All Posts Tagged Tag: ‘IIS’
A Kentucky-based business is going to be Microsoft’s first partner to offer free beta test accounts featuring Microsoft Internet Information Services (IIS) 7.0 and Microsoft Windows Server “Longhorn” Beta 2. The company, MaximumASP, is a top provider of Windows-based hosting services.
To further elaborate on a article I wrote: 301 Redirects And Domains With And Without WWW, I wanted to discuss the actual implementation of a 301 redirect on IIS.
A new survey of the 2005 Fortune 1000 Web sites reports that Microsoft’s ASP.NET, ASP, and Internet Information Services (IIS) serve the majority of leading U.S. corporate sites.
IIS is Microsoft’s Internet Information Server running on Windows Servers family. Tomcat is world wide used web server built on Java platform for JSP/Servlets. Due to ease of operating and maintaining IIS in windows environment, we still prefer to buy the windows server and run IIS for websites and by default we run Tomcat on port 8080 as the default installation.
A November 2003 survey published by the UK-based Internet services company Netcraft made the claim that the Apache Web server “has a significant percentage gain” over its chief rival, Microsoft’s Internet Information Services (IIS), and now controls over two-thirds of the global Web server market. Only days later, Port80 Software released a survey stating that “Microsoft IIS maintains dominance of the corporate Web server market” with 53.8 percent of the market. With two seemingly similar surveys drawing contradictory conclusions, clearly the question of whose software powers the majority of the Web server market demands a deeper examination.
Welcome to the second installment of Internet Information Services 6.0 on Windows Server 2003. I have decided to write this series of articles aimed at Internet Information Services 6 on Windows Server 2003 as both a refresher for the IT professional that is familiar with designing, deploying and administering IIS 4 and 5 as well as allowing some of the newcomers to IIS services regardless of version to get their feet wet so to speak.
Welcome to the first installment of Internet Information Services 6.0 on Windows Server 2003. I have decided to write this series of articles aimed at Internet Information Services 6.0 on Windows Server 2003 as both a refresher for the IT professional that is familiar with designing and administrating IIS 4 and 5 as well as allowing some of the newcomers to the service to get their feet wet so to speak.
We often think about security measures as ways of protecting resources by preventing access to them. The need for authentication arises because, in the real world, keeping people out of protected areas is only half the battle. Authentication is about letting certain people (or processes) in, while keeping everyone else out. In practice, this usually means some people are going to have to be given secrets (passwords) that will form part of the credentials they need to present in order to gain access to protected resources. But since, as the old saying goes, the best way to keep a secret is not to, the distribution and exchange of access-providing secrets inevitably raises the level of risk to a secure system. A major goal of authentication, from a security point of view, is minimizing that risk – especially when users are being authenticated remotely, over publicly-accessible networks. Authentication is the process of poking minimally risky holes in one’s security.
In this example we will create a Windows Form Project that will create new FTP and Web IIS Virtual Directories from code based on the name and path specified by the user. You can create virtual directories on the local computer by specifying the server name as “localhost” or you can create the virtual directory on a remote computer by specifying the machine name.
Netcat is a utility that is able to write and read data across TCP and UDP network connections. If you are responsible for network or system security it essential that you understand the capabilities of Netcat. Netcat can be used as port scanner, a backdoor, a port redirector, a port listener and lots of other cool things too. It’s not always the best tool for the job, but if I was stranded on an island, I’d take Netcat with me. During this tutorial I’ll demonstrate a complete hack, using Netcat only, just to point out how versatile it is.
The basic purpose of WebDAV is to provide file I/O through HTTP. This permits your to load, edit, delete, create subdirectories, and basically manage files located on the Web Server from the client desktop. Of course, MS has several products that already permit remote manipulation of remote websites.
Masking or anonymizing a Web server involves removing identifying details that intruders could use to detect your OS and Web server vendor and version. This information, while providing little or no utility to legitimate users, is often the starting place for crackers, blackhat hackers and “script kiddies”.
As an IIS administrator it sometimes gets downright annoying having to fend off all the insults from Apache admins I meet claming innate server superiority. Generally the discussion about Web administration starts first with all the various security holes plaguing IIS and the negative press the platform garnered over the last year.