<Return to the public list of news
The server hosts things you don't know!
Release time: 2022-02-09 16:36:01
What should you know most about server hosting? For enterprises that want to choose server hosting, what should be paid special attention to when choosing server hosting? For enterprises that think they understand the common precautions in server hosting, let's introduce the precautions of server hosting that you don't know.
1. Information of service providers: Have formal and legal qualifications, that is, ISP certificate. ISP license is a business license issued by the state to operate Internet access business (that is, we usually do virtual host and server rental hosting business). Here you should pay attention to the fact that some individual people deceive customers by using ICP certificates, because ICP certificates and ISP certificates look the same. Attention should be paid to distinguish: the business type of ICP card is information service business, that is, it can only do business website content, while the business type of ISP card is Internet access service business, which is the proof of virtual host and server hosting and leasing business. Time of incorporation. The newly established companies are generally still in the development stage, and there are risks in operation. It is better to find some old companies with a long operation time to cooperate. They have a long operation time, experience and strong risk resistance ability. In this way, you don't have to worry. If you pay today, you won't see anyone tomorrow. The company's reputation in the local market. Generally, we need to find some well-known and reputable companies to cooperate with, such as Tengyou Technology, which will provide better service, strong technical strength and guaranteed after-sales service. 2. Conditions of the machine room: Geographic location, nearby traffic, how far is the subway bus station, the nearest route for driving, select a good address for future maintenance, and where is close to the company, problems can be solved in a timely manner The actual utilization rate of the machine room can be known by the size of the machine room, the number of floors, the number of cabinets, and the number of unused ones Infrastructure of the machine room: power supply system, how many mains power supplies, how many backup oil engines, how much capacity of a single cabinet, how many PDU connections, how many UPS, how many minutes of full load backup; Air conditioning system, constant temperature (23 ± 1 ℃), humidity (40-50%) and air supply. Security is the most important issue. How to enter the computer room (using ID card or fingerprint system)? Is there a monitoring system? Is there someone on duty 24 hours a day? Is there any immediate solution to the problem. 3. Operating system security Maybe some friends will often respond that the server has been hacked in again, and they have to go to the data center at least twice a week. What should we do? After installing the operating system, install an anti-virus software immediately, and upgrade the operating system patches, as well as the anti-virus virus database and feature database. At this time, you should never wander on the server. There are many virus trojans on the Internet. After the upgrade, quickly set some basic security permissions, including the permissions of each disk partition and directory, and even refine the security settings of related files. The specific permission settings will not be discussed in detail here. Permission settings are different for different operating systems and application directions. Do not copy the online tutorials intact, or you will suffer losses. 4. Security of application software Do not install software on the server that has nothing to do with your server, including Windows operating system and Linux operating system. It is recommended that you use the latest version of application software, such as the FTP software Serv-U under the Windows operating system. It is believed that more than 80% of the cases where the server is hacked are because the Serv-U version on the server is too low, combined with vulnerabilities in other places. Of course, there are reasons why a new version of application software is promoted. 5. Security of website and database When a friend finishes writing the program, he directly uploads it to the server, sets up the website, and doesn't care if the client can access it. This is also a mistake. When writing the website program, the syntax and judgment of the program must be rigorous. After the database is installed, the latest database patch must be applied and some basic permission settings must be made. After the website program is transferred to the server, the permissions of relevant directories must be set in a timely manner. Although this cannot guarantee the security of the whole server, it will at least greatly reduce the possibility of server intrusion. 6. Antivirus software and firewall Maybe some friends complain that the server is installed with both anti-virus software and firewall, and the server is still invaded by hackers. It may be that your anti-virus software is not configured or your virus database is not upgraded, or your firewall is not configured. Even my friends around me will make this mistake. Installing anti-virus software is like installing ordinary applications. It is a bad habit to stop caring about it after it is installed and restarted. After installing anti-virus software, you should upgrade the virus database or signature to the latest within the first time after the server restarts, and make some simple configurations, such as boot scanning, Enter system scan or scheduled scan, etc. There is not much difference between installing an anti-virus software that has not been upgraded and installing no anti-virus software. Similarly, after the firewall is installed, it is also necessary to make corresponding settings, such as prohibiting external computers from pinging the computer (in fact, this function is the most basic function of any firewall), and prohibiting infrequently used external connection programs (do not add system updates or anti-virus software). 7. Service and port After the initial installation of the system, many services will be started. Some of these services are core services, and some are unnecessary services. Similarly, a service must open one or more ports. You can close these unnecessary services and ports immediately after the installation of the system, to strengthen the security of the system to some extent. So, which services and ports need to be closed? Then you need to have a deeper understanding of every service and common port that the system starts.