当前位置:网站首页>Online public network security case nanny level tutorial [reaching out for Party welfare]
Online public network security case nanny level tutorial [reaching out for Party welfare]
2022-07-01 03:38:00 【Three person studio】
This tutorial involves the content of online public network security files , With 2022 Years and beyond .
Prerequisite
The domain name subject shall be consistent with the filing subject as far as possible
The subject of domain name registration shall be the same as the subject of filing , Units are units , A person is a person
material : Positive aspect of ID card 、 The recorder holds the ID card photo 、 Domain name certificate 、(ICP Record number - Optional )
Try to finish ICP Keep on record , And then do the public network security record , The audit speed will be faster .
Negative type
1、 domain name 、icp Use registered or filed on behalf of ( Did you ask for personal materials when filing )
For the record, the individual must be yourself on the domain name certificate ,icp The filing individual should also be yourself ( File Personal , The enterprise does not approve )
The same as for the record enterprise , The enterprise name should be consistent .
2、 Safety is not good
If the website has not done any security measures , It is not recommended to directly prepare the public network security record ,
The main points of self-examination are :
- Whether the background address is the default address ( classic )
- Whether the website port or test port is still open
- Weak password 、admin Whether the user still exists 【 classic 】
- Whether non essential ports use firewalls ( Or other software ) Prevent 【 A firewall 、 The safety dog must be opened , Wise remark of an experienced person 】
- Debugging interface 、 Whether the technical documents are closed or encrypted , Whether the default password (swagger etc. )【 Very classic 】
- For mobile applications ,url Whether root address access should be disabled 【 In especial app Class application , It should be forbidden 】
- ip Whether the direct connection can access ?【 It must be forbidden ip Direct connection 】
The server is ddos、 Missed scan attack 、 Foreign missed scanning website scanning ( At present, they mainly come from the United States and Australia , A few requests come from Britain and France )、 Sniffing ( Most of them come from Fujian 、 Beijing , A few are from Hong Kong ) Although there is nothing on it , Will still be attacked every day .
( Because there will be great gods and novices in any industry , If your server doesn't want to be the target of a rookie , Let's check ourselves first !)
Online public network security
1. Login home
2. Click online filing to log in

3. register

4. Fill in registration information

5. Go back to the home page and log in

6. The page will automatically jump to the personal Center , Fill in personal data and save


7. Credit certification fill in your mobile phone number and email account number here

( The above picture is from the official tutorial :《 National public security organ Internet website security service platform filing operation guide 》)
The picture below is 2022 Version of :
8. Click the home page to enter the filing procedure 
9. Click start-up main body management

10. Choose an individual , Fill in the main content

11. Click on “ New website application ”》 next step

12. Fill in the basic information of the website

Note here : The record number of the Ministry of industry and information technology may not be

Note here : There is a serious jam here , Caton may cause no response or search failure after selection , Just try a few more times .
Click the search service provider directly
Access service provider :( Consult the server supplier for details ) such as xx China Unicom
Registered service providers : A service provider that provides domain names , such as : New network 
Next, fill in the following figure ( Except in special cases )
13. Fill in the basic information of the website
Check all the information of the same principal that will do 
After that is waiting for ~~~
The actual audit time of the personal test is about half a day ( I picked it up this morning , I went to work in the afternoon )

Pay attention to the point :
1. The Internet speed of the Ministry of network security website is easy to get stuck , User information refresh errors often occur . When an error occurs, you can refresh the information or refresh the page , Never go to the next step against mistakes .
边栏推荐
- 10、Scanner. Next() cannot read spaces /indexof -1
- The difference between MFC for static libraries and MFC for shared libraries
- 二叉树神级遍历:Morris遍历
- bootsrap中的栅格系统
- How to achieve 0 error (s) and 0 warning (s) in keil5
- BluePrism注册下载并安装-RPA第一章
- Database DDL (data definition language) knowledge points
- File upload and download
- Pytorch training deep learning network settings CUDA specified GPU visible
- Leetcode 1818 absolute value, sorting, dichotomy, maximum value
猜你喜欢

Ctfshow blasting WP

RSN:Learning to Exploit Long-term Relational Dependencies in Knowledge Graphs
![[nine day training] content III of the problem solution of leetcode question brushing Report](/img/7e/1e76181e56ef7feb083f9662df71c7.jpg)
[nine day training] content III of the problem solution of leetcode question brushing Report

Random seed torch in deep learning manual_ seed(number)、torch. cuda. manual_ seed(number)
![5. [WebGIS practice] software operation - service release and permission management](/img/5d/070e207bd96e60ba1846d644d4fb54.png)
5. [WebGIS practice] software operation - service release and permission management

Use of comment keyword in database

4、【WebGIS实战】软件操作篇——数据导入及处理

The value of the second servo encoder is linked to the NC virtual axis of Beifu PLC for display
![[深度学习]激活函数(Sigmoid等)、前向传播、反向传播和梯度优化;optimizer.zero_grad(), loss.backward(), optimizer.step()的作用及原理](/img/9f/187ca83be1b88630a6c6fbfb0620ed.png)
[深度学习]激活函数(Sigmoid等)、前向传播、反向传播和梯度优化;optimizer.zero_grad(), loss.backward(), optimizer.step()的作用及原理

Complete knapsack problem
随机推荐
Feature pyramid networks for object detection
雪崩问题以及sentinel的使用
Cygwin的下载和安装配置
ECMAScript 6.0
jeecgboot输出日志,@Slf4j的使用方法
Force buckle - sum of two numbers
[reading notes] copywriting realization -- four golden steps for writing effective copywriting
Research on target recognition and tracking based on 3D laser point cloud
打包iso文件的话,怎样使用hybrid格式输出?isohybrid:command not found
Take you through a circuit board, from design to production (dry goods)
详解Spark运行模式(local+standalone+yarn)
在 C 中声明函数之前调用函数会发生什么?
5、【WebGIS实战】软件操作篇——服务发布及权限管理
How to achieve 0 error (s) and 0 warning (s) in keil5
Pytorch training deep learning network settings CUDA specified GPU visible
md5sum操作
pytorch nn.AdaptiveAvgPool2d(1)
终极套娃 2.0 | 云原生交付的封装
串口接收数据方案设计
Download and installation configuration of cygwin