新書推薦:
《
新民说·现实政治史:从马基雅维利到基辛格
》
售價:HK$
99.7
《
宽容是件奢侈品(人生360度·一分钟经典故事)
》
售價:HK$
44.6
《
甲骨拼合六集
》
售價:HK$
333.8
《
视觉美食家:商业摄影实战与创意解析
》
售價:HK$
132.2
《
中国经济发展的新阶段:机会与选择
》
售價:HK$
99.7
《
DK月季玫瑰百科
》
售價:HK$
210.6
《
为你想要的生活
》
售價:HK$
66.1
《
关键改变:如何实现自我蜕变
》
售價:HK$
77.3
|
內容簡介: |
《网络运维与管理》是面向网络技术管理人员的实用性期刊。本书是2012 年《网络运维与管理》各期内容的汇集,按照栏目分类进行汇总,内容详尽实用,保留价值高。全书分为安全管理、故障诊断、系统运维、网络管理和终端管理板块,共精选数百篇实用、精彩的技术文章,是广大网管员不可多得的业务指导书。
本书读者对象以网络管理技术人员(网管员)为主,包括网络管理主管、网络爱好者、准网管和所有关注网络应用与网络事业发展的人士。
|
目錄:
|
第1 章 安全管理
为虚拟机打补丁...................................................................2
补丁安装更新的方式及工具 .......................................2
下载安全补丁 ...............................................................2
启动SSH 远程连接服务 ..............................................3
ESXi 主机进入维护模式 .............................................3
使用命令行方式打补丁 ...............................................3
后续操作 .......................................................................4
多管齐下的反黑纪实...........................................................4
配置方案 .......................................................................4
怪异现象 .......................................................................4
处理措施 .......................................................................5
清除中毒后遗症...................................................................5
百度打不开 ...................................................................6
U 盘不能进行写操作 ...................................................6
管好密码...............................................................................7
快速删除网络访问密码 ...............................................7
禁止网络自动记忆密码 ...............................................7
巧妙更换网络登录密码 ...............................................8
使用U 盘轻松重设密码 ..............................................8
强制使用高级安全加密 ...............................................8
拒绝登录使用空白密码 ...............................................9
实现实名制上网...................................................................9
技术方案 .......................................................................9
管理方案 .....................................................................10
存在问题 .....................................................................10
加固Serv-U 保护FTP
.......................................................10
完善日志记录 .............................................................11
加固密码和限制登录 .................................................11
防治探测弱口令攻击 .................................................11
减小系统开销,屏蔽频繁的匿名登录 .....................12
FTP 域离线自动发短信到网管手机 .........................12
管控进程,让系统无忧.....................................................13
批量删除顽固进程 .....................................................13
提供纯净进程环境 .....................................................13
生成顽固进程拒绝名单 .............................................14
智能调整进程优先级 .................................................14
判断进程危险等级 .....................................................15
拒绝隐藏账号.....................................................................15
动态监控创建痕迹 .....................................................15
强制显示登录痕迹 .....................................................16
巧妙删除隐藏账号 .....................................................16
文件遭窃抓“真凶”...........................................................17
发现疑似信息泄露事件 .............................................17
揪出作案者的尾巴 .....................................................17
总结 .............................................................................19
巧用防火墙保护公网服务器.............................................19
服务器无法登录 .........................................................19
初步解决问题 .............................................................19
问题再次出现 .............................................................20
彻底解决问题 .............................................................20
替换法找回MySQL 密码 .................................................21
MySQL 的加密机制 ...................................................21
MySQL 的存储方式 ...................................................22
替换法破解MySQL 密码 ..........................................22
不让病毒通过磁盘传播.....................................................23
封锁隐藏共享后门 .....................................................23
封锁存储写入通道 .....................................................23
封锁自动播放后门 .....................................................24
封锁分区访问通道 .....................................................24
封锁病毒运行后门 .....................................................24
安全使用带毒软件.............................................................24
一、环境准备 .............................................................25
二、软件安装程序带毒 .............................................26
三、软件主程序带毒 .................................................26
四、直接使用的软件带有病毒 .................................27
谨防共享文件泄露信息.....................................................27
通过net share 命令定位 .............................................27
通过资源管理器定位 .................................................27
通过共享控制台定位 .................................................28
通过网络位置定位 .....................................................28
通过目录管理器定位 .................................................29
通过专业工具定位 .....................................................29
停用易泄露信息的功能.....................................................30
停用“文档保留”功能 .............................................30
停用搜索保留功能 .....................................................30
停用隐藏共享功能 .....................................................31
停用感染报告功能 .....................................................32
停用脱机同步功能 .....................................................32
停用登录监控功能 .....................................................32
停用网络发现功能 .....................................................33
基于角色认证的远程接入配置.........................................33
一、创建AAA 认证服务器 ......................................33
二、创建用户及用户组 .............................................34
三、创建角色 .............................................................34
四、创建角色映射规则 .............................................34
五、将角色映射规则与AAA 服务器绑定 ..............34
六、配置SCVPN 地址池 ..........................................34
七、配置SCVPN 实例——创建实例 ......................34
八、创建SCVPN 所属安全域 ..................................35
九、创建隧道接口并引用SCVPN 隧道 ..................35
十、创建安全策略不同角色的用户放行不同服务 .35
十一、SCVPN 用户登录验证 ...................................35
临时离开系统也无忧.........................................................35
开启登录显示功能 .....................................................36
监控偷偷操作行为 .....................................................36
加锁已经启用程序 .....................................................36
全面保护服务器.................................................................37
网络现状分析 .............................................................37
存在的问题 .................................................................37
改造方案 .....................................................................38
防火墙配置 .................................................................38
集中管理区交换机配置 .............................................38
项目经验总结 .............................................................38
抓住抢占流量的真凶.........................................................39
起因 .............................................................................39
分析 .............................................................................39
问题排除 .....................................................................39
寻找ARP 攻击源 .......................................................39
防范ARP 攻击 ...........................................................41
让密码策略个性化.............................................................42
用Paros 检查Web 安全漏洞 ............................................43
Paros proxy 简介 .........................................................43
安装与配置 .................................................................44
使用注意事项 .............................................................46
解开IE 打开后就关闭之谜 ...............................................47
第一步,更改IE 的主页属性 ...................................47
第二步,查看“系统配置实用程序” .......................47
第三步,查杀病毒 .....................................................47
第四步,修改“注册表编辑器” ...............................48
第五步,惊现www.009c.com ...................................48
第六步,手工清除病毒程序 .....................................48
手动查杀“文件夹病毒”...................................................49
简单查杀病毒 .............................................................49
寻找病毒本体 .............................................................49
手工杀毒 .....................................................................50
运行机理及染毒症状 .................................................50
几点补充 .....................................................................51
防范硬盘泄露信息.............................................................51
使用shred ...................................................................51
使用DBAN
.................................................................52
徒手“揪出”自启动病毒.................................................53
揪出启动文件夹中的病毒 .........................................53
揪出组策略设置中的病毒 .........................................53
揪出注册表启动项中的病毒 .....................................53
揪出服务列表中的病毒 .............................................54
揪出系统配置程序中的病毒 .....................................55
两招打造安全网络.............................................................55
一、网络拓扑 .............................................................55
二、安全需求 .............................................................56
三、通过访问控制列表对网络的通信流量进行过滤 ........................................56
四、配置防火墙进行功能区划分,进一步加强
网络安全 .....................................................................57
黑客主流入侵方式揭密.....................................................57
目录遍历漏洞暴露含有敏感信息的文件 .................58
网站后台路径、管理账号和密码采用默认设置而被入侵 .........................................58
因数据库未做任何防下载处理而被“拖库” ...........58
因存在注入漏洞而被猜解出账号、密码及后台 .....59
0Day 漏洞暴露敏感账号和密码 ...............................59
后记 .............................................................................59
ARP 攻击防范策略 ............................................................59
ARP 协议简介 ............................................................60
认识ARP 攻击 ...........................................................60
ARP 攻击防御策略 ....................................................61
路由器设置暗藏杀机.........................................................61
警惕定向广播威胁 .....................................................61
警惕固件BUG 威胁...................................................61
警惕登录密码威胁 .....................................................62
警惕SNMP 设置威胁 ................................................62
警惕Telent 协议威胁 .................................................63
寻找Solaris 后门 ...............................................................63
一、分析脚本文件bd ................................................64
二、分析脚本文件doc ..............................................64
三、分析脚本文件ps ................................................64
四、分析脚本文件Update ........................................65
五、发现need.tar 被植入系统 ..................................65
六、预防措施 .............................................................65
斩草要除根.........................................................................66
斩除网页表单中的隐私 .............................................66
斩除Index.dat 中的隐私 ............................................67
斩除Flash Cookie 中的隐私 .....................................68
制作自动安装补丁包.........................................................69
用IP 安全策略实现隔离 ...................................................70
认识IP 安全策略 .......................................................70
配置过程 .....................................................................70
经验总结 .....................................................................72
Windows 8 安全功能两则 .................................................72
图片加密让系统安全登录 .........................................72
安全提醒让安全及时知晓 .........................................73
顺利安装网络版客户端.....................................................74
瑞星客户端远程安装的方法 .....................................74
瑞星客户端远程安装过程中报错的处理方法 .........76
揪出潜藏威胁.....................................................................76
揪出潜藏陌生用户 .....................................................76
揪出潜藏的木马服务列表 .........................................77
揪出占用文件的黑手 .................................................78
揪出潜藏的自启动病毒 .............................................79
挖掘交换机自身功能.........................................................79
配置Root 保护功能 ...................................................79
配置攻击保护功能 .....................................................80
配置环路保护功能 .....................................................80
配置BPDU 保护功能 ................................................81
保证接入安全.....................................................................81
启用802.1x 认证功能 ................................................81
配置认证控制模式 .....................................................82
配置认证接入方式 .....................................................82
配置端口接入数量 .....................................................82
配置用户认证方法 .....................................................83
配置认证请求次数 .....................................................83
配置DHCP 触发认证 ................................................83
赤手空拳制服DLL 木马 ...................................................84
查找可疑进程 .............................................................84
找出可疑模块 .............................................................84
清除DLL 木马 ...........................................................85
手工清除Rose 木马...........................................................85
现象描述 .....................................................................85
处理过程 .....................................................................85
原因分析 .....................................................................87
经验总结 .....................................................................87
全面管理个人密码.............................................................87
密码设置 .....................................................................87
攻防结合,减少密码丢失概率 .................................87
养成正确的密码使用习惯 .........................................87
密码管理 .....................................................................88
管理好个人计算机 .....................................................88
顺利通过Web 登录VRV
..................................................88
VRV 安装在FAT32 格式分区 ...................................88
VRV 安装在NTFS 格式分区 ....................................89
降低权限让上网更安全.....................................................89
手工降低权限 .............................................................89
外力降低权限 .............................................................90
清除上网痕迹.....................................................................91
上网痕迹寻踪 .............................................................91
方法一,删除一般上网痕迹 .....................................92
方法二,删除顽固的Index.dat 文件 ........................92
方法三,清除已删除文件信息 .................................92
总结 .............................................................................92
挖掘防火墙安全功能.........................................................92
预防内网病毒 .............................................................93
控制非法接入 .............................................................93
限制主机上网 .............................................................94
过滤垃圾邮件 .............................................................94
注册表与网站安全.............................................................95
一、安全警告本领 .....................................................95
二、限制病毒本领 .....................................................95
三、预防信息泄露 .....................................................96
四、禁止程序本领 .....................................................96
五、控制优盘本领 .....................................................97
安全管控系统服务.............................................................97
揪出被替换的服务 .....................................................98
识别不安全的服务 .....................................................98
找出发生变化的服务 .................................................99
停用有威胁的服务 .....................................................99
远离内网恶意侵袭...........................................................100
远离隐藏共享攻击 ...................................................100
远离空连接攻击 .......................................................100
远离密码破解攻击 ...................................................101
远离Ping 洪水攻击 ..................................................101
远离程序漏洞攻击 ...................................................102
远离ARP 欺骗攻击 .................................................102
消灭Conficker 蠕虫 .........................................................103
遭遇蠕虫 ...................................................................103
出师不利 ...................................................................103
追本溯源 ...................................................................103
亡羊补牢 ...................................................................104
徒手应对宏病毒...............................................................104
走近宏病毒 ...............................................................104
及时发现宏病毒 .......................................................105
徒手清除宏病毒 .......................................................105
手工防范宏病毒 .......................................................106
“软硬”兼施防病毒.........................................................106
用好硬件设备安全功能是病毒防护“硬”道理 ...106
做好应用软件更新,提升基于应用的安全 ...........107
由防病毒引发的思考 ...............................................107
危险服务“险”在何处...................................................108
Remote Registry 恶意修改键值 ...............................108
Terminal Services 威胁远程管理 ............................108
Server 暴露隐藏共享 ................................................109
DNS Client 泄露访问行踪 .......................................109
Scheduler 自动定时攻击 ..........................................110
借路由器抗DDoS 攻击...................................................110
一、泛洪攻击防范 ...................................................110
二、扫描攻击防范 ...................................................111
三、单包攻击防范 ...................................................111
BIND 漏洞及升级 ............................................................112
MySQL 5.1 漏洞及升级 ...................................................113
1. 确认MySQL 的版本 ............................................113
2. 备份数据库中的数据 ...........................................113
3. 下载MySQL 5.1.63 版本 .....................................113
4. 安装MySQL 5.1.63 版本 .....................................113
5. 重启MySQL 服务 ................................................113
第2 章 故障诊断
供电引起视频终端故障...................................................115
公司现状 ...................................................................115
故障分析与解决 .......................................................115
经验总结 ...................................................................115
地线失灵导致网络故障...................................................116
电源地线故障网不通 ...............................................116
设备内部故障导致零地线存在电压 .......................116
设备外壳接地线老化导致接地故障 .......................116
解决SQL 2005 孤立用户问题 ........................................117
数据库访问出故障 ...................................................117
故障分析过程 ...........................................................117
故障排除 ...................................................................118
经验总结 ...................................................................118
网络接入典型故障处理...................................................118
故障一:路由器板卡故障导致网络不通 ...............118
故障二:路由器插槽故障导致网络不通 ...............118
故障三:上级结点参数配置导致网络无法连通 ...119
故障四:路由器接口工作模式设置不正确导致网络不通......................................119
故障五:协议封装错误导致网络不通 ...................119
小结 ...........................................................................119
交换机万兆模块升级录...................................................119
故障现象 ...................................................................119
故障排查过程 ...........................................................120
升级系统软件 ...........................................................120
经验总结 ...................................................................121
SSL VPN 部署与排障 ......................................................121
SSL VPN 部署情况 ..................................................121
SSL VPN 客户端的部署与安装 ..............................122
分社使用SSL VPN 访问总社内网速度缓慢 .........122
经验总结 ...................................................................122
服务器为何无法自动重启...............................................123
配置方案 ...................................................................123
故障现象 ...................................................................123
故障排查 ...................................................................123
经验总结 ...................................................................124
无缓存RAID 卡影响读 写性能 ....................................124
磁盘读 写速度异常缓慢 ........................................124
更换RAID 卡 ...........................................................125
经验总结 ...................................................................125
无线路由器也升级...........................................................125
故障现象 ...................................................................125
故障排查过程 ...........................................................125
故障分析 ...................................................................125
无线路由升级过程 ...................................................126
正确下载升级文件 ...................................................126
经验总结 ...................................................................126
策略路由引起的网络故障...............................................126
设置外网通道 ...........................................................127
故障现象 ...................................................................127
故障分析 ...................................................................127
故障解决 ...................................................................127
经验总结 ...................................................................127
两交换机接口不匹配引发故障.......................................127
故障现象 ...................................................................128
故障排查 ...................................................................128
故障分析 ...................................................................128
故障排除 ...................................................................128
组策略解决共享打印设置...............................................129
客户端无法安装打印机 ...........................................129
故障排除 ...................................................................129
故障解决 ...................................................................129
网站升级闹故障...............................................................130
问题一:网站维护提交数据时出错 .......................130
问题二:Web 服务器不定时中断服务 ...................130
RID 分配问题导致网络故障 ...........................................131
故障排查过程 ...........................................................131
解决方案 ...................................................................132
NAT 导致服务器解析故障 ..............................................133
故障分析 ...................................................................133
故障排查 ...................................................................133
解决办法 ...................................................................134
经验总结 ...................................................................134
慎用默认VLAN
..............................................................134
相关设备主要配置 ...................................................134
问题初步描述及解决办法 .......................................135
最终解决问题的方法 ...............................................135
问题原理分析 ...........................................................136
经验总结 ...................................................................136
路由器CPU 过载引故障 .................................................136
故障现象 ...................................................................136
原因分析 ...................................................................136
处理方式 ...................................................................137
VMware 为何无法安装64 位系统 .................................137
更改文件属主数据库出故障...........................................138
网络环境 ...................................................................138
故障现象 ...................................................................138
故障解决过程 ...........................................................138
处理周期出现的网络故障...............................................139
网络环境 ...................................................................139
故障现象 ...................................................................139
分析与处理 ...............................................................140
故障分析与解决 .......................................................140
经验总结 ...................................................................141
MySQL 自增字段为何报错 ............................................142
重装Forefront TMG 故障解析 ........................................142
无法安装配置存储服务器,提示端口2171 被使用 .................................................142
安装程序无法安装ADAM ......................................143
安装之后无法导入Forefront TMG 的配置 ............143
导入策略之后修改日志位置与计算机名称 ...........143
排查服务器重启故障.......................................................143
故障排查过程 ...........................................................143
故障分析 ...................................................................144
经验总结 ...................................................................145
添加账号引发应用故障...................................................145
故障排查 ...................................................................145
故障分析 ...................................................................145
故障解决 ...................................................................146
经验总结 ...................................................................146
配置不当造成DNS 解析故障.........................................146
故障排查 ...................................................................146
原因分析 ...................................................................147
经验总结 ...................................................................147
处理双路由器环境故障...................................................148
故障排查过程 ...........................................................148
用户网络结构说明 ...................................................148
故障解决 ...................................................................148
经验总结 ...................................................................149
接口性能降低惹故障.......................................................149
光电转换器性能降低引起的网络故障 ...................149
终端性能降低引起的网络故障 ...............................149
经验总结 ...................................................................150
下载加速造成附件打开故障...........................................150
故障排查过程 ...........................................................150
经验总结 ...................................................................151
查找意外的DHCP 服务 ..................................................151
故障现象 ...................................................................151
故障排查过程 ...........................................................151
故障解决 ...................................................................152
经验总结 ...................................................................152
DHCP 引起路由器级联故障 ...........................................152
故障现象 ...................................................................152
故障分析 ...................................................................152
解决方案 ...................................................................153
经验总结 ...................................................................153
Pppoe 应用故障分析........................................................153
服务端压力较大 .......................................................154
有标签的VLAN 中存在丢包 ..................................154
配置防火墙条目不能过多 .......................................154
Vista 和Windows 7 客户端拨号不成功 ..................154
系统升级造成上网故障...................................................155
故障现象 ...................................................................155
故障排查过程 ...........................................................155
故障排除 ...................................................................155
经验总结 ...................................................................155
时间问题引发论坛板块故障...........................................156
故障排查 ...................................................................156
故障解决 ...................................................................156
经验总结 ...................................................................156
追查系统访问缓慢的根源...............................................156
故障现象 ...................................................................157
故障排查过程 ...........................................................157
揭开谜底 ...................................................................157
故障分析 ...................................................................157
经验总结 ...................................................................158
拯救“生病”的防火墙...................................................158
问题一:设备死机,无法获取设备的序列号 ..............158
问题二:设备故障,通过更换业务板无法解决 ...158
问题三:设备运行温度过高 ...................................158
问题四:双机切换只切换交换,路由无法自动切换 ..................................................159
恢复RAID-5 双硬盘数据 ...............................................159
故障现象 ...................................................................160
分析处理 ...................................................................160
故障处理 ...................................................................160
经验总结 ...................................................................160
顺序也能导致故障...........................................................161
故障排查 ...................................................................161
故障分析 ...................................................................162
经验总结 .................................................................162
更换MAC 地址排故障 ...................................................162
故障现象 ...................................................................162
故障排查过程 ...........................................................162
故障分析 ...................................................................163
为何无法创建线程...........................................................163
故障现象 ...................................................................163
故障分析 ...................................................................163
解决方法 ...................................................................164
关注交换机环路...............................................................164
故障描述 ...................................................................164
故障排查 ...................................................................164
故障处理 ...................................................................165
故障分析 ...................................................................165
经验总结 ...................................................................165
拒绝服务式攻击引故障...................................................165
故障排查 ...................................................................166
故障分析 ...................................................................166
事后措施 ...................................................................166
防火墙为何拒绝启动.......................................................166
故障现象 ...................................................................166
故障排查 ...................................................................167
故障解决 ...................................................................167
双机热备也有故障...........................................................167
故障现象 ...................................................................167
解决方案 ...................................................................167
实施步骤 ...................................................................168
经验总结 ...................................................................168
服务器搬家惹烦恼...........................................................168
故障排查 ...................................................................169
故障原因 ...................................................................169
解决办法 ...................................................................169
安装大硬盘受挫...............................................................169
故障现象 ...................................................................170
简述MBR 和GPT
....................................................170
加载大容量硬盘 .......................................................170
p style
|
|