DEDECMS Security Tutorial: A few things a rookie has to do

Source: Internet
Author: User

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

Recently engaged in the Valley Hundred Excellent competition, do I rarely write articles, but because some things recently frequently used dedecms, slowly by unfamiliar become more familiar with, during the period also because of their own negligence was the invasion of the horse (that station's word is a profiteering station competition is strong, resulting in a lot of vicious competition), So there is some experience to share. My Valley Hundred Excellent competition station is the Valley Hundred Excellent Rice (www.gubaiyoudm.com), has the interest to sponsor several friendship links may contact me. Oh, the following officially into our business!

First of all here to despise the so-called hackers, basically are a group of garbage will only repeats, the master released some of the tutorial loopholes, and then find a few software retrace black several sites on their own block for XX hackers, but also to give themselves a look like a cow fork is very non-mainstream code, and then the arrogant. What is a hacker, and those Scripting Guys are programmed? Do you have the ability to explore yourself? Can you calm down and analyze the problem? Are there thousands of people on their own to find loopholes?

Others do not want to say too much, just for the network exists in this group of people feel sad. I am not a master, I am also a rookie, the network security also know not much, here only send some I think of some safety measures, too esoteric I will not, so this tutorial should be more practical for rookie friends.

Dedecms is a more commonly used CMS, here we use this as an example to introduce some measures to enhance the security of the site.

First, in the installation process, the database indicates that the prefix if no special need, the best change, such as Dedecms prefix is Dede_, then you can modify to xsd_ some other name;

Second, the installation process of the user name do not use the default admin, root, administration and other commonly used names, to change a bar;

Third, the Administrator password: Do not worry with their own name or QQ number and so on, those boring hackers like "social engineering" where the blind guess, maybe really was found dead rats; one of my netizens told me about a dedecms station, PR3, Admin account since it is admin, more ridiculous is the password is 123456, the best combination of alphanumeric letters, uppercase and lowercase letters have, more than 8 digits, plus some symbols better.

Four, the management of the background directory name, dedecms login background is the root directory under the Dede directory, I used some AH D toolkit and other hacker software, those software are included some data to guess your management backstage, change a bar, and its best to change a bit more confused, For example, there are directories in the Dedecms directory, such as member, you can change the Dede to the members directory and other names.

V, other directory processing, install deleted or changed to another name, there are other directories because the server security is not high enough to cause a burst directory, such as input: http://www.xxxx.com/templets (XXX is your domain name) will be exposed to the next figure, For such a problem, just add a index.html file in such a directory to solve.

  

VI, the most absolute way, I have heard some cattle said, in the local generation of good HTML files, and then only upload HTML files to the server, afterlife.

Finally, remember to check their own website, do not be people hanging horses do not know, install a small red umbrella, such as anti-virus software horse is still very accurate, and was linked to the black link can only occasionally check the first page code it, and finally worth saying is dedecms from the Trojan file scan function is very good, The invasion of the right to do not know what to do first use this plugin check it. To do enough of the above, to deal with those who only eat other people eat the hacker is still very safe, of course, encounter the real hackers that is no way to only see bad luck, but I think the real hackers will not eat enough to black our small web site bar, inconspicuous ... Black also black station AH, another day the Baidu to black ...

Qin Jian to say about this, and finally with you say, Dongguan SEO back to the first, unsurprisingly, on a few links just, all of SEO or that trip, it is time to learn other technology!

Reprint Please specify: Bing http://www.imbfw.com Thank you for your cooperation!

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.