Researching, checking, implementing server security such FTP service anonymous login, VNC service access, RDP service access, LDAP server access, PPTP service access, RSYNC service access, SSH supports weak ciphers, SSH supports weak MACs and CVEs for related services,