Www.2cto.com: can be combined with this article: http://www.bkjia.com/Article/201105/89992.html
Recently, some boring people like to exploit 0-day vulnerabilities to upload traffic attack scripts, which is a headache. Currently, the dedecms vulnerability is found in 99%. If you are using the dedecms program, see the following steps.
1. Update the patch in the dedecms background and try to upgrade it to the latest version.
2. The write permission is removed from the data, templets, uploads, and install directories.
3. If you only use the article system and do not use the membership function, we recommend that you disable the membership function, disable new member registration, directly Delete the member directory, or rename it.
4. Use the file verification and virus scanning function in the "System" in the dedecms background to scan and kill viruses and Trojans.
5. Check for/data/cache/t. php,/data/cache/x. php, And/plus/index. php trojan files. If yes, delete them immediately.
6. Check/plus/config_s.php. This is the traffic Attack Script in dedecms.