Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall
Compared to the beginning of the site, the idea is very simple, have a good dream, consider all aspects are not very comprehensive. I do for Gu net (Taobao selling women promotion www.egouo.net) Webmaster, just started to do the site when the idea is so simple, think everything is so beautiful, can quickly through the ancient Amoy net to earn Taobao customers the first bucket of gold.
In order to launch as soon as possible Amoy popular women to promote the site, on the network to download a website source code, and not from its official online download. With some simple changes of my own, my first website was officially online. But, everything is so bad, a no flow, two did not earn Taobao commission, three has been black two times. Take the 3rd let me enough bitter brain, finally add up the data are all destroyed. Why the site is always attacked, the old hackers? And so on, I need to think about and solve.
The first time was black also did not think more, thought is I do several pages of the vulnerability (did not do SQL injection prevention), modified those pages and then began to re-enter the data. This morning, the opening of the Web page, 360 security guards began desperately error, a check and was black, this time fortunately, did not lose much, because of the previous lesson, not regularly to the data back up. But why is black, this time will be a good study, but also consulted the space service provider! First of all, I will share the analysis, said the wrong, please understand
1, the site to do a good job of SQL injection prevention, whether it is their own code, or online, to audit, download down there may be a loophole
2, the network download the source, preferably on its official website to download, other downloads may have been modified, so it is easy to be used by people. I now use do not rule out this possibility, before using, have the ability of the best to audit their code, see if there is a "back door"
3, it is best to change the table name in the database, of course, this also needs to modify the source code, in order to reduce the workload can be used to modify the source code batch. Since it's open source, anyone can download it, including hackers, who can analyze the source code and the database to attack it.
4, decided to use the Web site before the source code, it is best to study it, select those with less loopholes in the source code, and timely repair loopholes. Today, I searched the version I used, and found that there are many loopholes ah.
5, to Do data backup work, just in case!