Xem 1-20 trên 73 kết quả Protecting the server
  • Protecting the Registry against Unauthorized Remote Access Remote access to the registry is very convenient when the system administrator needs to support end users from his own workplace.

    pdf4p kisiheo 26-07-2010 45 6   Download

  • Có thể các bạn đã đọc được rất nhiều tài liệu hoặc bài viết về Network Access Protection (NAP). Đó là một tính năng được thiết kế trong Windows Server 2008 (trước đây có tên mã là Longhorn Server) và đã có một số bài viết về NAP xuất hiện ngay từ khi Windows Server 2008 chưa được phát hành.

    pdf52p ken333 07-06-2012 58 22   Download

  • Deciding to add security to a web application is like deciding whether to wear clothes in the morning. Both decisions provide comfort and protection throughout the day, and in both cases the decisions are better made beforehand rather than later. Just look around and ask yourself, “How open do I really want to be with my neighbors?” Or, “How open do I really want them to be with me?”

    pdf250p tailieuvip13 25-07-2012 24 3   Download

  • Module 9: Configuring IPsec. Internet Protocol security (IPsec) is a framework of open standards for protecting communications over IP networks through cryptographic security services. IPsec supports network-level peer authentication, data-origin authentication, data integrity, data confidentiality (encryption), and replay protection. The Microsoft IPsec implementation is based on standards that the Internet Engineering Task Force (IETF) IPsec working group developed. In this module, you will learn how to implement, configure, and troubleshoot IPsec.

    pdf42p tangtuy20 28-07-2016 3 1   Download

  • Windows Server 2008 is a big change from Windows Server 2003, as the 5-year gap in the names would sug- gest. Microsoft is providing role-based management, major new product variations (Server Core, Read-Only Domain Controllers), support for hardware-based virtualization, Network Access Protection, BitLocker drive encryption, an overhauled Terminal Services architecture, and a raft of less exciting but nonetheless useful evo- lutionary improvements.

    pdf7p emilynguyen 06-08-2009 224 95   Download

  • Microsoft Exchange Server 2010 đem đến nhiều công nghệ, đặc điểm, và dịch vụ mới cho dòng sản phẩm Exchange Server.

    pdf12p thanhtung_hk 05-11-2010 164 88   Download

  • One of the lessons I learned early in life is to never confess the stupid things that I have done in public—unless there’s a good punch line at the end of the story. Well, there is really no punch line at the end of the story I am about to tell you, but I am going to tell it anyway, because it helps introduce some of the key issues and concepts involved when securing e-mail clients and servers.

    pdf511p mylinh 11-08-2009 240 82   Download

  • Security is a significant concern for any organization. If the organization has to have a presence on or a connection to the Internet, it will also have special needs to protect itself from unwanted intrusion and attacks from malicious and hostile sources. The growth of the Internet has been accompanied by the growth in the numbers and sophistication of hackers and the tools available to them. As many organizations and home users who have a permanent connection to the Internet can attest, there is no shortage of people who want to scan ports or break into systems.

    pdf961p mylinh 11-08-2009 107 40   Download

  • Những Cách Bảo Vệ Hosting Và Server I. .htaaccess: 1. Các trang báo lỗi: Trong quá trình làm việc với client, nếu có lỗi xảy ra (vi dụ như không tìm thấy file) thì Apache sẽ báo lỗi bằng một trang có sẵn hiển thị mã số của lỗi đó, rất không đẹp và khó hiểu. Với .haccess thì bạn có thể tự tạo các trang báo lỗi hay hơn. Để làm được điều này thì trong file .htaccess bạn thêm dòng sau ErrorDocument errornumber /file.

    pdf10p luavitradong 15-05-2010 75 29   Download

  • This module provides students with an overview of cryptography and digital certificates. The module then explains how students can protect data and communications between the Web browser and the Web server. After completing this module, students will be able to protect the portions of a Web application that require private communications through Secure Sockets Layer (SSL) security.

    pdf86p maiphuong 10-08-2009 63 19   Download

  • You will learn how to use new features that help you improve security, performance, reliability, and operational efficiency, as well as how to automate deployment and administration. Examine Windows Hypervisor virtualization, Windows Deployment Services, Internet Information Services 7.0, Windows PowerShellTM, Network Access Protection, and other security features. Take a guided preview from the experts and get ready to plan for deployment and perform your first upgrades and migrations to Windows Server code name Longhorn.

    pdf441p ken333 14-06-2012 91 19   Download

  • The Security Management server is installed in the LAN, so that it is protected by a Security Gateway. The Security Management server manages the gateways and allows remote users to connect securely to the corporate network. SmartDashboard may be installed on the Security Management server or on any other machine.

    pdf178p hoangtumayman 26-09-2011 57 10   Download

  • Network Access Protection là một công nghệ mới có trong Windows Server 2008 .Network Access Protection là một công nghệ mới có trong Windows Server 2008, cho phép bạn có thể điều khiển những máy tính nào được phép kết nối với các máy tính khác trong mạng của mình. Network Access Protection (hoặc NAP) cho phép bạn thiết lập các chính sách “sức khỏe” mà các máy tính trong mạng phải có đủ các yếu tố này trước khi được phép truy cập mạng.

    pdf36p conquynho32 12-09-2012 35 10   Download

  • Enterprise data centers contain the assets, applications, and data that are often targeted by electronic attacks. Endpoints such as data center servers are key objectives of malicious attacks and must be protected. The number of reported attacks, including those that affect data centers, continues to grow exponentially every year (CERT/CC Statistics 1988-2002, CSI/FBI 2001). Attacks against server farms can result in lost business for e-commerce and business-to-business applications, and the theft of confidential or proprietary information.

    pdf304p duypha 11-08-2009 91 9   Download

  • Anderson Patricio Data Protection Manager (DPM) của Microsoft được thiết kế để bảo vệ các ứng dụng Microsoft và máy chủ trong môi trường Active Directory. DPM sử dụng sự bảo vệ dữ liệu liên tục. DPM Server bảo vệ các máy chủ bằng việc tạo và duy trì một bản sao thông tin được lưu tại chỗ. Chúng ta có thể định nghĩa một chu kỳ thời gian để đồng bộ dữ liệu từ các máy chủ được bảo vệ với máy chủ DPM.

    pdf42p ken333 06-07-2012 31 9   Download

  • Protecting SAM and Security Hives Windows NT/2000, Windows XP, and Windows Server 2003 security information is stored in the SAM (Security Accounts Manager) and Security registry hives.

    pdf7p kisiheo 26-07-2010 52 5   Download

  • Removing the constraint of acyclicity fromthe acyclic peer-to-peer architecture, we obtain the general peer-to-peer architecture. Like the acyclic peer-to-peer architecture, this architecture allows bidirectional communication between two servers, but the topology can form a general undirected graph, possibly having multiple paths between servers. An example is shown in Figure 7. The advantage of the general peer-to-peer architecture over the previous two architectures is that it requires less coordination and offers more flexi- bility in the configuration of connections among servers.

    pdf30p nhacchovina 22-03-2013 23 5   Download

  • Recommended Settings for the Account Lockout Policy Description Recommended setting The number of minutes a locked-out account will stay 30 minutes locked out. If this is set to 0

    pdf7p kisiheo 26-07-2010 41 4   Download

  • MM, Inc. strongly discourages the storage of large numbers of e-mail messages for a number of reasons. First, because e-mail messages frequently contain company confidential information, it is good to limit the number of such messages to protect the company’s information. Second, retention of messages fills up large amounts of storage space on the e-mail server and personal hard disks, and can slow down the performance of both the network and individual personal computers.

    pdf85p commentcmnr 03-06-2013 31 4   Download

  • In 2013, managing the security of devices, small business systems, and large enterprise networks will be more complex than ever before. Users are breaking down the PC monoculture by embracing a wider variety of platforms, each with its own user interface, OS, and security model. Businesses, meanwhile, are grappling with protecting intellectual property and business information as they tackle consumerization, virtualization, and cloud platforms head-on.

    pdf16p mebachano 01-02-2013 11 3   Download

Đồng bộ tài khoản