


Install IIS under Win2K and configure asp+cgi+php+mysql_PHP tutorial
Install win2K, install IIS, among which Indexing Service, FrontPage 2000 Server Extensions, Internet Service Manager (HTML) should be installed, and there are others. In short, do not install any that are not needed. (According to the security principle, the least services + the least permissions = the greatest security.)
First, open the Internet Manager (Start-->Programs-->Management-->Internet Service Management) if installed as above , there is a default site and an SMTP service item. Select the default site and delete all directories below it. (Press the delete key on your keyboard) The easiest way to stop iis is: Start-->Run-->type net stop iisadmin Select Y and press Enter (the startup command is: net start w3svc) put Inetpub on the C drive Delete the directory completely (can only be deleted after stopping iis), create a new directory on another disk, and point the default site's home directory to the newly created directory in the IIS manager. If you need any permissions, you can slowly create the directory yourself. What is needed? What permissions are given?
(Pay special attention to the write permission and the permission to execute the program. Don't give it unless absolutely necessary. It is not given by default, so you don't need to study, haha...)
Application configuration: In IIS Manager Delete any useless mappings except those that are necessary, leaving ASP, ASA and other file types that you really need to use (except cgi, php, I think you have no use for the others. Delete htw, htr, idq, ida... ) Don’t know where to delete it? ? Method: Open Internet Service Management->Select Site->Properties->WWW Service->Edit->Home Directory->Configuration->Application Mapping, and then start deleting them one by one (it is really troublesome not to select them all). Then change the script error message to send text in the application debugging bookmark of the window just now (unless you want the user to know your program/network/database structure when an ASP error occurs). What should you write in the error text? Whatever you like, it's up to you. When you click OK to exit, don't forget to let the virtual directory inherit the attributes you set.
In order to deal with the increasing number of CGI vulnerability scanners, there is another tip you can refer to. Redirect the HTTP404 Object Not Found error page to a customized HTM file through the URL in IIS, which can scan most of the current CGI vulnerabilities. The device malfunctions. In fact, the reason is very simple. For convenience when writing, most CGI scanners judge whether the vulnerability exists by looking at the HTTP code of the returned page. For example, the famous IDQ vulnerability is generally tested by taking 1.idq. If If HTTP200 is returned, it is considered that there is a vulnerability. On the contrary, if HTTP404 is returned, it is considered that there is not. If you redirect the HTTP404 error message to the HTTP404.htm file through the URL, then all scans will return HTTP200 regardless of whether there is a vulnerability, 90% of the time. The CGI scanner will think that you have all kinds of vulnerabilities, but in the end, it will cover up your real vulnerabilities, leaving intruders at a loss and nowhere to start. However, from a personal point of view, I still think that doing a solid job in security settings is better than such a little trick. Much more important.
Win2000 account security is another key point. First of all, the default installation of Win2000 allows any user to obtain all accounts/share lists in the system through an empty user. This is originally to facilitate LAN users to share files, but a remote user can also obtain it. your user list and use brute force to crack user passwords. Many friends know that you can prohibit 139 empty connections by changing the registry Local_MachineSystemCurrentControlSetControlLSA-RestrictAnonymous = 1. In fact, the local security policy of win2000 (if it is a domain server, it is in the domain server security and domain security policy) has such an option RestrictAnonymous ( Additional restrictions on anonymous connections), this option has three values:
0: None. Rely on default permissions (None, depends on the default permissions)
1: Do not allow enumeration of SAM accounts and shares (do not allow Enumerate SAM accounts and shares)
2: No access without explicit anonymous permissions (no access is allowed without explicit anonymous permissions)
0 This value is the system default, there are no restrictions, remote users can know you All accounts, group information, shared directories, network transmission lists (NetServerTransportEnum, etc.) on the machine are very dangerous for the server.
1 This value only allows non-NULL users to access SAM account information and shared information. .
2 This value is only supported in win2000. It should be noted that once you use this value, your sharing will probably be ruined, so I recommend that you set it to 1. >Okay, now the intruder has no way to get our user list, our account is safe... Wait, there is at least one account that can change the password. This is the built-in administrator of the system. What should I do? To change it, right-click administrator in Computer Management->User Account and change the name to whatever you want, as long as you can remember it. After changing the super-admin user name, you can still see it on the login interface of Terminal Service (you can change it to whatever you like). You will remember it after logging in). Modification method: run regedit, find the Don't Display Last User Name string data in the HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsNTCurrentVersionwinlogon item and change it to 1, so that the system will not automatically display the last login user name.
For security, you can also turn on TCP/IP filtering, right-click Network Places on the desktop->Properties->right-click the network card you want to configure->Properties->TCP/IP->Advanced->Options->TCP /IP filtering, there are three filters here, namely: TCP port, UDP port and IP protocol TCP port. Click "Only allow", and then add the port you need to open below. Generally speaking, the WEB server only needs to open 80 (www), the FTP server needs to open 20 (FTP Data), 21 (FTP Control), 3306 (Mysql), 3389 (remote terminal control, if your host is hosted in someone else's computer room and cannot be operated directly, you need this) The mail server may need to open 25 (SMTP) and 110 (POP3). I have not researched the ports, but if you follow the services provided in this article, you only need to open the above few. (80, 20, 21, 25, 3306, 3389)
cgi support
Download activeperl (available at

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics











To open an application pool in IIS: 1. Open IIS Manager; 2. Navigate to the "Application Pools" node; 3. Right-click the target application pool and select "Manage"; 4. Click "Advanced Settings" Tab; 5. Application pool configuration can be viewed and modified here.

Converting an HTML file to a URL requires a web server, which involves the following steps: Obtain a web server. Set up a web server. Upload HTML file. Create a domain name. Route the request.

Installing Go language under Win7 system is a relatively simple operation. Just follow the following steps to successfully install it. The following will introduce in detail how to install Go language under Win7 system. Step 1: Download the Go language installation package. First, open the Go language official website (https://golang.org/) and enter the download page. On the download page, select the installation package version compatible with Win7 system to download. Click the Download button and wait for the installation package to download. Step 2: Install Go language

Yes, it is possible to delete IIS log files. Removal methods include selecting the website or application pool through IIS Manager and deleting the log file in the Log Files tab. Use a command prompt to go to the log file storage directory (usually %SystemRoot%\System32\LogFiles\W3SVC1) and use the del command to delete the log file. Use third-party tools such as Log Parser to automatically delete log files.

Detailed steps to install Go language on Win7 computer Go (also known as Golang) is an open source programming language developed by Google. It is simple, efficient and has excellent concurrency performance. It is suitable for the development of cloud services, network applications and back-end systems. . Installing the Go language on a Win7 computer allows you to quickly get started with the language and start writing Go programs. The following will introduce in detail the steps to install the Go language on a Win7 computer, and attach specific code examples. Step 1: Download the Go language installation package and visit the Go official website

How to download 360 Secure Browser on your computer? It is a very secure web browser software. This browser is very rich in functions and very simple to operate. Using 360 Secure Browser to browse the web can protect user privacy and security very well. Many people like to use this browser. Browser office, but many people still don’t know how to download and install 360 Secure Browser on their computers. This article will give you a detailed introduction to the installation process of the 360 Safe Browser PC version, hoping to help you solve the problem. Overview of the installation process under the computer version of 360 Secure Browser 1. On the computer’s main page, find “360 Software Manager” and enter (as shown in the picture). 2. Open 360 Software Manager and find the search box (as shown in the picture). 3. Click Search

The IIS Application Pool Setup Guide provides detailed instructions for configuring application pools directly in IIS Manager: application name, mode, launch type managed mode, authentication, loading user profile 32-bit application enablement, recycling frequency and reason Application path, hosting mode, initial memory allocation virtual directory, initialization module, fault isolation mode

Essential PHP programs: Install these to run smoothly! PHP is a popular server-side scripting language that is widely used to develop web applications. To successfully run a PHP program, you first need to install some necessary software and tools on the server. In this article, we will introduce the software and tools that must be installed, along with specific code examples to help you run PHP programs smoothly. 1. PHP interpreter The core of the PHP program is the PHP interpreter, which is responsible for parsing and executing PHP code. To install the PHP interpreter, you can follow
