网络运维与管理2013超值精华本txt,chm,pdf,epub,mobi下载 作者: 《网络运维与管理》杂志社 出版社: 电子工业出版社 出版年: 2013-9 页数: 536 定价: 75.00元 装帧: 平装 ISBN: 9787121155499 内容简介 · · · · · ·《网络运维与管理》是面向网络技术管理人员的实用性期刊。本书是2012 年《网络运维与管理》各期内容的汇集,按照栏目分类进行汇总,内容详尽实用,保留价值高。全书分为安全管理、故障诊断、系统运维、网络管理和终端管理板块,共精选数百篇实用、精彩的技术文章,是广大网管员不可多得的业务指导书。 本书读者对象以网络管理技术人员(网管员)为主,包括网络管理主管、网络爱好者、准网管和所有关注网络应用与网络事业发展的人士。 目录 · · · · · ·第1 章 安全管理为虚拟机打补丁...................................................................2 补丁安装更新的方式及工具 .......................................2 下载安全补丁 ...............................................................2 启动SSH 远程连接服务 ..............................................3 ESXi 主机进入维护模式 .............................................3 · · · · · · () 第1 章 安全管理 为虚拟机打补丁...................................................................2 补丁安装更新的方式及工具 .......................................2 下载安全补丁 ...............................................................2 启动SSH 远程连接服务 ..............................................3 ESXi 主机进入维护模式 .............................................3 使用命令行方式打补丁 ...............................................3 后续操作 .......................................................................4 多管齐下的反黑纪实...........................................................4 配置方案 .......................................................................4 怪异现象 .......................................................................4 处理措施 .......................................................................5 清除中毒后遗症...................................................................5 百度打不开 ...................................................................6 U 盘不能进行写操作 ...................................................6 管好密码...............................................................................7 快速删除网络访问密码 ...............................................7 禁止网络自动记忆密码 ...............................................7 巧妙更换网络登录密码 ...............................................8 使用U 盘轻松重设密码 ..............................................8 强制使用高级安全加密 ...............................................8 拒绝登录使用空白密码 ...............................................9 实现实名制上网...................................................................9 技术方案 .......................................................................9 管理方案 .....................................................................10 存在问题 .....................................................................10 加固Serv-U 保护FTP .......................................................10 完善日志记录 .............................................................11 加固密码和限制登录 .................................................11 防治探测弱口令攻击 .................................................11 减小系统开销,屏蔽频繁的匿名登录 .....................12 FTP 域离线自动发短信到网管手机 .........................12 管控进程,让系统无忧.....................................................13 批量删除顽固进程 .....................................................13 提供纯净进程环境 .....................................................13 生成顽固进程拒绝名单 .............................................14 智能调整进程优先级 .................................................14 判断进程危险等级 .....................................................15 拒绝隐藏账号.....................................................................15 动态监控创建痕迹 .....................................................15 强制显示登录痕迹 .....................................................16 巧妙删除隐藏账号 .....................................................16 文件遭窃抓“真凶”...........................................................17 发现疑似信息泄露事件 .............................................17 揪出作案者的尾巴 .....................................................17 总结 .............................................................................19 巧用防火墙保护公网服务器.............................................19 服务器无法登录 .........................................................19 初步解决问题 .............................................................19 问题再次出现 .............................................................20 彻底解决问题 .............................................................20 替换法找回MySQL 密码 .................................................21 MySQL 的加密机制 ...................................................21 MySQL 的存储方式 ...................................................22 替换法破解MySQL 密码 ..........................................22 不让病毒通过磁盘传播.....................................................23 封锁隐藏共享后门 .....................................................23 封锁存储写入通道 .....................................................23 封锁自动播放后门 .....................................................24 封锁分区访问通道 .....................................................24 封锁病毒运行后门 .....................................................24 安全使用带毒软件.............................................................24 一、环境准备 .............................................................25 二、软件安装程序带毒 .............................................26 三、软件主程序带毒 .................................................26 四、直接使用的软件带有病毒 .................................27 谨防共享文件泄露信息.....................................................27 通过net share 命令定位 .............................................27 通过资源管理器定位 .................................................27 通过共享控制台定位 .................................................28 通过网络位置定位 .....................................................28 通过目录管理器定位 .................................................29 通过专业工具定位 .....................................................29 停用易泄露信息的功能.....................................................30 停用“文档保留”功能 .............................................30 停用搜索保留功能 .....................................................30 停用隐藏共享功能 .....................................................31 停用感染报告功能 .....................................................32 停用脱机同步功能 .....................................................32 停用登录监控功能 .....................................................32 停用网络发现功能 .....................................................33 基于角色认证的远程接入配置.........................................33 一、创建AAA 认证服务器 ......................................33 二、创建用户及用户组 .............................................34 三、创建角色 .............................................................34 四、创建角色映射规则 .............................................34 五、将角色映射规则与AAA 服务器绑定 ..............34 六、配置SCVPN 地址池 ..........................................34 七、配置SCVPN 实例——创建实例 ......................34 八、创建SCVPN 所属安全域 ..................................35 九、创建隧道接口并引用SCVPN 隧道 ..................35 十、创建安全策略不同角色的用户放行不同服务 .35 十一、SCVPN 用户登录验证 ...................................35 临时离开系统也无忧.........................................................35 开启登录显示功能 .....................................................36 监控偷偷操作行为 .....................................................36 加锁已经启用程序 .....................................................36 全面保护服务器.................................................................37 网络现状分析 .............................................................37 存在的问题 .................................................................37 改造方案 .....................................................................38 防火墙配置 .................................................................38 集中管理区交换机配置 .............................................38 项目经验总结 .............................................................38 抓住抢占流量的真凶.........................................................39 起因 .............................................................................39 分析 .............................................................................39 问题排除 .....................................................................39 寻找ARP 攻击源 .......................................................39 防范ARP 攻击 ...........................................................41 让密码策略个性化.............................................................42 用Paros 检查Web 安全漏洞 ............................................43 Paros proxy 简介 .........................................................43 安装与配置 .................................................................44 使用注意事项 .............................................................46 解开IE 打开后就关闭之谜 ...............................................47 第一步,更改IE 的主页属性 ...................................47 第二步,查看“系统配置实用程序” .......................47 第三步,查杀病毒 .....................................................47 第四步,修改“注册表编辑器” ...............................48 第五步,惊现www.009c.com ...................................48 第六步,手工清除病毒程序 .....................................48 手动查杀“文件夹病毒”...................................................49 简单查杀病毒 .............................................................49 寻找病毒本体 .............................................................49 手工杀毒 .....................................................................50 运行机理及染毒症状 .................................................50 几点补充 .....................................................................51 防范硬盘泄露信息.............................................................51 使用shred ...................................................................51 使用DBAN .................................................................52 徒手“揪出”自启动病毒.................................................53 揪出启动文件夹中的病毒 .........................................53 揪出组策略设置中的病毒 .........................................53 揪出注册表启动项中的病毒 .....................................53 揪出服务列表中的病毒 .............................................54 揪出系统配置程序中的病毒 .....................................55 两招打造安全网络.............................................................55 一、网络拓扑 .............................................................55 二、安全需求 .............................................................56 三、通过访问控制列表对网络的通信流量进行过滤 ........................................56 四、配置防火墙进行功能区划分,进一步加强 网络安全 .....................................................................57 黑客主流入侵方式揭密.....................................................57 目录遍历漏洞暴露含有敏感信息的文件 .................58 网站后台路径、管理账号和密码采用默认设置而被入侵 .........................................58 因数据库未做任何防下载处理而被“拖库” ...........58 因存在注入漏洞而被猜解出账号、密码及后台 .....59 0Day 漏洞暴露敏感账号和密码 ...............................59 后记 .............................................................................59 ARP 攻击防范策略 ............................................................59 ARP 协议简介 ............................................................60 认识ARP 攻击 ...........................................................60 ARP 攻击防御策略 ....................................................61 路由器设置暗藏杀机.........................................................61 警惕定向广播威胁 .....................................................61 警惕固件BUG 威胁...................................................61 警惕登录密码威胁 .....................................................62 警惕SNMP 设置威胁 ................................................62 警惕Telent 协议威胁 .................................................63 寻找Solaris 后门 ...............................................................63 一、分析脚本文件bd ................................................64 二、分析脚本文件doc ..............................................64 三、分析脚本文件ps ................................................64 四、分析脚本文件Update ........................................65 五、发现need.tar 被植入系统 ..................................65 六、预防措施 .............................................................65 斩草要除根.........................................................................66 斩除网页表单中的隐私 .............................................66 斩除Index.dat 中的隐私 ............................................67 斩除Flash Cookie 中的隐私 .....................................68 制作自动安装补丁包.........................................................69 用IP 安全策略实现隔离 ...................................................70 认识IP 安全策略 .......................................................70 配置过程 .....................................................................70 经验总结 .....................................................................72 Windows 8 安全功能两则 .................................................72 图片加密让系统安全登录 .........................................72 安全提醒让安全及时知晓 .........................................73 顺利安装网络版客户端.....................................................74 瑞星客户端远程安装的方法 .....................................74 瑞星客户端远程安装过程中报错的处理方法 .........76 揪出潜藏威胁.....................................................................76 揪出潜藏陌生用户 .....................................................76 揪出潜藏的木马服务列表 .........................................77 揪出占用文件的黑手 .................................................78 揪出潜藏的自启动病毒 .............................................79 挖掘交换机自身功能.........................................................79 配置Root 保护功能 ...................................................79 配置攻击保护功能 .....................................................80 配置环路保护功能 .....................................................80 配置BPDU 保护功能 ................................................81 保证接入安全.....................................................................81 启用802.1x 认证功能 ................................................81 配置认证控制模式 .....................................................82 配置认证接入方式 .....................................................82 配置端口接入数量 .....................................................82 配置用户认证方法 .....................................................83 配置认证请求次数 .....................................................83 配置DHCP 触发认证 ................................................83 赤手空拳制服DLL 木马 ...................................................84 查找可疑进程 .............................................................84 找出可疑模块 .............................................................84 清除DLL 木马 ...........................................................85 手工清除Rose 木马...........................................................85 现象描述 .....................................................................85 处理过程 .....................................................................85 原因分析 .....................................................................87 经验总结 .....................................................................87 全面管理个人密码.............................................................87 密码设置 .....................................................................87 攻防结合,减少密码丢失概率 .................................87 养成正确的密码使用习惯 .........................................87 密码管理 .....................................................................88 管理好个人计算机 .....................................................88 顺利通过Web 登录VRV ..................................................88 VRV 安装在FAT32 格式分区 ...................................88 VRV 安装在NTFS 格式分区 ....................................89 降低权限让上网更安全.....................................................89 手工降低权限 .............................................................89 外力降低权限 .............................................................90 清除上网痕迹.....................................................................91 上网痕迹寻踪 .............................................................91 方法一,删除一般上网痕迹 .....................................92 方法二,删除顽固的Index.dat 文件 ........................92 方法三,清除已删除文件信息 .................................92 总结 .............................................................................92 挖掘防火墙安全功能.........................................................92 预防内网病毒 .............................................................93 控制非法接入 .............................................................93 限制主机上网 .............................................................94 过滤垃圾邮件 .............................................................94 注册表与网站安全.............................................................95 一、安全警告本领 .....................................................95 二、限制病毒本领 .....................................................95 三、预防信息泄露 .....................................................96 四、禁止程序本领 .....................................................96 五、控制优盘本领 .....................................................97 安全管控系统服务.............................................................97 揪出被替换的服务 .....................................................98 识别不安全的服务 .....................................................98 找出发生变化的服务 .................................................99 停用有威胁的服务 .....................................................99 远离内网恶意侵袭...........................................................100 远离隐藏共享攻击 ...................................................100 远离空连接攻击 .......................................................100 远离密码破解攻击 ...................................................101 远离Ping 洪水攻击 ..................................................101 远离程序漏洞攻击 ...................................................102 远离ARP 欺骗攻击 .................................................102 消灭Conficker 蠕虫 .........................................................103 遭遇蠕虫 ...................................................................103 出师不利 ...................................................................103 追本溯源 ...................................................................103 亡羊补牢 ...................................................................104 徒手应对宏病毒...............................................................104 走近宏病毒 ...............................................................104 及时发现宏病毒 .......................................................105 徒手清除宏病毒 .......................................................105 手工防范宏病毒 .......................................................106 “软硬”兼施防病毒.........................................................106 用好硬件设备安全功能是病毒防护“硬”道理 ...106 做好应用软件更新,提升基于应用的安全 ...........107 由防病毒引发的思考 ...............................................107 危险服务“险”在何处...................................................108 Remote Registry 恶意修改键值 ...............................108 Terminal Services 威胁远程管理 ............................108 Server 暴露隐藏共享 ................................................109 DNS Client 泄露访问行踪 .......................................109 Scheduler 自动定时攻击 ..........................................110 借路由器抗DDoS 攻击...................................................110 一、泛洪攻击防范 ...................................................110 二、扫描攻击防范 ...................................................111 三、单包攻击防范 ...................................................111 BIND 漏洞及升级 ............................................................112 MySQL 5.1 漏洞及升级 ...................................................113 1. 确认MySQL 的版本 ............................................113 2. 备份数据库中的数据 ...........................................113 3. 下载MySQL 5.1.63 版本 .....................................113 4. 安装MySQL 5.1.63 版本 .....................................113 5. 重启MySQL 服务 ................................................113 第2 章 故障诊断 供电引起视频终端故障...................................................115 公司现状 ...................................................................115 故障分析与解决 .......................................................115 经验总结 ...................................................................115 地线失灵导致网络故障...................................................116 电源地线故障网不通 ...............................................116 设备内部故障导致零地线存在电压 .......................116 设备外壳接地线老化导致接地故障 .......................116 解决SQL 2005 孤立用户问题 ........................................117 数据库访问出故障 ...................................................117 故障分析过程 ...........................................................117 故障排除 ...................................................................118 经验总结 ...................................................................118 网络接入典型故障处理...................................................118 故障一:路由器板卡故障导致网络不通 ...............118 故障二:路由器插槽故障导致网络不通 ...............118 故障三:上级结点参数配置导致网络无法连通 ...119 故障四:路由器接口工作模式设置不正确导致网络不通......................................119 故障五:协议封装错误导致网络不通 ...................119 小结 ...........................................................................119 交换机万兆模块升级录...................................................119 故障现象 ...................................................................119 故障排查过程 ...........................................................120 升级系统软件 ...........................................................120 经验总结 ...................................................................121 SSL VPN 部署与排障 ......................................................121 SSL VPN 部署情况 ..................................................121 SSL VPN 客户端的部署与安装 ..............................122 分社使用SSL VPN 访问总社内网速度缓慢 .........122 经验总结 ...................................................................122 服务器为何无法自动重启...............................................123 配置方案 ...................................................................123 故障现象 ...................................................................123 故障排查 ...................................................................123 经验总结 ...................................................................124 无缓存RAID 卡影响读/ 写性能 ....................................124 磁盘读/ 写速度异常缓慢 ........................................124 更换RAID 卡 ...........................................................125 经验总结 ...................................................................125 无线路由器也升级...........................................................125 故障现象 ...................................................................125 故障排查过程 ...........................................................125 故障分析 ...................................................................125 无线路由升级过程 ...................................................126 正确下载升级文件 ...................................................126 经验总结 ...................................................................126 策略路由引起的网络故障...............................................126 设置外网通道 ...........................................................127 故障现象 ...................................................................127 故障分析 ...................................................................127 故障解决 ...................................................................127 经验总结 ...................................................................127 两交换机接口不匹配引发故障.......................................127 故障现象 ...................................................................128 故障排查 ...................................................................128 故障分析 ...................................................................128 故障排除 ...................................................................128 组策略解决共享打印设置...............................................129 客户端无法安装打印机 ...........................................129 故障排除 ...................................................................129 故障解决 ...................................................................129 网站升级闹故障...............................................................130 问题一:网站维护提交数据时出错 .......................130 问题二:Web 服务器不定时中断服务 ...................130 RID 分配问题导致网络故障 ...........................................131 故障排查过程 ...........................................................131 解决方案 ...................................................................132 NAT 导致服务器解析故障 ..............................................133 故障分析 ...................................................................133 故障排查 ...................................................................133 解决办法 ...................................................................134 经验总结 ...................................................................134 慎用默认VLAN ..............................................................134 相关设备主要配置 ...................................................134 问题初步描述及解决办法 .......................................135 最终解决问题的方法 ...............................................135 问题原理分析 ...........................................................136 经验总结 ...................................................................136 路由器CPU 过载引故障 .................................................136 故障现象 ...................................................................136 原因分析 ...................................................................136 处理方式 ...................................................................137 VMware 为何无法安装64 位系统 .................................137 更改文件属主数据库出故障...........................................138 网络环境 ...................................................................138 故障现象 ...................................................................138 故障解决过程 ...........................................................138 处理周期出现的网络故障...............................................139 网络环境 ...................................................................139 故障现象 ...................................................................139 分析与处理 ...............................................................140 故障分析与解决 .......................................................140 经验总结 ...................................................................141 MySQL 自增字段为何报错 ............................................142 重装Forefront TMG 故障解析 ........................................142 无法安装配置存储服务器,提示端口2171 被使用 .................................................142 安装程序无法安装ADAM ......................................143 安装之后无法导入Forefront TMG 的配置 ............143 导入策略之后修改日志位置与计算机名称 ...........143 排查服务器重启故障.......................................................143 故障排查过程 ...........................................................143 故障分析 ...................................................................144 经验总结 ...................................................................145 添加账号引发应用故障...................................................145 故障排查 ...................................................................145 故障分析 ...................................................................145 故障解决 ...................................................................146 经验总结 ...................................................................146 配置不当造成DNS 解析故障.........................................146 故障排查 ...................................................................146 原因分析 ...................................................................147 经验总结 ...................................................................147 处理双路由器环境故障...................................................148 故障排查过程 ...........................................................148 用户网络结构说明 ...................................................148 故障解决 ...................................................................148 经验总结 ...................................................................149 接口性能降低惹故障.......................................................149 光电转换器性能降低引起的网络故障 ...................149 终端性能降低引起的网络故障 ...............................149 经验总结 ...................................................................150 下载加速造成附件打开故障...........................................150 故障排查过程 ...........................................................150 经验总结 ...................................................................151 查找意外的DHCP 服务 ..................................................151 故障现象 ...................................................................151 故障排查过程 ...........................................................151 故障解决 ...................................................................152 经验总结 ...................................................................152 DHCP 引起路由器级联故障 ...........................................152 故障现象 ...................................................................152 故障分析 ...................................................................152 解决方案 ...................................................................153 经验总结 ...................................................................153 Pppoe 应用故障分析........................................................153 服务端压力较大 .......................................................154 有标签的VLAN 中存在丢包 ..................................154 配置防火墙条目不能过多 .......................................154 Vista 和Windows 7 客户端拨号不成功 ..................154 系统升级造成上网故障...................................................155 故障现象 ...................................................................155 故障排查过程 ...........................................................155 故障排除 ...................................................................155 经验总结 ...................................................................155 时间问题引发论坛板块故障...........................................156 故障排查 ...................................................................156 故障解决 ...................................................................156 经验总结 ...................................................................156 追查系统访问缓慢的根源...............................................156 故障现象 ...................................................................157 故障排查过程 ...........................................................157 揭开谜底 ...................................................................157 故障分析 ...................................................................157 经验总结 ...................................................................158 拯救“生病”的防火墙...................................................158 问题一:设备死机,无法获取设备的序列号 ..............158 问题二:设备故障,通过更换业务板无法解决 ...158 问题三:设备运行温度过高 ...................................158 问题四:双机切换只切换交换,路由无法自动切换 ..................................................159 恢复RAID-5 双硬盘数据 ...............................................159 故障现象 ...................................................................160 分析处理 ...................................................................160 故障处理 ...................................................................160 经验总结 ...................................................................160 顺序也能导致故障...........................................................161 故障排查 ...................................................................161 故障分析 ...................................................................162 经验总结 .................................................................162 更换MAC 地址排故障 ...................................................162 故障现象 ...................................................................162 故障排查过程 ...........................................................162 故障分析 ...................................................................163 为何无法创建线程...........................................................163 故障现象 ...................................................................163 故障分析 ...................................................................163 解决方法 ...................................................................164 关注交换机环路...............................................................164 故障描述 ...................................................................164 故障排查 ...................................................................164 故障处理 ...................................................................165 故障分析 ...................................................................165 经验总结 ...................................................................165 拒绝服务式攻击引故障...................................................165 故障排查 ...................................................................166 故障分析 ...................................................................166 事后措施 ...................................................................166 防火墙为何拒绝启动.......................................................166 故障现象 ...................................................................166 故障排查 ...................................................................167 故障解决 ...................................................................167 双机热备也有故障...........................................................167 故障现象 ...................................................................167 解决方案 ...................................................................167 实施步骤 ...................................................................168 经验总结 ...................................................................168 服务器搬家惹烦恼...........................................................168 故障排查 ...................................................................169 故障原因 ...................................................................169 解决办法 ...................................................................169 安装大硬盘受挫...............................................................169 故障现象 ...................................................................170 简述MBR 和GPT ....................................................170 加载大容量硬盘 .......................................................170 ACL 引起HSRP 故障......................................................170 故障现象 ...................................................................170 故障排查 ...................................................................171 经验总结 ...................................................................171 解决AD 域服务故障 .......................................................172 AD 域服务问题 ........................................................172 故障解决方法 ...........................................................172 解决HMC 获取信息故障 ...............................................173 故障分析 ...................................................................173 故障排查 ...................................................................173 经验总结 ...................................................................174 排查OSPF 网络路由故障 ...............................................174 故障实例一:通过虚链路实现跨区域接入主干区域,但因路由器之间Vlink 配置错误,而无法学到上级路由 .......................................................174 故障实例二:OSPF 网络的末端区域引入Eigrp 协议路由,由于区域类型定义错误引起的路由故障.. ............. ...................175 一波三折重建磁盘阵列...................................................176 故障现象 ...................................................................176 故障处理 ...................................................................177 经验总结 ...................................................................177 数据公网旅行记...............................................................178 远程问诊 ...................................................................178 现场查看 ...................................................................178 探索求证 ...................................................................179 豁然开朗 ...................................................................179 真相大白 ...................................................................179 全零MAC 地址惹故障 ...................................................180 网络拓扑及故障现象 ...............................................180 故障分析及排除 .......................................................180 故障分析 ...................................................................181 经验总结 ...................................................................181 解决新闻采集乱码故障...................................................181 故障排查 ...................................................................182 故障分析 ...................................................................182 故障解决 ...................................................................182 日志过大服务器出故障...................................................183 故障排查 ...................................................................183 故障解决 ...................................................................184 故障分析 ...................................................................184 小型机重启丢失键盘.......................................................185 小型机重启后键盘无法使用 ...................................185 故障诊断用Diag ......................................................185 ASM 给计算机启动降速 .........................................187 经验总结 ...................................................................188 php-cgi 为何占用CPU 100% .........................................188 故障现象 ...................................................................188 故障分析 ...................................................................188 故障解决 ...................................................................189 远程解决内网故障...........................................................189 找出问题产生的原因 ...............................................190 解决问题需同步三个账号密码 ...............................190 排查80 端口故障.............................................................190 故障排查过程 ...........................................................191 故障排除 ...................................................................191 经验总结 ...................................................................191 排除交换机端口连通性故障...........................................192 排除物理层连通性故障 ...........................................192 排除VLAN 和中继故障 ..........................................192 排除VTP 故障 .........................................................193 排除生成树故障 .......................................................194 经验总结 ...................................................................194 解决HWTACACS 认证登录故障 ..................................194 网络结构 ...................................................................195 配置过程 ...................................................................195 验证操作 ...................................................................195 故障分析 ...................................................................195 经验总结 ...................................................................196 MAC 地址善变之谜 ........................................................196 故障现象 ...................................................................196 确定原因 ...................................................................196 经验总结 ...................................................................196 交换机配置错误导致故障...............................................197 故障现象 ...................................................................197 故障排查过程 ...........................................................197 故障分析 ...................................................................197 网关闹“罢工”.................................................................197 停电恢复后网络中断 ...............................................197 故障排查 ...................................................................198 故障处理 ...................................................................198 经验总结 ...................................................................198 解决电脑“神秘”开机故障...........................................198 故障排查 ...................................................................199 故障解决 ...................................................................199 经验总结 ...................................................................199 趋势数据库服务器重启之谜...........................................200 故障现象 ...................................................................200 故障排查过程 ...........................................................200 修改数据库备份时间 ...............................................201 故障分析 ...................................................................201 解决无线网络掉线故障...................................................201 环境因素影响信号传输 ...........................................201 无线AP 负载过大降低设备性能 ............................202 信道冲突引起通信效能降低 ...................................202 无线服务功能未完全开启 .......................................202 混合无线网络兼容性引起的掉线问题 ...................202 ARP 病毒欺骗造成通联故障 ..................................203 无线AP 开启MAC 地址过滤 .................................203 AP 参数设置不妥 .....................................................203 无线网卡驱动兼容性差 ...........................................203 网络安全隔离卡常见故障...............................................204 网络安全隔离卡的使用方式 ...................................204 故障一:初次安装网络隔离卡时,提示本地网络连接断开 ..........................204 故障二:安装的是IDE 网络隔离卡在未进入操作系统时,无法显示网络( 内、外网) 选择开机“菜单程序” .....................................................................204 故障三:当要切换内/ 外网时,提示隔离卡状态未知,造成切换失败而无法切换.....205 故障四:在正确安装网络隔离卡后,开机时提示找不到硬盘或系统...................205 经验总结 ...................................................................205 客户端组件更新遇麻烦...................................................205 故障排查 ...................................................................205 故障解决 ...................................................................206 经验总结 ...................................................................206 网段不通为哪般...............................................................207 故障排查过程 ...........................................................207 故障分析 ...................................................................207 经验总结 ...................................................................208 时间也会影响打印...........................................................208 故障排查 ...................................................................208 修改终端时间 ...........................................................208 故障解决 ...................................................................208 迁移地址段出故障...........................................................209 网络环境 ...................................................................209 网络环境的改变 .......................................................209 故障现象 ...................................................................209 最初的故障分析 .......................................................210 故障真相 ...................................................................210 解决措施 ...................................................................211 经验总结 ...................................................................211 一波三折查网卡...............................................................211 环境介绍 ...................................................................211 问题初现 ...................................................................211 现场体验 ...................................................................212 接近真相 ...................................................................212 完美解决 ...................................................................212 硬盘升级要兼容...............................................................213 硬件现状 ...................................................................213 新装硬盘无法识别 ...................................................213 故障排查过程 ...........................................................213 故障分析 ...................................................................213 光端机连接数引故障.......................................................214 网络环境 ...................................................................214 故障现象 ...................................................................214 故障分析 ...................................................................214 故障分析结果 ...........................................................215 故障解决 ...................................................................216 事后措施 ...................................................................216 排除硬盘分区故障...........................................................216 故障诊断 ...................................................................216 故障排除 ...................................................................216 经验总结 ...................................................................216 CentOS 为何出现丢包 .....................................................217 网络环境 ...................................................................217 故障现象 ...................................................................217 故障排查 ...................................................................217 故障解决 ...................................................................217 彻底解决 ...................................................................217 经验总结 ...................................................................218 私接路由惹麻烦...............................................................218 故障排查 ...................................................................218 故障分析 ...................................................................219 故障解决 ...................................................................219 排查Oracle 经典错误 ......................................................219 故障分析 ...................................................................220 故障解决 ...................................................................220 经验总结 ...................................................................221 排查无盘系统启动故障...................................................221 基本情况 ...................................................................221 故障现象 ...................................................................221 故障分析 ...................................................................221 故障排查 ...................................................................222 故障处理 ...................................................................223 经验总结 ...................................................................223 数据库实例名称惹麻烦...................................................223 故障排查 ...................................................................223 数据库实例名 ...........................................................224 经验总结 ...................................................................224 跳出360 安装死循环.......................................................224 故障排查 ...................................................................225 故障解决 ...................................................................225 计费系统升级网中断.......................................................225 故障排查 ...................................................................226 故障解决 ...................................................................226 故障分析 ...................................................................226 查找网段访问故障...........................................................226 故障现象 ...................................................................227 故障排查 ...................................................................227 故障解决 ...................................................................227 故障分析 ...................................................................227 用事件查看器解难题.......................................................227 故障排查过程 ...........................................................228 故障分析 ...................................................................228 故障解决 ...................................................................228 经验总结 ...................................................................229 供电引起视频终端故障...................................................229 公司现状 ...................................................................229 故障分析与解决 .......................................................229 经验总结 ...................................................................230 解决多核心网络安全设置故障.......................................230 问题描述 ...................................................................230 故障分析 ...................................................................230 故障排除 ...................................................................232 交换机万兆模块升级录...................................................232 故障现象 ...................................................................232 故障排查过程 ...........................................................232 升级系统软件 ...........................................................233 经验总结 ...................................................................234 SSL VPN 部署与排障 ......................................................234 SSL VPN 部署情况 ..................................................234 SSL VPN 客户端的部署与安装 ..............................235 分社使用SSL VPN 访问总社内网速度缓慢 .........235 经验总结 ...................................................................235 服务器为何无法自动重启...............................................236 配置方案 ...................................................................236 故障现象 ...................................................................236 故障排查 ...................................................................236 经验总结 ...................................................................237 无缓存RAID 卡影响读/ 写性能 ....................................237 磁盘读/ 写速度异常缓慢 ........................................238 更换RAID 卡 ...........................................................238 经验总结 ...................................................................238 无线路由器也升级...........................................................238 故障排查过程 ...........................................................238 故障分析 ...................................................................238 无线路由升级过程 ...................................................239 正确下载升级文件 ...................................................239 经验总结 ...................................................................239 策略路由引起的网络故障...............................................240 设置外网通道 ...........................................................240 故障现象 ...................................................................240 故障分析 ...................................................................240 故障解决 ...................................................................240 经验总结 ...................................................................240 两交换机接口不匹配引故障...........................................241 故障排查 ...................................................................241 故障分析 ...................................................................241 故障排除 ...................................................................241 配置RADIUS 协议常见故障 ..........................................242 RADIUS 协议 ...........................................................242 RADIUS 协议的交互流程 ......................................242 RADIUS 协议的配置 ...............................................243 故障一:用户本地认证总被拒绝 ...........................244 故障二:用户RADIUS 认证总被拒绝 ..................244 故障三:一个用户已经连入,在show aaa user时却看不到 ........................................244 故障四:并没有配置认证,仍能对用户进行认证 ..............................................244 小交换机造成上网掉线...................................................244 故障现象 ...................................................................245 故障排查过程 ...........................................................245 经验总结 ...................................................................246 第3 章 系统运维 设置计算机隔离访问.......................................................248 网络环境 ...................................................................248 限制其他VLAN 计算机访问财务服务器 ..............248 资源访问权限 ...........................................................249 安全组客户端计算机验证 .......................................250 用IPTraf 监控网络终端流量 ..........................................251 安装软件 ...................................................................251 查看网络流量 ...........................................................251 用OpenMeetings 免费搭建视频会议平台 .....................252 OpenMeetings 简介 ..................................................252 安装步骤 ...................................................................253 使用视频会议系统 ...................................................254 限制终端联外网...............................................................255 当前管控措施 ...........................................................256 外联通道建立过程 ...................................................256 远程访问MySQL ............................................................257 远程登录设置 ...........................................................257 远程访问指定的数据库 ...........................................258 收回用户权限 ...........................................................258 需要注意的问题 .......................................................258 经验总结 ...................................................................258 批处理解决进程假死.......................................................258 让Nginx 支持多证书.......................................................259 Nginx 不支持多证书 ................................................260 编译安装OpenSSL ...................................................260 编译安装Nginx(Nginx 平滑升级) .......................260 检测证书支持情况 ..................................................260 发布RemoteApp 注意事项 .............................................261 解决方法 ...................................................................261 操作步骤 ...................................................................261 用VMM 集中管理虚拟机...............................................262 概述 ...........................................................................263 虚拟机管理 ...............................................................263 其他虚拟化操作 .......................................................263 经验总结 ...................................................................264 反向DNS 解析扩充地址.................................................264 反向DNS 代理 .........................................................264 在防火墙上进行地址映射设置 ...............................265 搭建并配置DNS 服务器 .........................................265 搭建Apache 服务器,设置反向代理 .....................265 经验总结 ...................................................................266 批处理更新内网服务器...................................................266 分析问题 ...................................................................266 端口映射 ...................................................................266 编写批处理 ...............................................................266 设定计划任务 ...........................................................267 动态调整Linux 分区容量 ...............................................267 磁盘管理机制LVM .................................................267 实现LVM .................................................................268 经验总结 ...................................................................269 配置VSFTP 虚拟用户.....................................................269 安装VSFTP ..............................................................269 VSFTP 虚拟用户验证方式的配置 ..........................269 配置PAM 认证文件,用于虚拟用户认证 .............270 创建虚拟账号以及对应的系统账号 .......................270 创建配置文件 ...........................................................270 VBS 巧解接口断开问题 ..................................................271 解决问题思路 ...........................................................271 解决方案 ...................................................................272 效果检验 ...................................................................272 升级DHCP 服务器 ..........................................................272 DHCP 架构 ...............................................................272 原DHCP 服务器配置 ..............................................273 新服务器配置 ...........................................................273 Linux 中安装虚拟Windows ............................................275 安装增强功能,解放鼠标和剪切板 .......................275 添加共享文件夹,实现主机和虚拟机的文件共享 ........................................................275 修改系统,让普通用户也能在虚拟机中使用USB 硬件设备 .............................276 彻底卸载Oracle 数据库 ..................................................276 BAT 文件提高维护效率 ..................................................278 网络结构 ...................................................................278 排除网络故障经常遇到的问题 ...............................279 利用BAT 文件快速配置网卡的网络参数 .............279 经验总结 ...................................................................279 为ESXI 5.0 安装包加驱动 ..............................................280 基于Linux 平台的域名解析系统 ...................................281 方案设计 ...................................................................281 采用基于Linux 平台域名解析系统优势及关注的安全配置 .................................282 双机DNS 的优势 .....................................................282 基于Linux 平台的域名解析系统与DHCP 协同工作的优势 ......................282 基于Linux 平台域名解析系统的实现方法 ...........282 基于Linux 平台域名解析系统测试过程 ...............283 经验总结 ...................................................................283 远端开启“远程桌面连接”服务...................................284 正确配置DHCP 和DNS 服务器 ....................................285 CentOS 下更改MySQL 目录位置 ..................................286 安装MySQL .............................................................286 更改MySQL 目录 ....................................................287 常见问题及解决方法 ...............................................287 限制个人计算机接入网络...............................................288 企业网络环境 ...........................................................288 解决思路 ...................................................................288 部署策略 ...................................................................288 配置DHCP 服务器 ..................................................289 客户端计算机验证 ...................................................290 经验总结 ...................................................................290 CentOS 下挂载存储设备 .................................................291 挂载存储设备 ...........................................................291 挂载NTFS 格式设备 ...............................................291 自动挂载硬盘 ...........................................................292 问题解析 ...................................................................292 经验总结 ...................................................................292 OpenVPN 解决固定公网IP 问题 ...................................293 应用场景 ...................................................................293 应用需求 ...................................................................293 安装配置OpenVPN 服务器 ....................................293 安装配置OpenVPN 客户端 ....................................295 OpenVPN 服务器端Iptables 的设置 .......................295 设置OpenVPN 客户端的Iptables ...........................296 测试端口调用是否成功 ...........................................296 用拒绝功能实现URL 转向.............................................296 恢复Windows 单系统启动模式 .....................................297 在安装有Windows 7 系统的电脑上安装RedHat 系统 .......................................297 在Windows 7 系统中删除RedHat 系统 .................297 恢复电脑上Windows 7 单系统的启动模式 ...........298 经验总结 ...................................................................298 用户状态虚拟化...............................................................299 用户配置文件 ...........................................................299 部署共享文件夹 .......................................................300 配置漫游用户配置文件 ...........................................300 应用效果 ...................................................................301 其他注意事项 ...........................................................301 用iLO 远程管理HP 服务器 ...........................................301 为iLO 设置管理IP 地址 .........................................302 设置时区与时间服务器 ...........................................302 添加管理用户名 .......................................................302 添加License ..............................................................302 服务器电源控制 .......................................................303 虚拟光驱与软驱功能 ...............................................303 远程KVM .................................................................303 查看iLO 日志...........................................................303 系统信息 ...................................................................303 iLO 升级....................................................................303 批量激活3ds Max ............................................................304 要求与问题的发现 ...................................................304 问题分析 ...................................................................304 解决方法 ...................................................................304 Linux 中用yum 在本地装软件 .......................................305 使用光盘直接挂载到本地 .......................................305 使用Web Server 在局域网发布本地yum 源 .........305 经验总结 ...................................................................306 在TMG 2010 中选择出口线路 .......................................306 基于RTX 实现业务监控告警 .........................................308 腾讯通功能 ...............................................................308 系统设计流程 ...........................................................308 系统运行环境的配置 ...............................................308 告警功能实现 ...........................................................309 经验总结 ...................................................................310 Sersync 实现触发式文件同步 .........................................310 inotify 简介 ...............................................................310 Rsync 简介 ................................................................310 Sersync 简介 .............................................................311 Sersync 触发式文件同步实战 .................................311 经验总结 ...................................................................313 虚拟化整合系统资源.......................................................313 整合资源 ...................................................................313 几种主流虚拟化产品的比较 ...................................314 vSphere 云计算系统 .................................................314 虚拟化专业备份软件Vizioncore vRanger Pro .......314 虚拟化技术在信息系统中的应用 ...........................315 结论 ...........................................................................316 Linux 中快速加密文件 ....................................................316 利用Vi 程序加密文件 .............................................317 巧用颜色加密文件 ...................................................317 利用特殊文件名加密文件 .......................................317 重装数据库服务器秘籍...................................................318 给目录浏览功能加把锁...................................................319 目录加密 ...................................................................319 定时更换用户名及密码 ...........................................320 Serv-U 迁移到Vsftp ......................................................321 安装Vsftp .................................................................321 迁移用户数据 ...........................................................321 迁移FTP 账号 ..........................................................321 Vsftp 的安全设置 .....................................................321 管好密码...........................................................................322 密码保存问题 ...........................................................322 免费密码存储方案 ...................................................322 存储密码 ...................................................................322 一机多用...........................................................................323 选型 ...........................................................................323 安装Apache ..............................................................323 设置IP 型虚拟主机 .................................................324 设置名字型虚拟主机 ...............................................325 恢复EFS 加密文件 ..........................................................325 备份恢复私钥 ...........................................................326 了解恢复EFS 加密文件的原理 ..............................326 找回关键的文件和文件夹 .......................................326 解密EFS 加密文件 ..................................................326 巧用组策略维护学生电脑...............................................327 防止学生“禁用”本地连接,阻止电脑在上课期间脱离控制 ..........................................328 阻止设置“本地连接中的属性”,防止修改IP地址及网络连接的设置,保护多媒体教学系统正常运行 ...................................................................328 阻止访问控制面板,防止学生通过控制面板对键盘、鼠标、桌面属性和用户账户等内容的设置修改 ...................................................................329 阻止学生访问并修改注册表,导致系统出现错误 ..................................................329 DHCP 服务器批量绑定IP 地址 .....................................329 常规IP 地址绑定 .....................................................329 批量绑定IP 地址 .....................................................330 正确登录Oracle XE 首页 ................................................331 首次打开Oracle XE 首页 ........................................331 多次使用后打开Oracle XE 首页 ............................331 搭建网络在线直播系统...................................................332 实时平滑流式处理技术 ...........................................332 准备和安装 ...............................................................332 创建一个直播发布点 ...............................................333 向服务器发送实时视频 ...........................................333 终端安装播放插件 ...................................................334 远端开启“远程桌面连接”服务...................................335 简单方法实现视频点播...................................................336 在服务器上新建两个文件夹 ...................................336 设置视频快捷方式的属性 .......................................336 制作网页 ...................................................................337 巧用DOS 命令简化系统运维.........................................338 巧用DOS 监控系统关键进程 .................................338 巧用DOS 维护数据 .................................................338 远程管理服务器 .......................................................338 第4 章 网络管理 网络设备自动校对时间..................................................340 SNTP 配置 ................................................................340 “NAT”对网速的影响 .....................................................341 概述 ...........................................................................341 故障剖析 ...................................................................341 合理调整动态NAT 表 ............................................342 巧用VRRP 实现冗余备份 .............................................342 校园网光纤熔接应用.......................................................344 星级宾馆实现双向网业务...............................................345 网络规划 ...................................................................345 网络设备调试方法 ...................................................345 网络设备配置 ...........................................................345 为“老式”设备减压.......................................................348 静态路由 ...................................................................348 具体配置实施情况 ...................................................348 验证数据包走向 .......................................................349 扩展Ping ...................................................................349 解析VLAN 通信 .............................................................350 网络概况 ...................................................................350 解决思路 ...................................................................350 后续排除 ...................................................................350 总结 ...........................................................................351 搭建“安全型”无线网络环境.......................................352 连接网络设置 ...........................................................352 无线加密设置 ...........................................................352 开放下载端口设置 ...................................................352 无线路由器使用详解.......................................................353 无线路由器分类 .......................................................353 无线路由器安装 .......................................................353 无线路由器配置 .......................................................353 无线路由器功能 .......................................................354 3G 无线路由器 .........................................................355 无线路由器常见故障处理 .......................................355 总结 ...........................................................................356 PTN 技术与应用 ..............................................................357 PTN 概述 ..................................................................357 PTN 组网方式的特点 ..............................................357 基于PTN 组网的应用 .............................................358 应用PTN 后遇到的问题 .........................................359 总结 ...........................................................................359 “软硬结合”净化校园网.................................................360 策略管理 ...................................................................360 软件管理 ...................................................................360 将“10GbE”发挥到淋漓尽致 ......................................361 作为机房网络的“边缘聚合” ................................362 不仅应用于大型数据中心 ......................................362 智能交换的必备条件 ..............................................362 快速绑定IP 地址 .............................................................362 应用情况 ...................................................................363 网络环路“不再烦恼”.....................................................364 具体实现 ...................................................................364 全力以赴 迎接万兆铜缆 ...............................................365 居安思危 ..................................................................365 明确定义 ..................................................................365 万兆以太网的应用 ...................................................365 屏蔽与非屏蔽如何取舍 ...........................................365 Cat.6A 铜缆的测试...................................................366 总结 ...........................................................................366 开启防火墙的双网特性...................................................366 网络描述 ...................................................................366 具体配置方法 ...........................................................366 把好出口关 网关首当先...............................................368 部署安全网关 ...........................................................368 能效管理新思维...............................................................370 重视运营节能 ...........................................................371 智能化能效管理 .......................................................371 多措并举 限制带宽.......................................................371 DR.COM 用户管理系统 ..........................................372 EOC 局端 ..................................................................372 总结 ...........................................................................372 多VLAN 共享服务器 .....................................................373 轻松管理Linux 异构网络 ...............................................374 配置软件 ...................................................................375 运行软件 ...................................................................375 总结 ..........................................................................376 巧设路由表 实现双网关...............................................376 具体案例 ...................................................................376 双网双通 我有妙招.......................................................378 轻松实现网络实名制.......................................................379 提出需求 ...................................................................379 网络情况介绍 ...........................................................379 跨三层地址绑定 .......................................................379 实现地址绑定 ...........................................................380 使用效果 ...................................................................380 巧设路由器控制带宽.......................................................380 构建无收敛校园网...........................................................382 何为无收敛的校园网 ...............................................382 实现方式 ...................................................................382 无收敛校园网分析 ...................................................383 无线管理“ 位置”当先....................................................384 远离强磁场位置 .......................................................384 摆放好天线位置 .......................................................384 摆放在通风位置 .......................................................384 摆放在中心位置 .......................................................385 摆放在强信号位置 ...................................................385 排查防火墙故障...............................................................385 故障现象 ...................................................................386 排查过程 ...................................................................386 总结 ...........................................................................386 利用防火墙阻止可疑用户...............................................386 提升交换机稳定性...........................................................387 认识VRRP 协议.......................................................387 开通Ping 测试功能 ..................................................387 开通VRRP 报文检查...............................................388 管理虚拟IP 地址 .....................................................388 配置优先级参数 .......................................................388 管理地址绑定关系 ...................................................388 管理活动抢占方式 ...................................................389 配置报文间隔时间 ...................................................389 配置安全认证方式 ...................................................389 让服务器更省、更快、更安全.......................................390 电源开关技巧 ...........................................................390 定时除尘技巧 ...........................................................390 预防静电小窍门 .......................................................390 省电技巧 ...................................................................390 提高性能技巧 ...........................................................391 让交换机远离频繁死机...................................................391 控制接入负载 ...........................................................391 正确配置功能 ...........................................................392 营造合适环境 ...........................................................392 预防网络攻击 ...........................................................393 选择成熟产品 ...........................................................393 利用Wi-Fi 共享3G 上网 ................................................393 使用3G 无线路由器共享上网 ................................393 组建Ad-Hoc 网络共享3G 上网 .............................394 注意事项 ...................................................................395 补充 ...........................................................................395 巧用SuperVLAN ............................................................395 概述 ...........................................................................395 SuperVLAN 简介......................................................395 配置过程 ...................................................................396 环回接口 实现路由选择..............................................397 巧用无线路由器...............................................................399 无线路由器基本使用方法 .......................................399 无线路由器新型用法 ...............................................400 “不用加密”的无线路由器.............................................400 瞒天过海 ...................................................................400 调虎离山 ...................................................................401 欲擒故纵 ...................................................................401 假痴不癫 ...................................................................401 巧用VRRP 实现冗余备份 .............................................401 构建安全的数据交换平台...............................................403 构建安全可靠的数据网络平台 ...............................404 安全风险分析 ...........................................................404 控制措施 ...................................................................404 万兆模块安装实录...........................................................406 路由模式的校园网...........................................................407 机房防水不容忽视...........................................................409 漏水机房状况 ...........................................................409 经验教训 ...................................................................409 巧用防火墙 实现双网双待...........................................410 方案概述 ...................................................................410 配置方法 ...................................................................410 线路测试 ...................................................................411 用好远程管理...................................................................411 巧用SecureCRT 恢复IOS ...............................................413 巧用“黑洞路由”.............................................................414 现象描述 ...................................................................414 原因分析 ...................................................................415 改进措施 ...................................................................415 第5 章 终端管理 玩转增量备份...................................................................417 镜像备份法 ...............................................................417 新增备份法 ...............................................................417 时间记忆增量压缩备份法 .......................................418 实战终端应用程序虚拟化...............................................418 活学活用“影子备份”.....................................................420 为终端加“安全锁”.........................................................421 黑名单管理和过滤管理 ...........................................421 端口控制功能 ...........................................................422 邮件控制功能 ...........................................................422 上网行为控制功能 ...................................................422 应用管理 ...................................................................423 基于UNIX 平台的网管命令 ...........................................424 SSH4 ..........................................................................424 Rsync .........................................................................424 Top .............................................................................424 DF ..............................................................................425 Free ............................................................................425 Nagios ........................................................................425 巧用Sourceoffsite 进行资源管理 ...................................425 解决控制台菜单乱码问题...............................................426 简化客户端系统安装.......................................................428 补丁集成 ...................................................................428 制作无人值守应答文件 ...........................................428 制作Ghost 镜像文件 ...............................................429 改善Windows 2008 系统性能 ........................................429 “DIY”Windows 组策略 .................................................432 合理利用Linux 系统命令 ...............................................433 使用ThinRDP 软件巧妙访问终端服务 .........................434 隐藏加密让破解无从下手...............................................436 隐藏加密的原理 .......................................................436 创建普通加密卷 .......................................................437 创建隐藏加密卷 .......................................................437 细说ARP 欺骗防御术 .....................................................438 何为ARP 协议 .........................................................438 轻松应对ARP 欺骗攻击 .........................................438 数据文件彻底删除...........................................................440 下载与安装 ...............................................................440 数据备份与还原 .......................................................440 数据彻底粉碎 ...........................................................440 分区数据的另类擦除 ...............................................440 RunAS 命令的完美替身 ..................................................441 Windows 中的TFTP 服务 ...............................................442 开启TFTP 服务的方法 ............................................442 如何使用TFTP 传输文件 ........................................443 与TFTP 相关的安全技术 ........................................443 合理控制TFTP 的使用 ............................................443 电源管理小“专家”.........................................................444 为系统启动“减负”.........................................................445 认识Autoruns 工具 ..................................................445 管理程序启动项目 ...................................................445 管理IE 启动项目 .....................................................446 管理右键菜单启动项目 ...........................................446 管理计划启动项目 ...................................................446 TrustedInstaller 账户详解 ................................................447 找回丢失的Ubuntu 启动项.............................................450 无线设置巧修改...............................................................451 U 盘也能加解密 ...............................................................453 第一把自动锁:江民安全专家 ...............................453 第二把自动锁:CS Defande ....................................454 第三把自动锁:Advanced Encryption Package Professional .............................454 智能办公小助手...............................................................456 安装与注册 ...............................................................456 创建用户 ...................................................................456 即时通信 ...................................................................456 个人办公 ...................................................................457 工作流 .......................................................................457 跟骚扰窗口说“NO” .......................................................457 跟安全警告窗口说“NO” .......................................457 跟阻止提示窗口说“NO” .......................................458 跟新建链接窗口说“NO” .......................................458 跟检测提醒窗口说“NO” .......................................459 把系统控制权“抢回来”.................................................459 复制注册表文件 .......................................................459 掌控“账户”管理权限...................................................460 管理Guest 账户 ........................................................460 创建标准账户 ...........................................................460 控制管理员账户 .......................................................461 VBA 实现表间数据转换 .................................................461 IP 安全策略过滤客户端 ..................................................462 IP 安全策略 ..............................................................462 创建IP 安全策略 .....................................................463 添加IP 筛选器 .........................................................463 应用IP 安全策略 .....................................................463 巧设预读取文件...............................................................463 深入了解预读取文件属性 .......................................464 调整预读取功能 .......................................................464 清理预读取文件 .......................................................464 巧治杀毒“后遗症”.........................................................464 表内数据关系的校对.......................................................465 拯救Windows 8 中的Windows 7 ...................................467 启动系统 ...................................................................467 删除Windows 8 系统文件 .......................................467 移动Windows 7 系统文件 .......................................467 轻松转换虚拟机文件.......................................................468 Excel 在绩效考核中的应用 ............................................469 在一个Excel 表中使用多个工作表 ........................469 不同工作表中的数据调用 .......................................470 善用Excle 的函数公式——SUM(汇总)函数 ....470 统计汇总工作 ...........................................................470 “Net send”命令的完美“搭档” ....................................471 Linux 系统三个好工具 ....................................................472 巧解Windows 7 启动异常 ..............................................472 Windows 8 系统的“新鲜”操作 ...................................473 善用安全功能,控制员工上网行为 .......................473 善借外力工具,让U 盘自动断电 ..........................474 善用网络认证,让上网访问安全 ...........................474 善用锁屏,让登录效率更高 ...................................475 向虚拟机中复制文件.......................................................475 常规方法 ...................................................................475 虚拟机下的“独门暗器” .........................................476 让Ping 探测“不走寻常路” ...........................................477 为Ping 命令找个“好搭档” ....................................477 拒绝复杂参数,简单操作Ping 命令 ......................478 让Ping 命令拥有3D 操作界面 ...............................478 搞定Word“安全模式” ...................................................479 无法进入系统的应急措施...............................................480 用Ghost XP 来重装系统 .........................................480 用外挂硬盘的方式转储数据 ...................................480 用Windows PE 与ERD2007 方式模拟进入系统 ....480 总结 ...........................................................................481 巧解无线网卡小故障 ......................................................481 保留Outlook“2003 版本” .............................................481 故障原因 ...................................................................482 解决办法 ...................................................................482 解决Ghost XP 的安装问题 .............................................482 将“百度搜索”请到Word 中 ........................................483 “吉特盒子”让搜索再快些.............................................484 基本功能 ...................................................................484 快捷操作 ...................................................................485 今天您修改密码了吗.......................................................485 巧用批处理 解决重复工作...........................................486 恢复Windows 2008 正常状态 ........................................487 巧用“宏”给Word 加密 ................................................489 删除“多余”的Guest 账户 ...........................................490 升级内存的一波三折.......................................................491 让Administrator 账户“蒸发” ........................................492 我的空间我做主...............................................................493 系统还原 ...................................................................493 休眠文件 ...................................................................493 虚拟内存文件 ...........................................................493 临时文件 ...................................................................493 谁占用了我的硬盘空间...................................................494 查找占用硬盘空间的罪魁祸首 ...............................494 对付Temporary Internet Files 的方法 .....................495 为任务管理器找个金牌替身...........................................495 深挖掘 让打印更精彩...................................................497 实现网页完美打印 ...................................................498 实现打印远程管理 ...................................................498 实现打印安装恢复 ...................................................499 实现均衡网络打印 ...................................................499 巧用好压完成木马扫描...................................................500 玩转“双网双待”.............................................................500 巧往SQL 中存数据 .........................................................502 智能监控不让下载假死...................................................502 指定监控目标 ...........................................................502 配置监控参数 ...........................................................503 让下载不掉线 ...........................................................503 妙用FastCopy 保护您的隐私 .........................................504 为文件安装“时间锁”.....................................................504 为密码设置“保质期” .............................................504 为自动加解密巧设“有效期” .................................505 为文件夹加密巧设“延迟锁” .................................506 Windows 7 打印更灵活 ...................................................507 实现智能切换打印 ...................................................507 实现文件目录打印 ...................................................508 实现文档批量打印 ...................................................508 实现文档虚拟打印 ...................................................509 为网络端口装上“加密锁”.............................................509 巧妙突破访问配额限制...................................................511 实现思路 ...................................................................512 实现步骤 ...................................................................512 恢复驱动器访问通道.......................................................513 远离IE 9 窗口骚扰 ..........................................................514 远离安全警告窗口 ...................................................514 远离阻止提示窗口 ...................................................514 远离新建链接窗口 ...................................................515 远离检测提醒窗口 ...................................................515 · · · · · · () |
通俗易懂的语言描述出来
大爱,好好看
好的话也推荐别人看
等看完再追评~