default, its installation directory, such as "C:\Program Files\Zend\ZendOptimizer-3.2.6\lib\Optimizer-3.2.6" has all permissions of everyone, which is not safe. You need to change everyone permissions to read-only and run.
A network management that is always careful is the last guarantee of server security. After following the above settings, even if your user uploads *s to his own website, it will definitely not affect the server.
1. Whether SQL 2000 and mysql are run under normal user permissions is the most important point. Most of the intrusions are carried out using database permissions. For specific settings, please see the video of the Out-of-Star Security Pack.
2. Use the security package to close all useless ports. For specific settings, you need to see the video of the security package from the extra-star.
3. The root directory of all disks cannot have read and run permissions for everyone, users.
4. Strengthen PHP security: /support/freehost/php/
5. Do not install or use CGI, as CGI poses inherent safety hazards.
6. Do not install any third-party software. For example, XX optimization software, XX plug-ins, etc., do not register unknown components on the server.
7. Do not use IE to access any website on the server.
To use version 4.1 or above, there are security issues with version 4.0.
9. Do not install PCanywhere or Radmin because they have security problems themselves. You can directly use 3389, which comes with Windows 2003, which is safer than any remote control software.
10. Don’t double-click to run any program on the server, otherwise you won’t know if you are hit by the *.
11. Do not use IE to open web pages on the user's hard disk on the server, this is a dangerous behavior.
12. Do not browse pictures on the server, Windows has had GDI+ security vulnerabilities in the past.
13. Make sure your own computer is safe. If your own computer is not safe, the server cannot be safe.
14. If you use imail, you must use version 8.2 or above. 8.1 has serious security vulnerabilities.
15. Check the system32 directory,,, can only have full permissions to adms and system. (The security packages in version 0.5 have automatically processed their permissions.)
16. Pay attention to using the extra-star security package after 2007-2-14, and click [Set temp directory permissions] and use the controlled end after 2007-2-1 to prevent potential damage from *s.
17. Any asp, php, and programs on the server must not use sql2000 sa user or root user in mysql to connect to the program, which will cause intrusion of the server.
18. After Zend is installed by default, its installation directory, such as "C:\Program Files\Zend\ZendOptimizer-3.2.6\lib\Optimizer-3.2.6" has all permissions of everyone, which is not safe. You need to change everyone permissions to read-only and run.
A network management that is always careful is the last guarantee of server security. After following the above settings, even if your user uploads *s to his own website, it will definitely not affect the server.