old boy One topic per day:2017-3-7 Day content finishing
(i) Solution Strategy
To the enterprise interview is a number of competitors, so pay attention to the dimensions and height of the answer, we must direct the second to kill competitors, to fix high-paying offer.
(ii) solution Tactics
Linux web server, depending on the website from which the malicious person visited the site -- >linux system -->http Middleware services --> storage, layer multiplication protection.
(iii) Answer reference from user access point of view
1 Program ( Js
2 service layer (middleware layer), Database and other levels of control.
3 +web
4 service layer +
5 configuration and other files md5
6, install anti-virus software ClamAV , etc., regular monitoring of the Trojan horse.
7, configure the server firewall and intrusion detection services.
8, monitoring Server file changes, process changes, port changes, important security logs and timely alarm.
1 Management Server or web
2,SSH monitoring intranet.
3, the use of Springboard machine, Operation Audit.
4,sudo centralized management, locking key files.
5, the site directory, upload directory permissions belong to group control.
6, do system and site file backup fingerprint monitoring alarm.
7 , dynamic password Authentication.
This article is for the old boy it education all , welcome reprint, Reprint please indicate the source of the author. Thank you!
Enterprise Interview quiz: how does Linux server prevent the Trojan horse?