123ArticleOnline Logo
Welcome to 123ArticleOnline.com


Here's the recent articles submitted by yang ws

Articles By yang ws

Page: << <   [11]  12  13  14    > >>


Considerations For Designing A Secure Content Management Strategy    Submitted as: unknownmem
Content should be moved to the Web server in a secure manner. Automatic updates from test servers is not a secure method unless the test server is as secure as the production server. It makes no sense to allow changes made to an insecure server to automatically propagate to the production server.(read entire article)
View : 248 Times
Category : Education

Guidelines For Designing Monitoring And Maintenance Strategies For Iis    Submitted as: unknownmem
Enable Only Necessary Components The business needs of the organization will dictate the Web applications that will run on the server. In an ideal world, the security designer will be called upon to assist in the application design to ensure that the best choices are made at that time to support security.(read entire article)
View : 236 Times
Category : Education

Designing Iis Security Baselines    Submitted as: unknownmem
The Background Intelligent Transfer Service (BITS) is used to provide background file transfers. It is used when automatic updates are enabled. If auto- matic updating is disabled, this service should be disabled as well(read entire article)
View : 269 Times
Category : Computers

Guidelines For Designing Access Control For Databases On The Web Server    Submitted as: unknownmem
Databases can restrict access via database resident controls. The NTFS permissions set on the database file itself might not be relevant except to provide system and administrative access for file management.(read entire article)
View : 240 Times
Category : Computers

Why It Is Important To Understand Impersonation    Submitted as: MCSA Certification,Windows XP Professional,free Mi
it can result in Web applications that will not run, except for running anonymously or when using the administrator account. Unfortunately, this could result in an unsophisticated IT administrator, in an attempt to solve the compatibility problem, giving users who must run the application membership in the local administrators group on the Web server(read entire article)
View : 236 Times
Category : Education

Guidelines For Configuring Web Servers To Isolate Web Sites And Applications    Submitted as: unknownmem
Many departments within an organization might have departmental Web sites. It is cost prohibitive to establish and maintain a server for each department. A Web server with multiple Web sites,however, can meet this need and provide a better opportunity to secure and maintain security for all Web sites.(read entire article)
View : 216 Times
Category : Computers

Use Web Site Permissions    Submitted as: unknownmem
NTFS permissions affect both Web site visitors and those who access the file system through some other means. If the NTFS settings and the Web site permissions conflict, the most restrictive permission will be the one that determines the action that can take place.(read entire article)
View : 214 Times
Category : Education

Designing Iis Security Baselines Based On Business Needs    Submitted as: unknownmem
business needs are identified in the first column, IIS features that might be required to support those needs are provided in the second column, and suggestions for security to accommodate the business needs are shown in the third column.(read entire article)
View : 230 Times
Category : Computers

How To Isolate Web Sites And Applications    Submitted as: unknownmem
Each application pool uses virtually mapped memory that is not available to other processes. Use file system ACLs to support isolation. You can also tighten security by providing isolation within the metabase. Administration of specific application pools can be restricted to the Web site author and administrator.(read entire article)
View : 311 Times
Category : Education

Choosing Security To Meet Business And Technical Needs    Submitted as: unknownmem
Permissions on executables will allow execution, but they won't allow Write permissions. Any data that users must enter into forms will be written to databases on a SQL Server server, not to local Web pages.(read entire article)
View : 238 Times
Category : Education

See As RSS
Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: