By Paul Hu

Administrators should first make the following:

1 of important data and material completely for backup, and will backup storage equipment used in the separate place, not even on the Internet, this is website or system was malicious attacks after the best save method.

2. Particularly important site should 24-hours have network administrator on duty, and take the technical measures of cyclic examination system logs and dynamic IP changes.

3. Unattended website, close all even on the Internet for staff use computer terminal equipment, because most hacker attacks, often from these prevent weak computer terminals to invade, find web site or the vulnerability of the system, achieving administrator or user password, and capture site management to turn the super permissions attack website system within the other machine.

4. Check all user password, especially the administrator password, try to make super permissions to passwords also contains digital, case letters and symbols, because the password combination of many, decoding will be very difficult, and password length is not less than 8 bits, Furthermore, it often go about safety site download system, as far as possible patch system vulnerabilities patch.

The following relevant material from reference:

A site. Being attacked several ways

Want to successfully resisted hackers, we must from the Internet, newspapers and magazines and relevant technical data on understanding about the hacker’s some details. A based on network security report says: on the Internet approximately 20% of unit had being hacked into; About 40 percent of the unit did not install Firewall (Firewall); Not less than 30% of the hackers event is not properly install firewall in the cases happened. Generally speaking, hackers website commonly used such several ways:

A Data Diddling – – unauthorized delete file, change its material (15.5 per cent)

A could – – – the use of tool to find looking holes (15.8%)

A Sniffer – – monitor the packet encryption (11.2%)

A Denial of Service – – – to make it system paralyze (16.2%)

A IP Spoofing – – – impersonating inside the system network IP address (12.4%)

A of — — — — — — Other (13.9%)

[youtube]http://www.youtube.com/watch?v=EOwMkFsJXRI[/youtube]

Hackers why so easy to enter the system? Why those behind a firewall system can be just as hackers? The main reasons are:

A system itself exists many holes (secret door)

A traditional hacker is much single-handedly, but now due to the spread of the Internet, make hackers contact between more convenient, thus often adopts “banded robbery” invasion way. It says the United States has a group called “holocaust 2600 (Genocide 2600)” hacker organization, and now has more than 150 million members. They took root in the northwest and Alaska, and began to east coast expansion. They come from all walks of life, ranging in age from 14 to 52 years old.

There are many Internet a ready-made toosl software, such as “Rootkit”, “Satan” etc, these programs become hackers be convenient to use tools,

With the wrong way should install firewall.

2. Prevent hackers measures

1. Choose security password

According to a dozen hacker software principle of work, consult password spacing degree of difficulty to crack the time needed to order index, here are a common way of using dangerous password: user name (account) as a password, User name (account) transform form as password, Use birthday as a password, Common English words as password, Five or five following character as password.

Therefore, we should set password in comply with the following principles:

A password should include case letters, had better control characters,

A password not too regular,

A shall keep secret password and change often password. The worst passwords are obvious characteristics of password, do not use the old password circulation, Should at least every 90 days put all the password change once, for those who have high security privileges password should be more frequently change.

Should be put all the default are removed from the system, if the server is a SERVICE company established, must pay attention to find similar GUEST, MANAGER, SERVICE such as passwords and immediately change the password,

A if received two wrong password should disconnect systems

Should cancellation shall timely marketer or stop working employees account and useless account;

Should the validation process, passwords shall expressly mode,

A password not expressly way in system, ensure passwords encrypted form to write on the hard disk and contains a password files are read-only,

A user input password, Ming in memory linger time as shorten after use timely destroyed;

Once identity authentication should be confined when times login (login), its life in conversation length is equal,

Except the user input password should prepare login outside, network in other validation process is transparent to users.

We are so much emphasis on the importance of password setup, because about web security investigation results, More than 80 percent of the safety infringement is due to the people choose the botched password and cause. Then we can deduce that 80% of the invasion can select good password to stop.

2. Implementation access control

Access control regulations to which has what subject what operational power. Access control is the internal network security theory of important aspect, it includes personnel permissions, data identification, access control, types of control, risk analysis, etc. 3. Ensure the integrity of the data

Integrity is intheprocessing ofdatabase, in the original data and current data maintained between completely consistent proof means. Usually used digital signatures and data encryption algorithm to guarantee.

4. To ensure the data security

Through the encryption algorithm to encrypt data processing, and adopting digital signature and to ensure the data security authentication.

5. Use safety of server system

Now you can choose server system is a lot of: UNIX, WindowsNT Novell, Intranet, etc, but key server best use UNIX system.

6. Caution open the lack of security applications and port

7. Regular analysis system logs

This kind of analysis tools in the UNIX deductions-from NT Server. The user can now use Intrusion Detection company Kane Secu –

Rity Analyst (KSA) to the work. We would like to know more details to view address for HTTP, // www.intmsion.com website.

8. Constantly improve the safety performance of server system.

Many server system was discover many loopholes, continuously posted on a web site service chamber of commerce system patch. In order to ensure the security of the system, should keep watching these information, timely improving systems.

9. Exclude human factors

To improve the security system, not enough safety awareness and technical personnel often maintenance, security discount.

About the Author: I am Paul Hu from

Chia Lighting Suppliers

, and my work is to promote a free online trade platform. http://www.chinaqualitylighting.com/ contain a great deal of information about

hydraulic seals

,

topo us garmin

,

silver garnet ring

, welcome to visit!

Source:

isnare.com

Permanent Link:

isnare.com/?aid=694933&ca=Computers+and+Technology

How To Prevent Hacker Attacks