| Along with science and technology development, computer technology to constantly improve, dedicated to education industry software and hardware have appeared. Uses in educating the profession specially the software and the hardware appears one after another, has brought very big convenient for the school teaching management, simultaneously has also provided very many convenient conditions for teacher's and student's daily life. The application of these high tech in the school convenient the educational circles, also gave the educational circles a question about the safety of the information management, the network security question has become a new question to educational circles. As a result of a one-card appearance, the school all has applied this technology in the first time. It provides the convenience for both teachers and students. Meanwhile, the school also must consider the safety of the card. The enhancement of network and the server security is the most important thing for schools.By many, for example: multimedia slides, network information, and laser projection and so on, these high-techs bring about new breakthrough to school education. The emergence of one-card also as the education sector development has played a role, significantly improved the management of schools in various fields. The appearance of the card has solved a lot niggling problems, and makes the campus consumptions more convenient. A card can be slippery in school, but also facilitate schools in wealth management.The development of the education sector affected by the technical implications, and also constrained by economic conditions, particularly those three-table institutions or non-governmental institutions. They strive to build a modern campus; therefore, will not abandon advanced technology to serve schools. However, due to shortage of funds, schools are often just going to the application, but did not consider the quality and future problems. In the tender, as long as the low price of whom, let someone to do the construction, this is wrong. For modern campus, improve the technology is right, but also need to consider the question of safety and quality, especially one-card,security is particularly important problem which cannot be ignored.The author participated in a one-card case of a university, and is responsible for the construction of a hardware and server tender selection and purchase also the maintenance work later. But due to the problem of school funds, making some very good companies unsuccessful and the midrange be elected. I also went to a survey of many institutions, made a research about the ope ration of the campus card and the co-operations of those universities. All the institutions I picked are capable, they only considering about the quality not the price. To make the card be more secure for our school, I got the school's secret instructions, carried out mock attacks in order to detect the one-card Server background security issues. Although we spent less money, but also to require security comes first. Only school leadership and the direct leadership know about this action. Since those IP and screen shots in the papers are not real, but very similar. This task is to be possible to control all of the servers, so we can require developers to do the upgrade or debugging, guarantee the safety of the school network server, and make future work be well prepared.This school contains campus network, one-card service, postal savings and other financial system. All of these four systems are in one network, so the security is the most important thing. The information on the network are real money, if any problem occurs, the consequence will be unable to estimate. Therefore, early experiment is very important.This article briefly describes the concepts, features, functionality, roles and harm of Trojan, to make those people who are not familiar with this have a preliminary understanding. And then it describes the work procession of Trojan, makes a simple narration about how it invades and starts. The procession is narrated by some simple commands and texts. And gave a brief introduction about how Trojan invades and send information to attackers. Defined by the above, we basically understand Trojan's work procession. In order to let everyone understand it better, this article demonstrates the whole process of how the Trojans invade server by illustrating the facsimile, to allow members more intuitive understand of the invasion of Trojan and the destruction of the server. Focuses are divided into five stages that are available for a preliminary study, namely: probe into a school network, break the caldrons and sink the boats, follow up a victory with hot pursuit and finally conclude the experience. From those instances above, we will get more about hazards of Trojans.The establishment of a secure server system, and for schools is more important, secure server system, each other protection, when a certain part of the problems can be remedied in time, can not be the school's server in isolation from, it should be pursued with the surrounding The other devices together as a whole, overall planning and arrangements, in order to comprehensively address security issues, better ensure server security.Therefore, we must build a holistic, comprehensive and powerful computer network security system. Only the entire network to develop and implement uniform security system in order to effectively protect the network involved in the server and other components. Also asked each school faculty are clear and well known to the security system, and know that it is forced to implement.A complete security system includes two parts: security management and security technology. Security Management from a management point of view, the use of regulations and systems of writing specifications, constraints, a variety of computer network behavior, such as a variety of network equipment and operating specifications; security technology suggests that it is from a technical point of view, using a variety of software and hardware, all kinds of techniques and methods to manage the entire computer network.Specific to the server, on the one hand the need for strict norms on the server to operate, banning all potentially harmful behavior on the server and its data, especially for "write", "delete" such acts; strengthen the engine room of the administration to prevent the addition to network management casual operation of persons other than the server. The other side, to the extent possible the use of existing security technologies to protect the server safe. For example, the operating system can be used to provide a "user permissions" function under the operational characteristics of each staff member to develop their individual special permissions to access the server, thus avoiding the use of a unified authority to access the server to bring potential safety problemsKnowing the maintenance, we certainly have to consider how to minimize the Trojan horse on the network and server attacks and how to protect these hazards. Later, I make a narrative about the server security explains how to protect and build a high secure server and so on. Finally, through the instances and protective measures above, I made some constructive suggestions for improvement for a university. They could be the references of the campus network security, hoping can help the security of the campus one-card service. In order to let teachers and students enjoy the campus one-card service in the future, we need to learn more knowledge of network security, so that we can make protection strategy quickly. It can guarantee that our campus network will always be carefree if we always walk in front of the Trojan. |