Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall
1. Custom 404 page and custom transfer ASP error messages
404 can let the hacker batch search your backstage some important files and check the webpage to have inject flaw. ASP error, you may send the unknown to the person you want the information.
2. Routine Maintenance
A. Regularly back up data. It is best to back up every day, download the backup file should be deleted in time on the host backup file B. Periodically change the name of the database and administrator accounts. B. Use Web or FTP management to view the volume of all directories, the last modification time, and the number of files to check for exceptions to the file. And see if there are any unusual accounts.
3. Modify Background files
First step: Modify the name of the validation file in the background.
The second step: Modify the conn.asp, prevent illegal downloading, can also encrypt the database after modifying the conn.asp.
Step three: Modify the Acess database name, the more complex the better, you can change the directory of the data. 4. Restrict Login Background IP
This method is most effective, and each virtual host user should have a feature. Your IP is not fixed on the point of trouble every time to change it, safety first.
5. Carefully select the website program
Notice whether the Web site program itself has loopholes, good or bad you my heart should have a scale.
6. Cookie Protection
When landing, try not to visit other sites to prevent cookies from leaking. Remember to exit when the key exits are closing all browsers.
7. Create a robots to effectively prevent the use of search engines to steal information
8. Self Test
Now in the online hacker tools a basket, not to find some to test your site is OK.
9. Revise the account secret
Whether it's business or not, passwords are mostly admin. So the first thing you get from a Web site program is to change the ledger. Do not use the old habits you used before, a little special. Try to combine alphanumeric characters with symbols. In addition, the password preferably exceeds 15 digits.
10. Carefully upload the vulnerability
As far as I know, uploading vulnerabilities is often the simplest and most serious, allowing hackers or crackers to easily control your site. You can prohibit uploading or restricting the type of files uploaded. If you don't understand, you can find your website program provider.
11. Directory Permissions
Ask your administrator to set up some important directory permissions to prevent irregular access. Do not script permissions to the uploaded directory and do not give the upload directory a write right.