当前位置: 操作系统/服务器>linux
本页文章导读:
▪HTTP 错误 403.1 - 禁止访问:执行访问被拒绝。 解决方法该页无法显示
HTTP 错误 403.1 - 禁止访问:执行访问被拒绝。 解决方法该页无法显示您试图从目录中执行 CGI、ISAPI 或其他可执行程序,但该目录不允许执行程序。--------------------------------------------------------.........
▪Windows Server 2003 英文版 安全手册下载
Windows Server 2003 Security Guide语言:英语手册简介:Brief Description This updated technical guidance provides information about how to harden computers that run Microsoft Windows Server 2003 with Service Pack 1 (SP1). A collection of sec.........
▪apache rewrite防盗链三例
1.利用rewrite 确认你的apache 能使用rewrite mod RewriteEngine on RewriteCond %{HTTP_REFERER} !^http://linuxsky.net/.*$ [NC] RewriteCond %{HTTP_REFERER} !^http://linuxsky.net$ [NC] RewriteCond %{HTTP_REFERER} !^http://www.linuxsky.........
[1]HTTP 错误 403.1 - 禁止访问:执行访问被拒绝。 解决方法该页无法显示
来源: 互联网 发布时间: 2013-12-24
HTTP 错误 403.1 - 禁止访问:执行访问被拒绝。 解决方法该页无法显示
您试图从目录中执行 CGI、ISAPI 或其他可执行程序,但该目录不允许执行程序。
--------------------------------------------------------------------------------
请尝试以下操作:
如果您认为该目录应该允许执行访问权限,请与网站管理员联系。
HTTP 错误 403.1 - 禁止访问:执行访问被拒绝。
Internet 信息服务 (IIS)
--------------------------------------------------------------------------------
技术信息(为技术支持人员提供)
转到 Microsoft 产品支持服务并搜索包括“HTTP”和“403”的标题。
打开“IIS 帮助”(可在 IIS 管理器 (inetmgr) 中访问),然后搜索标题为“配置 ISAPI 扩展”、“配置 CGI 应用程序”、“使用网站权限保护站点”和“关于自定义错误消息”的主题。
在 IIS 软件开发工具包 (SDK) 或 MSDN Online Library 中,搜索标题为“Developing ISAPI Extensions”、“ISAPI and CGI”和“Debugging ISAPI Extensions and Filters”的主题。
解决方法:
1.打开IIS设置
2. 在建虚拟目录或网站时注意以下设置
就可以了。
如果已经配置了,可以通过下面的方法也可以设置
注:根据自己需要设置,一般加上“运行脚本(如 ASP)”即可,就是在执行权限里选纯脚本 。
您试图从目录中执行 CGI、ISAPI 或其他可执行程序,但该目录不允许执行程序。
--------------------------------------------------------------------------------
请尝试以下操作:
如果您认为该目录应该允许执行访问权限,请与网站管理员联系。
HTTP 错误 403.1 - 禁止访问:执行访问被拒绝。
Internet 信息服务 (IIS)
--------------------------------------------------------------------------------
技术信息(为技术支持人员提供)
转到 Microsoft 产品支持服务并搜索包括“HTTP”和“403”的标题。
打开“IIS 帮助”(可在 IIS 管理器 (inetmgr) 中访问),然后搜索标题为“配置 ISAPI 扩展”、“配置 CGI 应用程序”、“使用网站权限保护站点”和“关于自定义错误消息”的主题。
在 IIS 软件开发工具包 (SDK) 或 MSDN Online Library 中,搜索标题为“Developing ISAPI Extensions”、“ISAPI and CGI”和“Debugging ISAPI Extensions and Filters”的主题。
解决方法:
1.打开IIS设置
2. 在建虚拟目录或网站时注意以下设置
就可以了。
如果已经配置了,可以通过下面的方法也可以设置
注:根据自己需要设置,一般加上“运行脚本(如 ASP)”即可,就是在执行权限里选纯脚本 。
[2]Windows Server 2003 英文版 安全手册下载
来源: 互联网 发布时间: 2013-12-24
Windows Server 2003 Security Guide
语言:英语
手册简介:
Brief Description This updated technical guidance provides information about how to harden computers that run Microsoft Windows Server 2003 with Service Pack 1 (SP1). A collection of security templates, scripts, and additional tools is also included to help evaluate, test, and implement the guidance.
Overview This updated version of the Windows Server 2003 Security Guide provides specific recommendations for hardening computers that run Microsoft Windows Server 2003 with Service Pack 1 (SP1) in three distinct enterprise environments. The Legacy Client (LC) environment must support older operating systems such as Windows NT 4.0 and Windows 98. In the Enterprise Client (EC) environment, Windows 2000 is the earliest version of the Windows operating system in use. The Specialized Security - Limited Functionality (SSLF) environment is one in which concern about security is so great that significant loss of client functionality and manageability is considered an acceptable tradeoff to achieve maximum security.
Guidance about how to harden computers in these three environments is provided for a group of distinct server roles. The guidance and provided tools assume that each server will have a single role, but if you need to combine roles for some of the servers in your environment you can customize the included security templates to create the appropriate combination of services and security options. The referenced server roles in this guide include the following: Domain controllers that also provide DNS services Infrastructure servers that provide WINS and DHCP services File servers Print servers Internet Information Services (IIS) servers Internet Authentication Services (IAS) servers Certificate Services servers Bastion hosts
Windows Server 2003 安全手册下载地址:
http://download.microsoft.com/download/c/8/6/c86b1b59-0388-4945-8bd9-06f04db13136/Windows_Server_2003_Security_Guide_v2.1.zip
语言:英语
手册简介:
Brief Description This updated technical guidance provides information about how to harden computers that run Microsoft Windows Server 2003 with Service Pack 1 (SP1). A collection of security templates, scripts, and additional tools is also included to help evaluate, test, and implement the guidance.
Overview This updated version of the Windows Server 2003 Security Guide provides specific recommendations for hardening computers that run Microsoft Windows Server 2003 with Service Pack 1 (SP1) in three distinct enterprise environments. The Legacy Client (LC) environment must support older operating systems such as Windows NT 4.0 and Windows 98. In the Enterprise Client (EC) environment, Windows 2000 is the earliest version of the Windows operating system in use. The Specialized Security - Limited Functionality (SSLF) environment is one in which concern about security is so great that significant loss of client functionality and manageability is considered an acceptable tradeoff to achieve maximum security.
Guidance about how to harden computers in these three environments is provided for a group of distinct server roles. The guidance and provided tools assume that each server will have a single role, but if you need to combine roles for some of the servers in your environment you can customize the included security templates to create the appropriate combination of services and security options. The referenced server roles in this guide include the following: Domain controllers that also provide DNS services Infrastructure servers that provide WINS and DHCP services File servers Print servers Internet Information Services (IIS) servers Internet Authentication Services (IAS) servers Certificate Services servers Bastion hosts
Windows Server 2003 安全手册下载地址:
http://download.microsoft.com/download/c/8/6/c86b1b59-0388-4945-8bd9-06f04db13136/Windows_Server_2003_Security_Guide_v2.1.zip
[3]apache rewrite防盗链三例
来源: 互联网 发布时间: 2013-12-24
1.利用rewrite 确认你的apache 能使用rewrite mod
RewriteEngine on
RewriteCond %{HTTP_REFERER} !^http://linuxsky.net/.*$ [NC]
RewriteCond %{HTTP_REFERER} !^http://linuxsky.net$ [NC]
RewriteCond %{HTTP_REFERER} !^http://www.linuxsky.net/.*$ [NC]
RewriteCond %{HTTP_REFERER} !^http://www.linuxsky.net$ [NC]
RewriteRule .*\.(gif|jpb|png|css|js|swf])$ http://www.linuxsky.net [R,NC]
其中有色的地方都是要改为你的:
红色:就是改为你提供下载页面的地址,也就是只有通过这个地址才可以下载你所提供的东东。
蓝色:就是要保护文件的扩展名(以|分开),也就是说以这些为扩展名的文件只有通过红色的地址才可以访问。
绿色:如果不是通过红色的地址访问蓝色这些为扩展名的文件时就回重定向到绿色地址上。
2.利用SetEnvIfNoCase 和 access
SetEnvIfNoCase Referer "^http://linuxsky.net" local_ref=1
SetEnvIfNoCase Referer "^http://www.linuxsky.net" local_ref=1
Order Allow,Deny
Allow from env=local_ref
红色为信任站点,蓝色为受保护的文件扩展名。
3.<VirtualHost *:80>
ServerAdmin webmaster@etoow.com
DocumentRoot D:/www/www.etoow.com
ServerName www.etoow.com
ServerAlias etoow.com
ServerAlias www.chinahtml.net
ServerAlias chinahtml.net
ServerAlias www.chinahtml.cn
ServerAlias chinahtml.cn
ErrorDocument 404 http://www.etoow.com/error.html
SetEnvIfNoCase Referer "^http://www.etoow.com" local_ref=1
SetEnvIfNoCase Referer "^http://etoow.com" local_ref=1
<FilesMatch "\.(gif|jpb|png|css|js|swf)">
Order Allow,Deny
Allow from env=local_ref
</FilesMatch>
</VirtualHost>
RewriteEngine on
RewriteCond %{HTTP_REFERER} !^http://linuxsky.net/.*$ [NC]
RewriteCond %{HTTP_REFERER} !^http://linuxsky.net$ [NC]
RewriteCond %{HTTP_REFERER} !^http://www.linuxsky.net/.*$ [NC]
RewriteCond %{HTTP_REFERER} !^http://www.linuxsky.net$ [NC]
RewriteRule .*\.(gif|jpb|png|css|js|swf])$ http://www.linuxsky.net [R,NC]
其中有色的地方都是要改为你的:
红色:就是改为你提供下载页面的地址,也就是只有通过这个地址才可以下载你所提供的东东。
蓝色:就是要保护文件的扩展名(以|分开),也就是说以这些为扩展名的文件只有通过红色的地址才可以访问。
绿色:如果不是通过红色的地址访问蓝色这些为扩展名的文件时就回重定向到绿色地址上。
2.利用SetEnvIfNoCase 和 access
SetEnvIfNoCase Referer "^http://linuxsky.net" local_ref=1
SetEnvIfNoCase Referer "^http://www.linuxsky.net" local_ref=1
Order Allow,Deny
Allow from env=local_ref
红色为信任站点,蓝色为受保护的文件扩展名。
3.<VirtualHost *:80>
ServerAdmin webmaster@etoow.com
DocumentRoot D:/www/www.etoow.com
ServerName www.etoow.com
ServerAlias etoow.com
ServerAlias www.chinahtml.net
ServerAlias chinahtml.net
ServerAlias www.chinahtml.cn
ServerAlias chinahtml.cn
ErrorDocument 404 http://www.etoow.com/error.html
SetEnvIfNoCase Referer "^http://www.etoow.com" local_ref=1
SetEnvIfNoCase Referer "^http://etoow.com" local_ref=1
<FilesMatch "\.(gif|jpb|png|css|js|swf)">
Order Allow,Deny
Allow from env=local_ref
</FilesMatch>
</VirtualHost>
最新技术文章: