answersLogoWhite

0

database server

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

What server role is used to manage security tokens and security services for a web based network?

Active Directory Federation Services is used to manage security tokens and security services on a Windows Server 2008 Web-based network.


What is a cctv system and how is it used?

A cctv system is a security system, mainly a security camera. It's used to transmit a signal to a specific place.


What is an ISA server used for?

An ISA or Internet Security and Accelerator Server is an enterprise firewall and and a cache server which helps to reduce network traffic and provide quicker access to frequently visited websites.


What are the differences between Windows and Linux server security?

There is security on Linux and there is no security on Windows. Well, there is, but it's quite weak compared to Linux. Among other: -Better rights management -Kernel security modules, some of which were developed by US government, and some by security-specialized companies, so you have the idea. -Since Linux is extensively used for server solutions, you can guess that most of server software is pretty much top-notch.


Why server security is very important?

To ensure the security of your server always protect your computers by having backup of important data and protect your network from infiltration by subscribing to network security. Location of your server also matters a lot, so keep your server safely in a room that is far away from the public view. Changing passwords at least twice a week is a good step towards ensuring server security. Have the server with a good firewall that can act as a powerful weapon to detect hacking attempts and notify you of any impending threat. Server security can also be maintained by providing least privileges to ensure that no one accesses for mischievous purposes. You can maintain a transaction log file to identify who did the changes in this time etc. Today, there are numerous server security available online that can be used to perform standard and advanced audit of the system to keep it clean and free from hacking threats.


What has the author Chip Andrews written?

Chip Andrews has written: 'SQL server security' -- subject(s): Computer security, SQL server


Where are ports 80 and 443?

Port 80 and port 44 are located inside the server and mainly Port 80 is used by server transactions of HTML pages to the web browser. thanks


3 differences between a desktop OS and a server OS?

1.With server OS we can manage desktop OS. Server Os is higher version of Desktop OS. 2.server OS gives centralised administration for users shared resources higher security. But Desktop OS gives local machine administration only. 3.Server OS is fully covered & managed security. For (ex) Domain Controller application server print server etc. We make server with security. for Desktop OS Normal PC. We make low level security.


A computer on a network that requests resources from a server?

The computer on a network that requests resources from the server is called the client. The server may also be used to implement administrative security for the client computers.


Which AF system security instruction contains security requirements for the web server?

Network & Computer security


What are exchange servers used for?

An exchange server is a server developed by Microsoft which handles email and contact information. It is typically used by businesses and contains security features, large database storage, as well as many customization features.


Where are some good resources to read up on SQL server security?

The following are good resources to read up on SQL server security Technet, Aws Amazon, and Dba Stackexchange. In brief SQL server securities are physical network security,and disaster recovery.