<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0">
<channel>
<title><![CDATA[孤城浪子的地盘]]></title> 
<link>https://www.gclz.cn/index.php</link> 
<description><![CDATA[]]></description> 
<language>zh-cn</language> 
<copyright><![CDATA[孤城浪子的地盘]]></copyright>
<item>
<link>https://www.gclz.cn/post//</link>
<title><![CDATA[删除扩展存储过过程xp_cmdshell的语句]]></title> 
<author>孤城浪子 &lt;admin@yourname.com&gt;</author>
<category><![CDATA[服务器设置]]></category>
<pubDate>Sat, 27 Oct 2007 06:11:00 +0000</pubDate> 
<guid>https://www.gclz.cn/post//</guid> 
<description>
<![CDATA[ 
	<span class="l15"><p>删除扩展存储过过程xp_cmdshell的语句:<br />exec sp_dropextendedproc 'xp_cmdshell'</p> <p>恢复cmdshell的SQL语句<br />EXEC sp_addextendedproc xp_cmdshell ,@dllname ='xplog70.dll'</p> <p>在sqlserver的query analyer中运行以下命令就可以去掉sa的xp-cmdshell权限： <br />if exists (select * from dbo.sysobjects where id = object_id(N'[dbo].[xp_cmdshell]') and OBJECTPROPERTY(id, N'IsExtendedProc') = 1) exec sp_dropextendedproc N'[dbo].[xp_cmdshell]' GO</p> <p>一般SQL2000是通过下面语句恢复： EXEC sp_addextendedproc xp_cmdshell ,@dllname ='xplog70.dll' <br />而SQL97是通过下面语句恢复 EXEC sp_addextendedproc xp_cmdshell ,@dllname ='xpsql70.dll'</p> <p>sp_addextendedproc'xp_cmdshell','xpsql70.dll' (sql 7.0) sp_addextendedproc'xp_cmdshell','xplog70.dll' (sql 2000) </p></span><br/>Tags - <a href="https://www.gclz.cn/tags/2003/" rel="tag">2003</a> , <a href="https://www.gclz.cn/tags/iis/" rel="tag">iis</a> , <a href="https://www.gclz.cn/tags/sql/" rel="tag">sql</a>
]]>
</description>
</item><item>
<link>https://www.gclz.cn/post//#blogcomment</link>
<title><![CDATA[[评论] 删除扩展存储过过程xp_cmdshell的语句]]></title> 
<author> &lt;user@domain.com&gt;</author>
<category><![CDATA[评论]]></category>
<pubDate>Thu, 01 Jan 1970 00:00:00 +0000</pubDate> 
<guid>https://www.gclz.cn/post//#blogcomment</guid> 
<description>
<![CDATA[ 
	
]]>
</description>
</item>
</channel>
</rss>