Analysis on protection against website Trojans for visitors and network administrators

Source: Internet
Author: User

Defense Against website Trojans and visitor Protection

 
The most basic thing is to download an anti-virus software on your machine and monitor your computer at any time, because it is already a good choice for cainiao. Also, you should always be careful with the web pages that each person sends to you, or websites that you feel a little untrustworthy. (TIPS: When network access is hacked, is there any other possibility that the website will not be hacked? Security should be put first), then download a software that can directly view the source code of the web page, or directly enter "view-source" in the address bar, and then enter the URL later.
 
Then look for some connections in the notepad. Of course, if you want to make your machine safer, There is only such a clumsy method. It is very easy to find the webpage trojan for the average ice Fox prodigal son, you only need to press F3 in the notepad of the source code and enter icyfox in the character to be searched. In this way, this possibility can be ruled out, you can also enter "src" to check the connections that will be followed by a row. In this way, searching for a row is more time-saving.
 
If you think the connection is suspicious, you can continue to use the method of viewing the source code to view the suspicious connection. Of course, according to the habits of the Trojan, they are generally willing to use this method, and shorten the query time. If you think this is not easy, and you rarely log on to java scripts at ordinary times, you can disable java scripts and activex from running on your machine, in this way, your machine is much more secure, and Web Trojans generally rely on these web pages to enter your computer. Therefore, it is easier to do so.
 
The visitor's access and governance methods have been introduced. Next we will continue to talk about how the server's network administrator can prevent its own servers or websites from being Trojans:
 
Prevention of website Trojans
 
The first item is basically the same as that of the visitor. It is to install anti-virus software on your own server for constant monitoring. It is best to Install Multiple anti-virus software at the same time, even though the anti-virus software is incompatible with each other, however, you can find many modification methods on the Internet to make them compatible. After all, the program is not perfect, and the virus database is different. The types of viruses or Trojans killed should also be a bit different, in this way, we can supplement each other's shortcomings. In this way, the server will be further secure. In addition, we need to do a good job of our own servers and try our best to prevent others from being injected or exposed to violent databases.
 
Because there are so many popular attacks, as long as your site is secure and others want to use your site to attack others, it will be very difficult. If the server has been infected with Trojans, you can check them in batches, you can also check the webpage for Trojans by visitor feedback or when the visitor checks the page, and then modify the page with the webpage batch modifier (4)
 
Server maintenance is actually more difficult than server attacks. As long as the server administrator manages the server with all his/her efforts, the possibility of being infected with Trojans will be greatly reduced, and the server will be infected with codes, batch modifier is a fast and efficient helper. We will introduce the prevention of Trojan Infection, because my personal abilities are limited. If you have any better methods, please kindly advise me, welcome friends who are interested in security and code to make progress together with me.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.