You are here: hacking technology > hacker course > Content
Hot Articles
Recommend Articles
New Articles
The summary attack and defense overflow raises the power attack the solution
  Add date: 01/19/2009   Publishing date: 01/19/2009   Hits: 14
Total 3 pages, Current page:1, Jump to page:
 
Today which in the malicious attack user, the system crack emerge one after another incessantly repeatedly, takes the network administrator, the system manager, although has spent many times in server's security, such as gets the system safety patch, to carry on some conventional promptly the safe disposition, but was still sometimes unsafe. Before must therefore the malicious user invasion, through some series safe establishment, comes the intruder to keep off in “the emergency exit” beside, below the simple, the most effective against (Overflow) overflow, local will provide the jurisdiction attack class solution to give everybody the share.
¡¡¡¡First, how to prevent the overflow class attack
¡¡¡¡1st, the completely biggest possibility fires off system's crack patch, should better be for instance Microsoft Windows the Server series system may renew the service to open automatically, then lets the server in some time section which you assign connect Microsoft the Update website to carry on the patch automatically the renewal. If your server has for safety forbidden to public network exterior connection, may use Microsoft the WSUS service the net to carry on the promotion.
¡¡¡¡2nd, stops system service which as well as application procedure all do not need, the most predestined time of death can falls the bottom server to attack the coefficient. Before for instance, the time period MSDTC overflow, caused many servers to hang. Actually if a WEB kind of server does not have usefully to the MSDTC service time, you may stop greatly the MSDTC service, such MSDTC overflow did not constitute to your server any threatens.
¡¡¡¡3rd, starts the TCP/IP port's filtration, only opens commonly used TCP like 21, 80, 25, 110, 3389 and so on ports; If the safety requirements rank high spot may the UDP port closure, if after certainly like this, the flaw was like exterior is not continually convenient on the server has connected, here suggested that everybody sealed UDP with IPSec. " Only permits " the TCP agreement in agreement screening (the agreement number is: 6), the UDP agreement (the agreement number is: 17) as well as the RDP agreement (the agreement number is: 27) and so on essential uses the agreement then; Other useless is not open.
¡¡¡¡4th, begins using the IPSec strategy: Carries on the safe authentication for server's connection, adds on the double insurance to the server. Like¢ÛSaid that may in here some dangerous end such as: 135 145 139 445 as well as the UDP foreign connection and so on, as well as to reads through carries on the encryption with only with to have trusting relationship IP or the network carries on communication and so on. (note: Actually against bounce class wooden horse simple forbade UDP with IPSec or not the commonly used TCP port's foreign visit has become, how to apply here about IPSec no longer haughtily to continue, might arrive at the clothing to discuss Search peacefully “IPSec”, will have N many about the IPSec application material.)
¡¡¡¡5th, the deletion, the migration, change the name or catalog Access Control Lists with the access control the (ACLs) control key system file, the order and the folder:

 
Other pages: : 1 * 2 * 3 * Next>>
Prev:The remote control solves the question set Next:WinHex pursues the code principle and use (figure) simply

Comment:

Category: Home > hacker course