quarta-feira, 4 de julho de 2012

Server Security to Protect Your System

By Elisha Marty


Servers support huge networks of computers. There are servers that host websites and there are servers to run processes and servers to store data. Servers act as basic units for huge office networks in large organizations. The magnitude of dependency calls for a tight security arrangement for safe guarding proper functioning of large organizations.

When an individual tries to set up their home based web server, many of them have no idea about server security. A number of people have a false sense of security that if they set up a web server on their home computer, it can be connected to it except those friends whom they tell about this. A user who has a specific IP address can easily access their web server.

Not only by the own effort of hackers, sometimes the user's account contains such holes in it, so that mischievousness can be easily done. The default user's account should remain deactivated while it is not in use to stop being threatened by hackers. The next way is to keep the administrative users name as much secret as possible to ensure optimum security. Only proper authorization can prevent half of the problems easily.

The firewall system that protects the servers needs to be much stronger than the ones that are meant for limited memories of laptops or desktops. Performing weekly updates to the firewall system is necessary to make server security most effective. This way, even if one of the desktops or laptops connected to the server gets affected, the server firewalls with stronger protocols prevents any security attack on servers.

Firewalls are not enough alone to have a strong security. The administrative passwords and the system passwords need to be updated on a regular basis in order to thwart all hacking efforts. All the systems that have access to the server should be updating the passwords to the access regularly. The DBA should give privileges to change the data on the server only as and when required. You should remove unnecessary services like, FTP (File Transfer Protocol). FTP is a protocol that could be used by hackers. So remove anything from your script that looks un-necessary. These tips and tricks learned, the knowledge maintained and the alertness can save our script and our server, which is the building block of all businesses.




About the Author:



Sem comentários:

Enviar um comentário