#11
|
|||
|
|||
引用:
看看他們怎麼防駭 |
#12
|
||||
|
||||
恭喜復站..
個人訊息無恙.... 網路上總是存在這些人,沒事就想入侵別人主機搞怪, 沒關係啦~三折躬而成良醫....以後站長架站(防護技術)也會更進步 ! |
#13
|
|||
|
|||
引用:
居然讓我這兩天又無聊了 看來我有domain成癮症 ?
__________________
【虛擬主機 | 網域名稱 | 免費資源】 |
#14
|
|||
|
|||
或許該開個專欄討論防駭客??
恩...網路安全問題,就要看一個很特別的地方 國家單位的...恩...我忘了...一個什麼安全論壇的...
__________________
【虛擬主機 | 網域名稱 | 免費資源】 |
#15
|
|||
|
|||
自己架站與實體主機的安全設定不太相同..
但防的只是一般駭客,真正功力高深者.會被駭的還是會被駭 自己架站: 1.可先用分享器設定PORT,過濾掉非法PORT->我認為最好的方式 2.在LINUX內設定一些限制 (至於要設定什麼限制見仁見智,我不太清楚一般自己架站) 但PING不到的那個方法,我認為沒有太大的作用 實體主機: 1.防DDOS攻擊--交給機房作 2.linux+控制台軟體(如:CPANEL.ENSIM.Plesk等)就會先設定一些安全 性..其它的安全設定都是機房的工程師弄得的,我也不知道他們設定什麼 ? 機器OK時,機房的工程師都幫您用好了,再來是您自己去設定控制台 軟體及裝您需要裝的套件及編譯PHP...關於安全性...都是機房工程師用的! ~shy 勤於備份..總有一天可能會派上用場 打了一堆,好像沒什麼實質的幫助... 只開PORT80就好,最安全八。若要用SMTP再開啟PORT 傳檔案用區網直接COPY進去,... ? |
#16
|
|||
|
|||
|
#17
|
|||
|
|||
可以試試KISS My Firewall 簡單好安裝
http://www.geocities.com/steve93138 |
#18
|
|||
|
|||
對!就是有一些王八蛋,以為Hacker就是高手!殊不知自己的行蹤都被記錄下來了!
公布一下我主機的LOG檔…讓那些人看看!不要以為可以神不知、鬼不覺的做那些骯髒的事! ~shoot #Software: Microsoft Internet Information Services 5.1 #Version: 1.0 #Date: 2003-04-23 01:33:43 #Fields: time c-ip cs-method cs-uri-stem sc-status 01:33:43 163.28.32.101 GET /index.html 200 01:34:00 163.28.32.101 GET /usaflag00.gif 200 02:08:03 68.153.199.85 GET /default.ida 200 02:19:38 68.49.162.209 GET /default.ida 200 02:47:23 203.204.88.108 GET /index.html 200 02:47:26 203.204.88.108 GET /usaflag00.gif 200 03:25:15 68.41.111.69 GET /default.ida 200 04:47:42 61.222.206.105 GET /index.html 304 04:47:42 61.222.206.105 GET /usaflag00.gif 304 04:47:50 61.222.206.105 GET /ca.htm 304 04:48:40 61.222.206.105 GET /al.html 200 04:48:42 61.222.206.105 GET /ca.htm 304 05:47:45 192.168.1.96 GET /index.html 200 05:47:45 192.168.1.96 GET /usaflag00.gif 200 05:47:49 192.168.1.96 GET /ca.htm 200 05:48:03 192.168.1.96 GET /ak.htm 200 05:48:54 192.168.1.96 GET /index.html 200 05:48:54 192.168.1.96 GET /usaflag00.gif 200 06:08:47 68.36.201.208 GET /default.ida 200 07:37:04 211.72.233.3 GET /index.html 200 07:37:07 211.72.233.3 GET /usaflag00.gif 200 07:57:10 216.47.155.150 GET /index.html 200 07:57:18 216.47.155.150 GET /usaflag00.gif 200 07:58:17 216.47.155.150 GET /il.htm 200 08:00:08 216.47.155.150 GET /al.html 200 08:00:21 216.47.155.150 GET /ga.htm 200 08:00:32 216.47.155.150 GET /ca.htm 200 08:00:39 216.47.155.150 GET /ut.htm 200 08:00:56 216.47.155.150 GET /vi.htm 200 08:01:10 216.47.155.150 GET /va.htm 200 11:17:07 68.67.108.172 GET /default.ida 200 15:43:35 68.69.204.166 GET /scripts/root.exe 404 15:43:35 68.69.204.166 GET /MSADC/root.exe 404 15:43:36 68.69.204.166 GET /c/winnt/system32/cmd.exe 404 15:43:36 68.69.204.166 GET /d/winnt/system32/cmd.exe 404 15:43:36 68.69.204.166 GET /scripts/..%5c../winnt/system32/cmd.exe 404 15:43:38 68.69.204.166 GET /_vti_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe 404 15:43:38 68.69.204.166 GET /_mem_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe 404 15:43:39 68.69.204.166 GET /msadc/..%5c../..%5c../..%5c/..?../..?../..?../winnt/system32/cmd.exe 404 15:43:39 68.69.204.166 GET /scripts/..?../winnt/system32/cmd.exe 404 15:43:39 68.69.204.166 GET /scripts/..?../winnt/system32/cmd.exe 404 15:43:40 68.69.204.166 GET /winnt/system32/cmd.exe 404 15:43:40 68.69.204.166 GET /winnt/system32/cmd.exe 404 15:43:41 68.69.204.166 GET /scripts/..%5c../winnt/system32/cmd.exe 404 15:43:41 68.69.204.166 GET /scripts/..%5c../winnt/system32/cmd.exe 404 15:43:41 68.69.204.166 GET /scripts/..%5c../winnt/system32/cmd.exe 404 15:43:43 68.69.204.166 GET /scripts/..%2f../winnt/system32/cmd.exe 404 16:16:34 66.207.80.169 GET /default.ida 200 17:16:07 68.83.144.135 GET /default.ida 200 17:23:38 68.17.249.242 GET /default.ida 200 18:56:52 194.94.126.142 GET /scripts/..%5c%5c../winnt/system32/cmd.exe 404 21:08:19 68.58.1.220 GET /default.ida 200 21:47:54 68.166.102.222 GET /default.ida 200 23:04:14 68.168.60.168 GET /default.ida 200 23:10:28 68.158.212.144 GET /scripts/root.exe 404 23:10:28 68.158.212.144 GET /MSADC/root.exe 404 23:10:30 68.158.212.144 GET /c/winnt/system32/cmd.exe 404 23:10:31 68.158.212.144 GET /d/winnt/system32/cmd.exe 404 23:10:32 68.158.212.144 GET /scripts/..%5c../winnt/system32/cmd.exe 404 23:10:33 68.158.212.144 GET /_vti_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe 404 23:10:34 68.158.212.144 GET /_mem_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe 404 23:10:34 68.158.212.144 GET /msadc/..%5c../..%5c../..%5c/..?../..?../..?../winnt/system32/cmd.exe 404 23:10:36 68.158.212.144 GET /scripts/..?../winnt/system32/cmd.exe 404 23:10:36 68.158.212.144 GET /scripts/..?../winnt/system32/cmd.exe 404 23:10:38 68.158.212.144 GET /winnt/system32/cmd.exe 404 23:10:39 68.158.212.144 GET /winnt/system32/cmd.exe 404 23:10:41 68.158.212.144 GET /scripts/..%5c../winnt/system32/cmd.exe 404 23:10:42 68.158.212.144 GET /scripts/..%5c../winnt/system32/cmd.exe 404 23:10:44 68.158.212.144 GET /scripts/..%5c../winnt/system32/cmd.exe 404 23:10:45 68.158.212.144 GET /scripts/..%2f../winnt/system32/cmd.exe 404 看吧!還不死心…玩了兩次!但都沒成功!哈! |
#19
|
|||
|
|||
後面那一大堆, 是別人的電腦中毒, 程式到處亂掃射的結果,
不是人為 "手工" 想駭的記錄 |
#20
|
|||
|
|||
是否考慮到刑大電腦犯罪小組報案 ?
|