只有堵不完的窟窿!作者: Elisar 时间: 2011-2-23 22:01
付费就帮你做作者: 安心 时间: 2011-2-23 22:12 标题: 回复 9# 的帖子 是的,这个术业有专攻,还是付费找专业人士做比较靠谱。作者: 寂寞的公安 时间: 2011-3-3 13:29
找人做也得找个熟悉的人呀。作者: Elisar 时间: 2011-3-24 11:12
慢慢寻觅呗作者: Augus 时间: 2015-3-12 17:56
这很简单嘛租高仿机房不就解决了,攻击机房可以抗住,有需要找我哈,qq:1634186015作者: bluehut 时间: 2015-3-12 21:44
付费的不少,免费的都那么回事。作者: Augus 时间: 2015-3-25 17:11
很简单嘛,放有防御的机房,随便怎么攻击都没事,qq:1634186015作者: rakswift 时间: 2015-3-25 23:29
RAKsmart 安全建议
a) Migrate all workstations and servers off of Windows 2000, XP, Vista, NT and 2003 effective immediately to Windows 8 or Windows 2012 Server.
b) Consider migration of Windows 2008 to Windows 2012 when possible.
c) Consider migration from Windows 7 to Windows 8.1 when possible.
II. Border Security Protection
a) Use a Firewall in front of all computing resources. When possible, avoid directly attaching any computer to the Internet with a publicly facing IP address.
b) Consider setting up a De-Militarized Zone (DMZ) in front of your private network to properly isolate internal assets from assets at the border gateway (ie: mail servers, web servers, etc).
III. Secure Passwords
a) Always use at least 12-16 character passwords with a 4-6 month rotation cycle.
b) Never set a user account so the password does not expire except the in the case of a service account.
IV. User Accounts
a) Do not mix Administrator and Non-Administrator level account levels. Setup a separate account for administration and only use that account for administration purposes. Never enable or use email from an administrator account.
b) Do not mix service accounts and user accounts. Service accounts should be exclusively used for software processes.
V. WiFi
a) Always use WPA-PSK wherever possible.
b) Limit WiFi access point range by turning down the radio power whenever possible to prevent over penetration into nei**oring structures/offices.
c) Consider RADIUS for WiFi authentication whenever possible. This allows the WiFi to authenticate users individually to a Windows Active Directory Domain Controller.
VI. Mobile Device Security
a) Implement encryption such as Bitlocker on all mobile devices such as Laptops running Windows.
VII. Advanced Mitigation Strategies
a) Enable Application Whitelisting.
b) Enable Microsoft’s Enhance Mitigation Toolkit (EMET).