Teach you to use tamper-proof and WAF to secure your site

Source: Internet
Author: User
Tags sql injection firewall backup

A few days ago also to everyone said Web application firewall, including software and hardware, today, Internet Ranger to recommend a product, of course, this is the second one, is: Web page tamper-proof +web application firewall. More features, okay, nonsense do not say, the text begins:

Installation is skipped, I believe that the people interested in this article can be configured according to the instructions. Here are just a few features.

The product itself has a configuration wizard, you can make a novice can easily in 1 minutes to complete the site's default protection, of course, if the requirements are relatively high, you can customize the strategy, the following image is a site file Protection of a setting:

You can see that the file operation permissions can be set up, including reading, writing, renaming, delete, etc., prohibit deletion, renaming, writing, in fact, to achieve the Web page tamper-proof function. If the directory is forbidden to write, it is completely unable to change any content of the site, suitable for the higher demand of the government website.

Of course, you can set up trusts on certain file types, such as. mdb does not prohibit writing, so that dynamic Web sites can be updated normally.

You can set up a trust process to release or block actions that are performed through the trust process. A simple example: can be covered by FLASHFXP, but not through the leapftp overlay, so that the hackers do not know the trust process, you can not easily tamper.

  

Of course, as a qualified website protection products, backup function is also necessary. For example: power-on backup, backup encryption and so on.

The above is the Web page tamper-proof function of the introduction, the following site protection function, to know that most of the site is black because of their own loopholes caused, then the site protection function can better prevent their own vulnerabilities, such as common SQL injection, Cross-site scripting attacks.

I have a policy configured below, the name is "www.youxia.org"

See more highlights of this column: http://www.bianceng.cnhttp://www.bianceng.cn/web/Skills/

You can configure how the policy responds: Log and block, record only, and stop.

The following are the details of the policy:

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.