《网络运维与管理2013超值精华本》电子书下载

网络运维与管理2013超值精华本txt,chm,pdf,epub,mobi下载
作者: 《网络运维与管理》杂志社
出版社: 电子工业出版社
出版年: 2013-9
页数: 536
定价: 75.00元
装帧: 平装
ISBN: 9787121155499

内容简介  · · · · · ·

《网络运维与管理》是面向网络技术管理人员的实用性期刊。本书是2012 年《网络运维与管理》各期内容的汇集,按照栏目分类进行汇总,内容详尽实用,保留价值高。全书分为安全管理、故障诊断、系统运维、网络管理和终端管理板块,共精选数百篇实用、精彩的技术文章,是广大网管员不可多得的业务指导书。

本书读者对象以网络管理技术人员(网管员)为主,包括网络管理主管、网络爱好者、准网管和所有关注网络应用与网络事业发展的人士。





目录  · · · · · ·

第1 章 安全管理
为虚拟机打补丁...................................................................2
补丁安装更新的方式及工具 .......................................2
下载安全补丁 ...............................................................2
启动SSH 远程连接服务 ..............................................3
ESXi 主机进入维护模式 .............................................3
· · · · · · ()
第1 章 安全管理
为虚拟机打补丁...................................................................2
补丁安装更新的方式及工具 .......................................2
下载安全补丁 ...............................................................2
启动SSH 远程连接服务 ..............................................3
ESXi 主机进入维护模式 .............................................3
使用命令行方式打补丁 ...............................................3
后续操作 .......................................................................4
多管齐下的反黑纪实...........................................................4
配置方案 .......................................................................4
怪异现象 .......................................................................4
处理措施 .......................................................................5
清除中毒后遗症...................................................................5
百度打不开 ...................................................................6
U 盘不能进行写操作 ...................................................6
管好密码...............................................................................7
快速删除网络访问密码 ...............................................7
禁止网络自动记忆密码 ...............................................7
巧妙更换网络登录密码 ...............................................8
使用U 盘轻松重设密码 ..............................................8
强制使用高级安全加密 ...............................................8
拒绝登录使用空白密码 ...............................................9
实现实名制上网...................................................................9
技术方案 .......................................................................9
管理方案 .....................................................................10
存在问题 .....................................................................10
加固Serv-U 保护FTP .......................................................10
完善日志记录 .............................................................11
加固密码和限制登录 .................................................11
防治探测弱口令攻击 .................................................11
减小系统开销,屏蔽频繁的匿名登录 .....................12
FTP 域离线自动发短信到网管手机 .........................12
管控进程,让系统无忧.....................................................13
批量删除顽固进程 .....................................................13
提供纯净进程环境 .....................................................13
生成顽固进程拒绝名单 .............................................14
智能调整进程优先级 .................................................14
判断进程危险等级 .....................................................15
拒绝隐藏账号.....................................................................15
动态监控创建痕迹 .....................................................15
强制显示登录痕迹 .....................................................16
巧妙删除隐藏账号 .....................................................16
文件遭窃抓“真凶”...........................................................17
发现疑似信息泄露事件 .............................................17
揪出作案者的尾巴 .....................................................17
总结 .............................................................................19
巧用防火墙保护公网服务器.............................................19
服务器无法登录 .........................................................19
初步解决问题 .............................................................19
问题再次出现 .............................................................20
彻底解决问题 .............................................................20
替换法找回MySQL 密码 .................................................21
MySQL 的加密机制 ...................................................21
MySQL 的存储方式 ...................................................22
替换法破解MySQL 密码 ..........................................22
不让病毒通过磁盘传播.....................................................23
封锁隐藏共享后门 .....................................................23
封锁存储写入通道 .....................................................23
封锁自动播放后门 .....................................................24
封锁分区访问通道 .....................................................24
封锁病毒运行后门 .....................................................24
安全使用带毒软件.............................................................24
一、环境准备 .............................................................25
二、软件安装程序带毒 .............................................26
三、软件主程序带毒 .................................................26
四、直接使用的软件带有病毒 .................................27
谨防共享文件泄露信息.....................................................27
通过net share 命令定位 .............................................27
通过资源管理器定位 .................................................27
通过共享控制台定位 .................................................28
通过网络位置定位 .....................................................28
通过目录管理器定位 .................................................29
通过专业工具定位 .....................................................29
停用易泄露信息的功能.....................................................30
停用“文档保留”功能 .............................................30
停用搜索保留功能 .....................................................30
停用隐藏共享功能 .....................................................31
停用感染报告功能 .....................................................32
停用脱机同步功能 .....................................................32
停用登录监控功能 .....................................................32
停用网络发现功能 .....................................................33
基于角色认证的远程接入配置.........................................33
一、创建AAA 认证服务器 ......................................33
二、创建用户及用户组 .............................................34
三、创建角色 .............................................................34
四、创建角色映射规则 .............................................34
五、将角色映射规则与AAA 服务器绑定 ..............34
六、配置SCVPN 地址池 ..........................................34
七、配置SCVPN 实例——创建实例 ......................34
八、创建SCVPN 所属安全域 ..................................35
九、创建隧道接口并引用SCVPN 隧道 ..................35
十、创建安全策略不同角色的用户放行不同服务 .35
十一、SCVPN 用户登录验证 ...................................35
临时离开系统也无忧.........................................................35
开启登录显示功能 .....................................................36
监控偷偷操作行为 .....................................................36
加锁已经启用程序 .....................................................36
全面保护服务器.................................................................37
网络现状分析 .............................................................37
存在的问题 .................................................................37
改造方案 .....................................................................38
防火墙配置 .................................................................38
集中管理区交换机配置 .............................................38
项目经验总结 .............................................................38
抓住抢占流量的真凶.........................................................39
起因 .............................................................................39
分析 .............................................................................39
问题排除 .....................................................................39
寻找ARP 攻击源 .......................................................39
防范ARP 攻击 ...........................................................41
让密码策略个性化.............................................................42
用Paros 检查Web 安全漏洞 ............................................43
Paros proxy 简介 .........................................................43
安装与配置 .................................................................44
使用注意事项 .............................................................46
解开IE 打开后就关闭之谜 ...............................................47
第一步,更改IE 的主页属性 ...................................47
第二步,查看“系统配置实用程序” .......................47
第三步,查杀病毒 .....................................................47
第四步,修改“注册表编辑器” ...............................48
第五步,惊现www.009c.com ...................................48
第六步,手工清除病毒程序 .....................................48
手动查杀“文件夹病毒”...................................................49
简单查杀病毒 .............................................................49
寻找病毒本体 .............................................................49
手工杀毒 .....................................................................50
运行机理及染毒症状 .................................................50
几点补充 .....................................................................51
防范硬盘泄露信息.............................................................51
使用shred ...................................................................51
使用DBAN .................................................................52
徒手“揪出”自启动病毒.................................................53
揪出启动文件夹中的病毒 .........................................53
揪出组策略设置中的病毒 .........................................53
揪出注册表启动项中的病毒 .....................................53
揪出服务列表中的病毒 .............................................54
揪出系统配置程序中的病毒 .....................................55
两招打造安全网络.............................................................55
一、网络拓扑 .............................................................55
二、安全需求 .............................................................56
三、通过访问控制列表对网络的通信流量进行过滤 ........................................56
四、配置防火墙进行功能区划分,进一步加强
网络安全 .....................................................................57
黑客主流入侵方式揭密.....................................................57
目录遍历漏洞暴露含有敏感信息的文件 .................58
网站后台路径、管理账号和密码采用默认设置而被入侵 .........................................58
因数据库未做任何防下载处理而被“拖库” ...........58
因存在注入漏洞而被猜解出账号、密码及后台 .....59
0Day 漏洞暴露敏感账号和密码 ...............................59
后记 .............................................................................59
ARP 攻击防范策略 ............................................................59
ARP 协议简介 ............................................................60
认识ARP 攻击 ...........................................................60
ARP 攻击防御策略 ....................................................61
路由器设置暗藏杀机.........................................................61
警惕定向广播威胁 .....................................................61
警惕固件BUG 威胁...................................................61
警惕登录密码威胁 .....................................................62
警惕SNMP 设置威胁 ................................................62
警惕Telent 协议威胁 .................................................63
寻找Solaris 后门 ...............................................................63
一、分析脚本文件bd ................................................64
二、分析脚本文件doc ..............................................64
三、分析脚本文件ps ................................................64
四、分析脚本文件Update ........................................65
五、发现need.tar 被植入系统 ..................................65
六、预防措施 .............................................................65
斩草要除根.........................................................................66
斩除网页表单中的隐私 .............................................66
斩除Index.dat 中的隐私 ............................................67
斩除Flash Cookie 中的隐私 .....................................68
制作自动安装补丁包.........................................................69
用IP 安全策略实现隔离 ...................................................70
认识IP 安全策略 .......................................................70
配置过程 .....................................................................70
经验总结 .....................................................................72
Windows 8 安全功能两则 .................................................72
图片加密让系统安全登录 .........................................72
安全提醒让安全及时知晓 .........................................73
顺利安装网络版客户端.....................................................74
瑞星客户端远程安装的方法 .....................................74
瑞星客户端远程安装过程中报错的处理方法 .........76
揪出潜藏威胁.....................................................................76
揪出潜藏陌生用户 .....................................................76
揪出潜藏的木马服务列表 .........................................77
揪出占用文件的黑手 .................................................78
揪出潜藏的自启动病毒 .............................................79
挖掘交换机自身功能.........................................................79
配置Root 保护功能 ...................................................79
配置攻击保护功能 .....................................................80
配置环路保护功能 .....................................................80
配置BPDU 保护功能 ................................................81
保证接入安全.....................................................................81
启用802.1x 认证功能 ................................................81
配置认证控制模式 .....................................................82
配置认证接入方式 .....................................................82
配置端口接入数量 .....................................................82
配置用户认证方法 .....................................................83
配置认证请求次数 .....................................................83
配置DHCP 触发认证 ................................................83
赤手空拳制服DLL 木马 ...................................................84
查找可疑进程 .............................................................84
找出可疑模块 .............................................................84
清除DLL 木马 ...........................................................85
手工清除Rose 木马...........................................................85
现象描述 .....................................................................85
处理过程 .....................................................................85
原因分析 .....................................................................87
经验总结 .....................................................................87
全面管理个人密码.............................................................87
密码设置 .....................................................................87
攻防结合,减少密码丢失概率 .................................87
养成正确的密码使用习惯 .........................................87
密码管理 .....................................................................88
管理好个人计算机 .....................................................88
顺利通过Web 登录VRV ..................................................88
VRV 安装在FAT32 格式分区 ...................................88
VRV 安装在NTFS 格式分区 ....................................89
降低权限让上网更安全.....................................................89
手工降低权限 .............................................................89
外力降低权限 .............................................................90
清除上网痕迹.....................................................................91
上网痕迹寻踪 .............................................................91
方法一,删除一般上网痕迹 .....................................92
方法二,删除顽固的Index.dat 文件 ........................92
方法三,清除已删除文件信息 .................................92
总结 .............................................................................92
挖掘防火墙安全功能.........................................................92
预防内网病毒 .............................................................93
控制非法接入 .............................................................93
限制主机上网 .............................................................94
过滤垃圾邮件 .............................................................94
注册表与网站安全.............................................................95
一、安全警告本领 .....................................................95
二、限制病毒本领 .....................................................95
三、预防信息泄露 .....................................................96
四、禁止程序本领 .....................................................96
五、控制优盘本领 .....................................................97
安全管控系统服务.............................................................97
揪出被替换的服务 .....................................................98
识别不安全的服务 .....................................................98
找出发生变化的服务 .................................................99
停用有威胁的服务 .....................................................99
远离内网恶意侵袭...........................................................100
远离隐藏共享攻击 ...................................................100
远离空连接攻击 .......................................................100
远离密码破解攻击 ...................................................101
远离Ping 洪水攻击 ..................................................101
远离程序漏洞攻击 ...................................................102
远离ARP 欺骗攻击 .................................................102
消灭Conficker 蠕虫 .........................................................103
遭遇蠕虫 ...................................................................103
出师不利 ...................................................................103
追本溯源 ...................................................................103
亡羊补牢 ...................................................................104
徒手应对宏病毒...............................................................104
走近宏病毒 ...............................................................104
及时发现宏病毒 .......................................................105
徒手清除宏病毒 .......................................................105
手工防范宏病毒 .......................................................106
“软硬”兼施防病毒.........................................................106
用好硬件设备安全功能是病毒防护“硬”道理 ...106
做好应用软件更新,提升基于应用的安全 ...........107
由防病毒引发的思考 ...............................................107
危险服务“险”在何处...................................................108
Remote Registry 恶意修改键值 ...............................108
Terminal Services 威胁远程管理 ............................108
Server 暴露隐藏共享 ................................................109
DNS Client 泄露访问行踪 .......................................109
Scheduler 自动定时攻击 ..........................................110
借路由器抗DDoS 攻击...................................................110
一、泛洪攻击防范 ...................................................110
二、扫描攻击防范 ...................................................111
三、单包攻击防范 ...................................................111
BIND 漏洞及升级 ............................................................112
MySQL 5.1 漏洞及升级 ...................................................113
1. 确认MySQL 的版本 ............................................113
2. 备份数据库中的数据 ...........................................113
3. 下载MySQL 5.1.63 版本 .....................................113
4. 安装MySQL 5.1.63 版本 .....................................113
5. 重启MySQL 服务 ................................................113
第2 章 故障诊断
供电引起视频终端故障...................................................115
公司现状 ...................................................................115
故障分析与解决 .......................................................115
经验总结 ...................................................................115
地线失灵导致网络故障...................................................116
电源地线故障网不通 ...............................................116
设备内部故障导致零地线存在电压 .......................116
设备外壳接地线老化导致接地故障 .......................116
解决SQL 2005 孤立用户问题 ........................................117
数据库访问出故障 ...................................................117
故障分析过程 ...........................................................117
故障排除 ...................................................................118
经验总结 ...................................................................118
网络接入典型故障处理...................................................118
故障一:路由器板卡故障导致网络不通 ...............118
故障二:路由器插槽故障导致网络不通 ...............118
故障三:上级结点参数配置导致网络无法连通 ...119
故障四:路由器接口工作模式设置不正确导致网络不通......................................119
故障五:协议封装错误导致网络不通 ...................119
小结 ...........................................................................119
交换机万兆模块升级录...................................................119
故障现象 ...................................................................119
故障排查过程 ...........................................................120
升级系统软件 ...........................................................120
经验总结 ...................................................................121
SSL VPN 部署与排障 ......................................................121
SSL VPN 部署情况 ..................................................121
SSL VPN 客户端的部署与安装 ..............................122
分社使用SSL VPN 访问总社内网速度缓慢 .........122
经验总结 ...................................................................122
服务器为何无法自动重启...............................................123
配置方案 ...................................................................123
故障现象 ...................................................................123
故障排查 ...................................................................123
经验总结 ...................................................................124
无缓存RAID 卡影响读/ 写性能 ....................................124
磁盘读/ 写速度异常缓慢 ........................................124
更换RAID 卡 ...........................................................125
经验总结 ...................................................................125
无线路由器也升级...........................................................125
故障现象 ...................................................................125
故障排查过程 ...........................................................125
故障分析 ...................................................................125
无线路由升级过程 ...................................................126
正确下载升级文件 ...................................................126
经验总结 ...................................................................126
策略路由引起的网络故障...............................................126
设置外网通道 ...........................................................127
故障现象 ...................................................................127
故障分析 ...................................................................127
故障解决 ...................................................................127
经验总结 ...................................................................127
两交换机接口不匹配引发故障.......................................127
故障现象 ...................................................................128
故障排查 ...................................................................128
故障分析 ...................................................................128
故障排除 ...................................................................128
组策略解决共享打印设置...............................................129
客户端无法安装打印机 ...........................................129
故障排除 ...................................................................129
故障解决 ...................................................................129
网站升级闹故障...............................................................130
问题一:网站维护提交数据时出错 .......................130
问题二:Web 服务器不定时中断服务 ...................130
RID 分配问题导致网络故障 ...........................................131
故障排查过程 ...........................................................131
解决方案 ...................................................................132
NAT 导致服务器解析故障 ..............................................133
故障分析 ...................................................................133
故障排查 ...................................................................133
解决办法 ...................................................................134
经验总结 ...................................................................134
慎用默认VLAN ..............................................................134
相关设备主要配置 ...................................................134
问题初步描述及解决办法 .......................................135
最终解决问题的方法 ...............................................135
问题原理分析 ...........................................................136
经验总结 ...................................................................136
路由器CPU 过载引故障 .................................................136
故障现象 ...................................................................136
原因分析 ...................................................................136
处理方式 ...................................................................137
VMware 为何无法安装64 位系统 .................................137
更改文件属主数据库出故障...........................................138
网络环境 ...................................................................138
故障现象 ...................................................................138
故障解决过程 ...........................................................138
处理周期出现的网络故障...............................................139
网络环境 ...................................................................139
故障现象 ...................................................................139
分析与处理 ...............................................................140
故障分析与解决 .......................................................140
经验总结 ...................................................................141
MySQL 自增字段为何报错 ............................................142
重装Forefront TMG 故障解析 ........................................142
无法安装配置存储服务器,提示端口2171 被使用 .................................................142
安装程序无法安装ADAM ......................................143
安装之后无法导入Forefront TMG 的配置 ............143
导入策略之后修改日志位置与计算机名称 ...........143
排查服务器重启故障.......................................................143
故障排查过程 ...........................................................143
故障分析 ...................................................................144
经验总结 ...................................................................145
添加账号引发应用故障...................................................145
故障排查 ...................................................................145
故障分析 ...................................................................145
故障解决 ...................................................................146
经验总结 ...................................................................146
配置不当造成DNS 解析故障.........................................146
故障排查 ...................................................................146
原因分析 ...................................................................147
经验总结 ...................................................................147
处理双路由器环境故障...................................................148
故障排查过程 ...........................................................148
用户网络结构说明 ...................................................148
故障解决 ...................................................................148
经验总结 ...................................................................149
接口性能降低惹故障.......................................................149
光电转换器性能降低引起的网络故障 ...................149
终端性能降低引起的网络故障 ...............................149
经验总结 ...................................................................150
下载加速造成附件打开故障...........................................150
故障排查过程 ...........................................................150
经验总结 ...................................................................151
查找意外的DHCP 服务 ..................................................151
故障现象 ...................................................................151
故障排查过程 ...........................................................151
故障解决 ...................................................................152
经验总结 ...................................................................152
DHCP 引起路由器级联故障 ...........................................152
故障现象 ...................................................................152
故障分析 ...................................................................152
解决方案 ...................................................................153
经验总结 ...................................................................153
Pppoe 应用故障分析........................................................153
服务端压力较大 .......................................................154
有标签的VLAN 中存在丢包 ..................................154
配置防火墙条目不能过多 .......................................154
Vista 和Windows 7 客户端拨号不成功 ..................154
系统升级造成上网故障...................................................155
故障现象 ...................................................................155
故障排查过程 ...........................................................155
故障排除 ...................................................................155
经验总结 ...................................................................155
时间问题引发论坛板块故障...........................................156
故障排查 ...................................................................156
故障解决 ...................................................................156
经验总结 ...................................................................156
追查系统访问缓慢的根源...............................................156
故障现象 ...................................................................157
故障排查过程 ...........................................................157
揭开谜底 ...................................................................157
故障分析 ...................................................................157
经验总结 ...................................................................158
拯救“生病”的防火墙...................................................158
问题一:设备死机,无法获取设备的序列号 ..............158
问题二:设备故障,通过更换业务板无法解决 ...158
问题三:设备运行温度过高 ...................................158
问题四:双机切换只切换交换,路由无法自动切换 ..................................................159
恢复RAID-5 双硬盘数据 ...............................................159
故障现象 ...................................................................160
分析处理 ...................................................................160
故障处理 ...................................................................160
经验总结 ...................................................................160
顺序也能导致故障...........................................................161
故障排查 ...................................................................161
故障分析 ...................................................................162
经验总结 .................................................................162
更换MAC 地址排故障 ...................................................162
故障现象 ...................................................................162
故障排查过程 ...........................................................162
故障分析 ...................................................................163
为何无法创建线程...........................................................163
故障现象 ...................................................................163
故障分析 ...................................................................163
解决方法 ...................................................................164
关注交换机环路...............................................................164
故障描述 ...................................................................164
故障排查 ...................................................................164
故障处理 ...................................................................165
故障分析 ...................................................................165
经验总结 ...................................................................165
拒绝服务式攻击引故障...................................................165
故障排查 ...................................................................166
故障分析 ...................................................................166
事后措施 ...................................................................166
防火墙为何拒绝启动.......................................................166
故障现象 ...................................................................166
故障排查 ...................................................................167
故障解决 ...................................................................167
双机热备也有故障...........................................................167
故障现象 ...................................................................167
解决方案 ...................................................................167
实施步骤 ...................................................................168
经验总结 ...................................................................168
服务器搬家惹烦恼...........................................................168
故障排查 ...................................................................169
故障原因 ...................................................................169
解决办法 ...................................................................169
安装大硬盘受挫...............................................................169
故障现象 ...................................................................170
简述MBR 和GPT ....................................................170
加载大容量硬盘 .......................................................170
ACL 引起HSRP 故障......................................................170
故障现象 ...................................................................170
故障排查 ...................................................................171
经验总结 ...................................................................171
解决AD 域服务故障 .......................................................172
AD 域服务问题 ........................................................172
故障解决方法 ...........................................................172
解决HMC 获取信息故障 ...............................................173
故障分析 ...................................................................173
故障排查 ...................................................................173
经验总结 ...................................................................174
排查OSPF 网络路由故障 ...............................................174
故障实例一:通过虚链路实现跨区域接入主干区域,但因路由器之间Vlink 配置错误,而无法学到上级路由 .......................................................174
故障实例二:OSPF 网络的末端区域引入Eigrp 协议路由,由于区域类型定义错误引起的路由故障.. ............. ...................175
一波三折重建磁盘阵列...................................................176
故障现象 ...................................................................176
故障处理 ...................................................................177
经验总结 ...................................................................177
数据公网旅行记...............................................................178
远程问诊 ...................................................................178
现场查看 ...................................................................178
探索求证 ...................................................................179
豁然开朗 ...................................................................179
真相大白 ...................................................................179
全零MAC 地址惹故障 ...................................................180
网络拓扑及故障现象 ...............................................180
故障分析及排除 .......................................................180
故障分析 ...................................................................181
经验总结 ...................................................................181
解决新闻采集乱码故障...................................................181
故障排查 ...................................................................182
故障分析 ...................................................................182
故障解决 ...................................................................182
日志过大服务器出故障...................................................183
故障排查 ...................................................................183
故障解决 ...................................................................184
故障分析 ...................................................................184
小型机重启丢失键盘.......................................................185
小型机重启后键盘无法使用 ...................................185
故障诊断用Diag ......................................................185
ASM 给计算机启动降速 .........................................187
经验总结 ...................................................................188
php-cgi 为何占用CPU 100% .........................................188
故障现象 ...................................................................188
故障分析 ...................................................................188
故障解决 ...................................................................189
远程解决内网故障...........................................................189
找出问题产生的原因 ...............................................190
解决问题需同步三个账号密码 ...............................190
排查80 端口故障.............................................................190
故障排查过程 ...........................................................191
故障排除 ...................................................................191
经验总结 ...................................................................191
排除交换机端口连通性故障...........................................192
排除物理层连通性故障 ...........................................192
排除VLAN 和中继故障 ..........................................192
排除VTP 故障 .........................................................193
排除生成树故障 .......................................................194
经验总结 ...................................................................194
解决HWTACACS 认证登录故障 ..................................194
网络结构 ...................................................................195
配置过程 ...................................................................195
验证操作 ...................................................................195
故障分析 ...................................................................195
经验总结 ...................................................................196
MAC 地址善变之谜 ........................................................196
故障现象 ...................................................................196
确定原因 ...................................................................196
经验总结 ...................................................................196
交换机配置错误导致故障...............................................197
故障现象 ...................................................................197
故障排查过程 ...........................................................197
故障分析 ...................................................................197
网关闹“罢工”.................................................................197
停电恢复后网络中断 ...............................................197
故障排查 ...................................................................198
故障处理 ...................................................................198
经验总结 ...................................................................198
解决电脑“神秘”开机故障...........................................198
故障排查 ...................................................................199
故障解决 ...................................................................199
经验总结 ...................................................................199
趋势数据库服务器重启之谜...........................................200
故障现象 ...................................................................200
故障排查过程 ...........................................................200
修改数据库备份时间 ...............................................201
故障分析 ...................................................................201
解决无线网络掉线故障...................................................201
环境因素影响信号传输 ...........................................201
无线AP 负载过大降低设备性能 ............................202
信道冲突引起通信效能降低 ...................................202
无线服务功能未完全开启 .......................................202
混合无线网络兼容性引起的掉线问题 ...................202
ARP 病毒欺骗造成通联故障 ..................................203
无线AP 开启MAC 地址过滤 .................................203
AP 参数设置不妥 .....................................................203
无线网卡驱动兼容性差 ...........................................203
网络安全隔离卡常见故障...............................................204
网络安全隔离卡的使用方式 ...................................204
故障一:初次安装网络隔离卡时,提示本地网络连接断开 ..........................204
故障二:安装的是IDE 网络隔离卡在未进入操作系统时,无法显示网络( 内、外网) 选择开机“菜单程序” .....................................................................204
故障三:当要切换内/ 外网时,提示隔离卡状态未知,造成切换失败而无法切换.....205
故障四:在正确安装网络隔离卡后,开机时提示找不到硬盘或系统...................205
经验总结 ...................................................................205
客户端组件更新遇麻烦...................................................205
故障排查 ...................................................................205
故障解决 ...................................................................206
经验总结 ...................................................................206
网段不通为哪般...............................................................207
故障排查过程 ...........................................................207
故障分析 ...................................................................207
经验总结 ...................................................................208
时间也会影响打印...........................................................208
故障排查 ...................................................................208
修改终端时间 ...........................................................208
故障解决 ...................................................................208
迁移地址段出故障...........................................................209
网络环境 ...................................................................209
网络环境的改变 .......................................................209
故障现象 ...................................................................209
最初的故障分析 .......................................................210
故障真相 ...................................................................210
解决措施 ...................................................................211
经验总结 ...................................................................211
一波三折查网卡...............................................................211
环境介绍 ...................................................................211
问题初现 ...................................................................211
现场体验 ...................................................................212
接近真相 ...................................................................212
完美解决 ...................................................................212
硬盘升级要兼容...............................................................213
硬件现状 ...................................................................213
新装硬盘无法识别 ...................................................213
故障排查过程 ...........................................................213
故障分析 ...................................................................213
光端机连接数引故障.......................................................214
网络环境 ...................................................................214
故障现象 ...................................................................214
故障分析 ...................................................................214
故障分析结果 ...........................................................215
故障解决 ...................................................................216
事后措施 ...................................................................216
排除硬盘分区故障...........................................................216
故障诊断 ...................................................................216
故障排除 ...................................................................216
经验总结 ...................................................................216
CentOS 为何出现丢包 .....................................................217
网络环境 ...................................................................217
故障现象 ...................................................................217
故障排查 ...................................................................217
故障解决 ...................................................................217
彻底解决 ...................................................................217
经验总结 ...................................................................218
私接路由惹麻烦...............................................................218
故障排查 ...................................................................218
故障分析 ...................................................................219
故障解决 ...................................................................219
排查Oracle 经典错误 ......................................................219
故障分析 ...................................................................220
故障解决 ...................................................................220
经验总结 ...................................................................221
排查无盘系统启动故障...................................................221
基本情况 ...................................................................221
故障现象 ...................................................................221
故障分析 ...................................................................221
故障排查 ...................................................................222
故障处理 ...................................................................223
经验总结 ...................................................................223
数据库实例名称惹麻烦...................................................223
故障排查 ...................................................................223
数据库实例名 ...........................................................224
经验总结 ...................................................................224
跳出360 安装死循环.......................................................224
故障排查 ...................................................................225
故障解决 ...................................................................225
计费系统升级网中断.......................................................225
故障排查 ...................................................................226
故障解决 ...................................................................226
故障分析 ...................................................................226
查找网段访问故障...........................................................226
故障现象 ...................................................................227
故障排查 ...................................................................227
故障解决 ...................................................................227
故障分析 ...................................................................227
用事件查看器解难题.......................................................227
故障排查过程 ...........................................................228
故障分析 ...................................................................228
故障解决 ...................................................................228
经验总结 ...................................................................229
供电引起视频终端故障...................................................229
公司现状 ...................................................................229
故障分析与解决 .......................................................229
经验总结 ...................................................................230
解决多核心网络安全设置故障.......................................230
问题描述 ...................................................................230
故障分析 ...................................................................230
故障排除 ...................................................................232
交换机万兆模块升级录...................................................232
故障现象 ...................................................................232
故障排查过程 ...........................................................232
升级系统软件 ...........................................................233
经验总结 ...................................................................234
SSL VPN 部署与排障 ......................................................234
SSL VPN 部署情况 ..................................................234
SSL VPN 客户端的部署与安装 ..............................235
分社使用SSL VPN 访问总社内网速度缓慢 .........235
经验总结 ...................................................................235
服务器为何无法自动重启...............................................236
配置方案 ...................................................................236
故障现象 ...................................................................236
故障排查 ...................................................................236
经验总结 ...................................................................237
无缓存RAID 卡影响读/ 写性能 ....................................237
磁盘读/ 写速度异常缓慢 ........................................238
更换RAID 卡 ...........................................................238
经验总结 ...................................................................238
无线路由器也升级...........................................................238
故障排查过程 ...........................................................238
故障分析 ...................................................................238
无线路由升级过程 ...................................................239
正确下载升级文件 ...................................................239
经验总结 ...................................................................239
策略路由引起的网络故障...............................................240
设置外网通道 ...........................................................240
故障现象 ...................................................................240
故障分析 ...................................................................240
故障解决 ...................................................................240
经验总结 ...................................................................240
两交换机接口不匹配引故障...........................................241
故障排查 ...................................................................241
故障分析 ...................................................................241
故障排除 ...................................................................241
配置RADIUS 协议常见故障 ..........................................242
RADIUS 协议 ...........................................................242
RADIUS 协议的交互流程 ......................................242
RADIUS 协议的配置 ...............................................243
故障一:用户本地认证总被拒绝 ...........................244
故障二:用户RADIUS 认证总被拒绝 ..................244
故障三:一个用户已经连入,在show aaa user时却看不到 ........................................244
故障四:并没有配置认证,仍能对用户进行认证 ..............................................244
小交换机造成上网掉线...................................................244
故障现象 ...................................................................245
故障排查过程 ...........................................................245
经验总结 ...................................................................246
第3 章 系统运维
设置计算机隔离访问.......................................................248
网络环境 ...................................................................248
限制其他VLAN 计算机访问财务服务器 ..............248
资源访问权限 ...........................................................249
安全组客户端计算机验证 .......................................250
用IPTraf 监控网络终端流量 ..........................................251
安装软件 ...................................................................251
查看网络流量 ...........................................................251
用OpenMeetings 免费搭建视频会议平台 .....................252
OpenMeetings 简介 ..................................................252
安装步骤 ...................................................................253
使用视频会议系统 ...................................................254
限制终端联外网...............................................................255
当前管控措施 ...........................................................256
外联通道建立过程 ...................................................256
远程访问MySQL ............................................................257
远程登录设置 ...........................................................257
远程访问指定的数据库 ...........................................258
收回用户权限 ...........................................................258
需要注意的问题 .......................................................258
经验总结 ...................................................................258
批处理解决进程假死.......................................................258
让Nginx 支持多证书.......................................................259
Nginx 不支持多证书 ................................................260
编译安装OpenSSL ...................................................260
编译安装Nginx(Nginx 平滑升级) .......................260
检测证书支持情况 ..................................................260
发布RemoteApp 注意事项 .............................................261
解决方法 ...................................................................261
操作步骤 ...................................................................261
用VMM 集中管理虚拟机...............................................262
概述 ...........................................................................263
虚拟机管理 ...............................................................263
其他虚拟化操作 .......................................................263
经验总结 ...................................................................264
反向DNS 解析扩充地址.................................................264
反向DNS 代理 .........................................................264
在防火墙上进行地址映射设置 ...............................265
搭建并配置DNS 服务器 .........................................265
搭建Apache 服务器,设置反向代理 .....................265
经验总结 ...................................................................266
批处理更新内网服务器...................................................266
分析问题 ...................................................................266
端口映射 ...................................................................266
编写批处理 ...............................................................266
设定计划任务 ...........................................................267
动态调整Linux 分区容量 ...............................................267
磁盘管理机制LVM .................................................267
实现LVM .................................................................268
经验总结 ...................................................................269
配置VSFTP 虚拟用户.....................................................269
安装VSFTP ..............................................................269
VSFTP 虚拟用户验证方式的配置 ..........................269
配置PAM 认证文件,用于虚拟用户认证 .............270
创建虚拟账号以及对应的系统账号 .......................270
创建配置文件 ...........................................................270
VBS 巧解接口断开问题 ..................................................271
解决问题思路 ...........................................................271
解决方案 ...................................................................272
效果检验 ...................................................................272
升级DHCP 服务器 ..........................................................272
DHCP 架构 ...............................................................272
原DHCP 服务器配置 ..............................................273
新服务器配置 ...........................................................273
Linux 中安装虚拟Windows ............................................275
安装增强功能,解放鼠标和剪切板 .......................275
添加共享文件夹,实现主机和虚拟机的文件共享 ........................................................275
修改系统,让普通用户也能在虚拟机中使用USB 硬件设备 .............................276
彻底卸载Oracle 数据库 ..................................................276
BAT 文件提高维护效率 ..................................................278
网络结构 ...................................................................278
排除网络故障经常遇到的问题 ...............................279
利用BAT 文件快速配置网卡的网络参数 .............279
经验总结 ...................................................................279
为ESXI 5.0 安装包加驱动 ..............................................280
基于Linux 平台的域名解析系统 ...................................281
方案设计 ...................................................................281
采用基于Linux 平台域名解析系统优势及关注的安全配置 .................................282
双机DNS 的优势 .....................................................282
基于Linux 平台的域名解析系统与DHCP 协同工作的优势 ......................282
基于Linux 平台域名解析系统的实现方法 ...........282
基于Linux 平台域名解析系统测试过程 ...............283
经验总结 ...................................................................283
远端开启“远程桌面连接”服务...................................284
正确配置DHCP 和DNS 服务器 ....................................285
CentOS 下更改MySQL 目录位置 ..................................286
安装MySQL .............................................................286
更改MySQL 目录 ....................................................287
常见问题及解决方法 ...............................................287
限制个人计算机接入网络...............................................288
企业网络环境 ...........................................................288
解决思路 ...................................................................288
部署策略 ...................................................................288
配置DHCP 服务器 ..................................................289
客户端计算机验证 ...................................................290
经验总结 ...................................................................290
CentOS 下挂载存储设备 .................................................291
挂载存储设备 ...........................................................291
挂载NTFS 格式设备 ...............................................291
自动挂载硬盘 ...........................................................292
问题解析 ...................................................................292
经验总结 ...................................................................292
OpenVPN 解决固定公网IP 问题 ...................................293
应用场景 ...................................................................293
应用需求 ...................................................................293
安装配置OpenVPN 服务器 ....................................293
安装配置OpenVPN 客户端 ....................................295
OpenVPN 服务器端Iptables 的设置 .......................295
设置OpenVPN 客户端的Iptables ...........................296
测试端口调用是否成功 ...........................................296
用拒绝功能实现URL 转向.............................................296
恢复Windows 单系统启动模式 .....................................297
在安装有Windows 7 系统的电脑上安装RedHat 系统 .......................................297
在Windows 7 系统中删除RedHat 系统 .................297
恢复电脑上Windows 7 单系统的启动模式 ...........298
经验总结 ...................................................................298
用户状态虚拟化...............................................................299
用户配置文件 ...........................................................299
部署共享文件夹 .......................................................300
配置漫游用户配置文件 ...........................................300
应用效果 ...................................................................301
其他注意事项 ...........................................................301
用iLO 远程管理HP 服务器 ...........................................301
为iLO 设置管理IP 地址 .........................................302
设置时区与时间服务器 ...........................................302
添加管理用户名 .......................................................302
添加License ..............................................................302
服务器电源控制 .......................................................303
虚拟光驱与软驱功能 ...............................................303
远程KVM .................................................................303
查看iLO 日志...........................................................303
系统信息 ...................................................................303
iLO 升级....................................................................303
批量激活3ds Max ............................................................304
要求与问题的发现 ...................................................304
问题分析 ...................................................................304
解决方法 ...................................................................304
Linux 中用yum 在本地装软件 .......................................305
使用光盘直接挂载到本地 .......................................305
使用Web Server 在局域网发布本地yum 源 .........305
经验总结 ...................................................................306
在TMG 2010 中选择出口线路 .......................................306
基于RTX 实现业务监控告警 .........................................308
腾讯通功能 ...............................................................308
系统设计流程 ...........................................................308
系统运行环境的配置 ...............................................308
告警功能实现 ...........................................................309
经验总结 ...................................................................310
Sersync 实现触发式文件同步 .........................................310
inotify 简介 ...............................................................310
Rsync 简介 ................................................................310
Sersync 简介 .............................................................311
Sersync 触发式文件同步实战 .................................311
经验总结 ...................................................................313
虚拟化整合系统资源.......................................................313
整合资源 ...................................................................313
几种主流虚拟化产品的比较 ...................................314
vSphere 云计算系统 .................................................314
虚拟化专业备份软件Vizioncore vRanger Pro .......314
虚拟化技术在信息系统中的应用 ...........................315
结论 ...........................................................................316
Linux 中快速加密文件 ....................................................316
利用Vi 程序加密文件 .............................................317
巧用颜色加密文件 ...................................................317
利用特殊文件名加密文件 .......................................317
重装数据库服务器秘籍...................................................318
给目录浏览功能加把锁...................................................319
目录加密 ...................................................................319
定时更换用户名及密码 ...........................................320
Serv-U 迁移到Vsftp ......................................................321
安装Vsftp .................................................................321
迁移用户数据 ...........................................................321
迁移FTP 账号 ..........................................................321
Vsftp 的安全设置 .....................................................321
管好密码...........................................................................322
密码保存问题 ...........................................................322
免费密码存储方案 ...................................................322
存储密码 ...................................................................322
一机多用...........................................................................323
选型 ...........................................................................323
安装Apache ..............................................................323
设置IP 型虚拟主机 .................................................324
设置名字型虚拟主机 ...............................................325
恢复EFS 加密文件 ..........................................................325
备份恢复私钥 ...........................................................326
了解恢复EFS 加密文件的原理 ..............................326
找回关键的文件和文件夹 .......................................326
解密EFS 加密文件 ..................................................326
巧用组策略维护学生电脑...............................................327
防止学生“禁用”本地连接,阻止电脑在上课期间脱离控制 ..........................................328
阻止设置“本地连接中的属性”,防止修改IP地址及网络连接的设置,保护多媒体教学系统正常运行 ...................................................................328
阻止访问控制面板,防止学生通过控制面板对键盘、鼠标、桌面属性和用户账户等内容的设置修改 ...................................................................329
阻止学生访问并修改注册表,导致系统出现错误 ..................................................329
DHCP 服务器批量绑定IP 地址 .....................................329
常规IP 地址绑定 .....................................................329
批量绑定IP 地址 .....................................................330
正确登录Oracle XE 首页 ................................................331
首次打开Oracle XE 首页 ........................................331
多次使用后打开Oracle XE 首页 ............................331
搭建网络在线直播系统...................................................332
实时平滑流式处理技术 ...........................................332
准备和安装 ...............................................................332
创建一个直播发布点 ...............................................333
向服务器发送实时视频 ...........................................333
终端安装播放插件 ...................................................334
远端开启“远程桌面连接”服务...................................335
简单方法实现视频点播...................................................336
在服务器上新建两个文件夹 ...................................336
设置视频快捷方式的属性 .......................................336
制作网页 ...................................................................337
巧用DOS 命令简化系统运维.........................................338
巧用DOS 监控系统关键进程 .................................338
巧用DOS 维护数据 .................................................338
远程管理服务器 .......................................................338
第4 章 网络管理
网络设备自动校对时间..................................................340
SNTP 配置 ................................................................340
“NAT”对网速的影响 .....................................................341
概述 ...........................................................................341
故障剖析 ...................................................................341
合理调整动态NAT 表 ............................................342
巧用VRRP 实现冗余备份 .............................................342
校园网光纤熔接应用.......................................................344
星级宾馆实现双向网业务...............................................345
网络规划 ...................................................................345
网络设备调试方法 ...................................................345
网络设备配置 ...........................................................345
为“老式”设备减压.......................................................348
静态路由 ...................................................................348
具体配置实施情况 ...................................................348
验证数据包走向 .......................................................349
扩展Ping ...................................................................349
解析VLAN 通信 .............................................................350
网络概况 ...................................................................350
解决思路 ...................................................................350
后续排除 ...................................................................350
总结 ...........................................................................351
搭建“安全型”无线网络环境.......................................352
连接网络设置 ...........................................................352
无线加密设置 ...........................................................352
开放下载端口设置 ...................................................352
无线路由器使用详解.......................................................353
无线路由器分类 .......................................................353
无线路由器安装 .......................................................353
无线路由器配置 .......................................................353
无线路由器功能 .......................................................354
3G 无线路由器 .........................................................355
无线路由器常见故障处理 .......................................355
总结 ...........................................................................356
PTN 技术与应用 ..............................................................357
PTN 概述 ..................................................................357
PTN 组网方式的特点 ..............................................357
基于PTN 组网的应用 .............................................358
应用PTN 后遇到的问题 .........................................359
总结 ...........................................................................359
“软硬结合”净化校园网.................................................360
策略管理 ...................................................................360
软件管理 ...................................................................360
将“10GbE”发挥到淋漓尽致 ......................................361
作为机房网络的“边缘聚合” ................................362
不仅应用于大型数据中心 ......................................362
智能交换的必备条件 ..............................................362
快速绑定IP 地址 .............................................................362
应用情况 ...................................................................363
网络环路“不再烦恼”.....................................................364
具体实现 ...................................................................364
全力以赴 迎接万兆铜缆 ...............................................365
居安思危 ..................................................................365
明确定义 ..................................................................365
万兆以太网的应用 ...................................................365
屏蔽与非屏蔽如何取舍 ...........................................365
Cat.6A 铜缆的测试...................................................366
总结 ...........................................................................366
开启防火墙的双网特性...................................................366
网络描述 ...................................................................366
具体配置方法 ...........................................................366
把好出口关 网关首当先...............................................368
部署安全网关 ...........................................................368
能效管理新思维...............................................................370
重视运营节能 ...........................................................371
智能化能效管理 .......................................................371
多措并举 限制带宽.......................................................371
DR.COM 用户管理系统 ..........................................372
EOC 局端 ..................................................................372
总结 ...........................................................................372
多VLAN 共享服务器 .....................................................373
轻松管理Linux 异构网络 ...............................................374
配置软件 ...................................................................375
运行软件 ...................................................................375
总结 ..........................................................................376
巧设路由表 实现双网关...............................................376
具体案例 ...................................................................376
双网双通 我有妙招.......................................................378
轻松实现网络实名制.......................................................379
提出需求 ...................................................................379
网络情况介绍 ...........................................................379
跨三层地址绑定 .......................................................379
实现地址绑定 ...........................................................380
使用效果 ...................................................................380
巧设路由器控制带宽.......................................................380
构建无收敛校园网...........................................................382
何为无收敛的校园网 ...............................................382
实现方式 ...................................................................382
无收敛校园网分析 ...................................................383
无线管理“ 位置”当先....................................................384
远离强磁场位置 .......................................................384
摆放好天线位置 .......................................................384
摆放在通风位置 .......................................................384
摆放在中心位置 .......................................................385
摆放在强信号位置 ...................................................385
排查防火墙故障...............................................................385
故障现象 ...................................................................386
排查过程 ...................................................................386
总结 ...........................................................................386
利用防火墙阻止可疑用户...............................................386
提升交换机稳定性...........................................................387
认识VRRP 协议.......................................................387
开通Ping 测试功能 ..................................................387
开通VRRP 报文检查...............................................388
管理虚拟IP 地址 .....................................................388
配置优先级参数 .......................................................388
管理地址绑定关系 ...................................................388
管理活动抢占方式 ...................................................389
配置报文间隔时间 ...................................................389
配置安全认证方式 ...................................................389
让服务器更省、更快、更安全.......................................390
电源开关技巧 ...........................................................390
定时除尘技巧 ...........................................................390
预防静电小窍门 .......................................................390
省电技巧 ...................................................................390
提高性能技巧 ...........................................................391
让交换机远离频繁死机...................................................391
控制接入负载 ...........................................................391
正确配置功能 ...........................................................392
营造合适环境 ...........................................................392
预防网络攻击 ...........................................................393
选择成熟产品 ...........................................................393
利用Wi-Fi 共享3G 上网 ................................................393
使用3G 无线路由器共享上网 ................................393
组建Ad-Hoc 网络共享3G 上网 .............................394
注意事项 ...................................................................395
补充 ...........................................................................395
巧用SuperVLAN ............................................................395
概述 ...........................................................................395
SuperVLAN 简介......................................................395
配置过程 ...................................................................396
环回接口 实现路由选择..............................................397
巧用无线路由器...............................................................399
无线路由器基本使用方法 .......................................399
无线路由器新型用法 ...............................................400
“不用加密”的无线路由器.............................................400
瞒天过海 ...................................................................400
调虎离山 ...................................................................401
欲擒故纵 ...................................................................401
假痴不癫 ...................................................................401
巧用VRRP 实现冗余备份 .............................................401
构建安全的数据交换平台...............................................403
构建安全可靠的数据网络平台 ...............................404
安全风险分析 ...........................................................404
控制措施 ...................................................................404
万兆模块安装实录...........................................................406
路由模式的校园网...........................................................407
机房防水不容忽视...........................................................409
漏水机房状况 ...........................................................409
经验教训 ...................................................................409
巧用防火墙 实现双网双待...........................................410
方案概述 ...................................................................410
配置方法 ...................................................................410
线路测试 ...................................................................411
用好远程管理...................................................................411
巧用SecureCRT 恢复IOS ...............................................413
巧用“黑洞路由”.............................................................414
现象描述 ...................................................................414
原因分析 ...................................................................415
改进措施 ...................................................................415
第5 章 终端管理
玩转增量备份...................................................................417
镜像备份法 ...............................................................417
新增备份法 ...............................................................417
时间记忆增量压缩备份法 .......................................418
实战终端应用程序虚拟化...............................................418
活学活用“影子备份”.....................................................420
为终端加“安全锁”.........................................................421
黑名单管理和过滤管理 ...........................................421
端口控制功能 ...........................................................422
邮件控制功能 ...........................................................422
上网行为控制功能 ...................................................422
应用管理 ...................................................................423
基于UNIX 平台的网管命令 ...........................................424
SSH4 ..........................................................................424
Rsync .........................................................................424
Top .............................................................................424
DF ..............................................................................425
Free ............................................................................425
Nagios ........................................................................425
巧用Sourceoffsite 进行资源管理 ...................................425
解决控制台菜单乱码问题...............................................426
简化客户端系统安装.......................................................428
补丁集成 ...................................................................428
制作无人值守应答文件 ...........................................428
制作Ghost 镜像文件 ...............................................429
改善Windows 2008 系统性能 ........................................429
“DIY”Windows 组策略 .................................................432
合理利用Linux 系统命令 ...............................................433
使用ThinRDP 软件巧妙访问终端服务 .........................434
隐藏加密让破解无从下手...............................................436
隐藏加密的原理 .......................................................436
创建普通加密卷 .......................................................437
创建隐藏加密卷 .......................................................437
细说ARP 欺骗防御术 .....................................................438
何为ARP 协议 .........................................................438
轻松应对ARP 欺骗攻击 .........................................438
数据文件彻底删除...........................................................440
下载与安装 ...............................................................440
数据备份与还原 .......................................................440
数据彻底粉碎 ...........................................................440
分区数据的另类擦除 ...............................................440
RunAS 命令的完美替身 ..................................................441
Windows 中的TFTP 服务 ...............................................442
开启TFTP 服务的方法 ............................................442
如何使用TFTP 传输文件 ........................................443
与TFTP 相关的安全技术 ........................................443
合理控制TFTP 的使用 ............................................443
电源管理小“专家”.........................................................444
为系统启动“减负”.........................................................445
认识Autoruns 工具 ..................................................445
管理程序启动项目 ...................................................445
管理IE 启动项目 .....................................................446
管理右键菜单启动项目 ...........................................446
管理计划启动项目 ...................................................446
TrustedInstaller 账户详解 ................................................447
找回丢失的Ubuntu 启动项.............................................450
无线设置巧修改...............................................................451
U 盘也能加解密 ...............................................................453
第一把自动锁:江民安全专家 ...............................453
第二把自动锁:CS Defande ....................................454
第三把自动锁:Advanced Encryption Package Professional .............................454
智能办公小助手...............................................................456
安装与注册 ...............................................................456
创建用户 ...................................................................456
即时通信 ...................................................................456
个人办公 ...................................................................457
工作流 .......................................................................457
跟骚扰窗口说“NO” .......................................................457
跟安全警告窗口说“NO” .......................................457
跟阻止提示窗口说“NO” .......................................458
跟新建链接窗口说“NO” .......................................458
跟检测提醒窗口说“NO” .......................................459
把系统控制权“抢回来”.................................................459
复制注册表文件 .......................................................459
掌控“账户”管理权限...................................................460
管理Guest 账户 ........................................................460
创建标准账户 ...........................................................460
控制管理员账户 .......................................................461
VBA 实现表间数据转换 .................................................461
IP 安全策略过滤客户端 ..................................................462
IP 安全策略 ..............................................................462
创建IP 安全策略 .....................................................463
添加IP 筛选器 .........................................................463
应用IP 安全策略 .....................................................463
巧设预读取文件...............................................................463
深入了解预读取文件属性 .......................................464
调整预读取功能 .......................................................464
清理预读取文件 .......................................................464
巧治杀毒“后遗症”.........................................................464
表内数据关系的校对.......................................................465
拯救Windows 8 中的Windows 7 ...................................467
启动系统 ...................................................................467
删除Windows 8 系统文件 .......................................467
移动Windows 7 系统文件 .......................................467
轻松转换虚拟机文件.......................................................468
Excel 在绩效考核中的应用 ............................................469
在一个Excel 表中使用多个工作表 ........................469
不同工作表中的数据调用 .......................................470
善用Excle 的函数公式——SUM(汇总)函数 ....470
统计汇总工作 ...........................................................470
“Net send”命令的完美“搭档” ....................................471
Linux 系统三个好工具 ....................................................472
巧解Windows 7 启动异常 ..............................................472
Windows 8 系统的“新鲜”操作 ...................................473
善用安全功能,控制员工上网行为 .......................473
善借外力工具,让U 盘自动断电 ..........................474
善用网络认证,让上网访问安全 ...........................474
善用锁屏,让登录效率更高 ...................................475
向虚拟机中复制文件.......................................................475
常规方法 ...................................................................475
虚拟机下的“独门暗器” .........................................476
让Ping 探测“不走寻常路” ...........................................477
为Ping 命令找个“好搭档” ....................................477
拒绝复杂参数,简单操作Ping 命令 ......................478
让Ping 命令拥有3D 操作界面 ...............................478
搞定Word“安全模式” ...................................................479
无法进入系统的应急措施...............................................480
用Ghost XP 来重装系统 .........................................480
用外挂硬盘的方式转储数据 ...................................480
用Windows PE 与ERD2007 方式模拟进入系统 ....480
总结 ...........................................................................481
巧解无线网卡小故障 ......................................................481
保留Outlook“2003 版本” .............................................481
故障原因 ...................................................................482
解决办法 ...................................................................482
解决Ghost XP 的安装问题 .............................................482
将“百度搜索”请到Word 中 ........................................483
“吉特盒子”让搜索再快些.............................................484
基本功能 ...................................................................484
快捷操作 ...................................................................485
今天您修改密码了吗.......................................................485
巧用批处理 解决重复工作...........................................486
恢复Windows 2008 正常状态 ........................................487
巧用“宏”给Word 加密 ................................................489
删除“多余”的Guest 账户 ...........................................490
升级内存的一波三折.......................................................491
让Administrator 账户“蒸发” ........................................492
我的空间我做主...............................................................493
系统还原 ...................................................................493
休眠文件 ...................................................................493
虚拟内存文件 ...........................................................493
临时文件 ...................................................................493
谁占用了我的硬盘空间...................................................494
查找占用硬盘空间的罪魁祸首 ...............................494
对付Temporary Internet Files 的方法 .....................495
为任务管理器找个金牌替身...........................................495
深挖掘 让打印更精彩...................................................497
实现网页完美打印 ...................................................498
实现打印远程管理 ...................................................498
实现打印安装恢复 ...................................................499
实现均衡网络打印 ...................................................499
巧用好压完成木马扫描...................................................500
玩转“双网双待”.............................................................500
巧往SQL 中存数据 .........................................................502
智能监控不让下载假死...................................................502
指定监控目标 ...........................................................502
配置监控参数 ...........................................................503
让下载不掉线 ...........................................................503
妙用FastCopy 保护您的隐私 .........................................504
为文件安装“时间锁”.....................................................504
为密码设置“保质期” .............................................504
为自动加解密巧设“有效期” .................................505
为文件夹加密巧设“延迟锁” .................................506
Windows 7 打印更灵活 ...................................................507
实现智能切换打印 ...................................................507
实现文件目录打印 ...................................................508
实现文档批量打印 ...................................................508
实现文档虚拟打印 ...................................................509
为网络端口装上“加密锁”.............................................509
巧妙突破访问配额限制...................................................511
实现思路 ...................................................................512
实现步骤 ...................................................................512
恢复驱动器访问通道.......................................................513
远离IE 9 窗口骚扰 ..........................................................514
远离安全警告窗口 ...................................................514
远离阻止提示窗口 ...................................................514
远离新建链接窗口 ...................................................515
远离检测提醒窗口 ...................................................515
· · · · · · ()

下载地址

发布者:勤劳的小鸡

文件说明:zip / 解压密码:yiquhai.com

迅雷下载:您需要先后,才能查看

网盘下载:您需要先后,才能查看

关于内容:内容自于互联网,如果发现有违规内容请联系管理员删除!

作者: 勤劳的小鸡

该用户很懒,还没有介绍自己。

18 条评论

发表评论

  1. 鳕鱼宝贝儿 鳕鱼宝贝儿说道:
    1#

    通俗易懂的语言描述出来

  2. 边城GOD 边城GOD说道:
    2#

    大爱,好好看

  3. 黄桃tao罐头 黄桃tao罐头说道:
    3#

    好的话也推荐别人看

  4. 算命先生让我往北走 算命先生让我往北走说道:
    4#

    等看完再追评~

  5. 显示更多