Comments: If you use a virtual host or shared space, you can ask the host provider to Install MCAFEE. ASP suffix database, you can let him set only for your website directory.
Go to the Mcafee VirusScan console, double-click access protection-> file, share resources and folder protection, and add
Rule name: Prohibit website processes from creating and modifying files (. asp) anywhere.
Content to block: Process: ** w3wp.exe **
Name of the file or folder to block: ** \ **. asp
The blocked operation types are: Write, create, and delete.
Then confirm
You can only block the IIS process from creating and modifying ASP files (this document uses ASP files as an example. Other program settings are basically the same ), in this way, we use other methods (such as directly modifying on the server or modifying through FTP ......) Modifying ASP files will not be affected
In this way, the possibility of a hacker uploading a trojan is cut off without affecting normal use. This method can be used by anyone. It is also suitable for host vendors to install it on their own virtual host servers to ensure the security of users' websites on the server.
Basically, even if the website has any vulnerabilities, the website will not be infected with illegal code by the upload Trojan, or the website will be deleted or modified.
Note that this rule will prevent IIS processes from accessing any. asp file modification. Therefore, if your website uses an ACCESS database, do not change the database suffix to ASP after using this rule.
If you are a host provider, You need to inform your users that you cannot change the database suffix to ASP. Otherwise, the database cannot be written.
If you use a virtual host or shared space, you can ask the host provider to Install MCAFEE. ASP suffix database, you can let him set only for your website directory.
The same method can prevent changes to the PHP file. It is best to enable the permission to create the exe file in the system folder.