1。
Microsoft Security Bulletin MS02-064
Windows 2000 Default Permissions Could Allow Trojan Horse Program (Q327522)
解决:参考 Windows XP 作为缺省权限. The default permissions for the root directory on the system drive for Windows XP are:
• Administrators: Full Control
• Creator Owner: Full Control (Subfolders and Files)
• System: Full Control
• Users: Read & Execute (This folder, subfolders, and files)
• Users: Create Folders / Append Data (This folder and Subfolders)
• Users: Create Files / Write Data (Subfolders only)
• Everyone: Read & Execute
或用自定义安全模板:
在安全模板文件 [File Security] 部分加入跟Windows XP一样的语句 (不能打断,只能一行加入).
"%SystemDrive%/",0,"D:AR(A;OICI;GA;;;BA)(A;OICI;GA;;;SY)(A;OICIIO;GA;;;CO)
(A;CIOI;GRGX;;;BU)(A;CI;0x00000004;;;BU)(A;CIIO;0x00000002;;;BU)(A;;GRGX;;;WD)"
2。
Microsoft Security Bulletin MS03-008
Flaw in Windows Script Engine Could Allow Code Execution (814078)
Impact of vulnerability:Run Code of Attacker's Choice
解决:安装补丁 - 用于 Windows 2000 和 XP 的 JScript 5.6 安全修补程序 - Q814078
3。
IE zone
Script ActiveX controls marked safe for scripting Enable -> Disable
Submit nonencrypted form data(提交非加密表单) Enable -> Prompt
4。
MS03-030 Unchecked Buffer in DirectX Could Enable System Compromise (819696)
解决:安装
Windows 2000 安全修补程序:DirectX 中未经检查的缓冲区可导致系统安全漏洞
博客介绍了多个Windows系统安全问题及解决办法。包括Windows 2000默认权限可能允许木马程序,可参考Windows XP权限或用自定义安全模板;Windows脚本引擎缺陷可允许代码执行,需安装补丁;IE区域设置调整;DirectX未检查缓冲区可致系统受损,需安装安全修补程序。
779

被折叠的 条评论
为什么被折叠?



