I. Cryptographic
Give the database a random and complex name to avoid being guessed to be downloaded. This method is popular in the past, because everyone is confident in their own code. However, with the error message indicating that the database address is leaked, the database is illegally downloaded. This method is used by fewer and fewer users.
Ii. "#" Type
Add the # sign to the database name. When a request is sent from a URL, # Is a separator between the request address and the request parameter. If the database name is known, the request is directly sent, for example: bytes. You can also download it directly if you use a download tool such as FlashGet.
Iii. ASP
This is a professional but safe practice. It is also a popular practice. However, many people only make half of the work, but change the data name to ASP, in this case, you can directly download the database using a download tool such as FlashGet. The correct method is as follows:
Step 1: create a field in the database with random names. The type is OLE object and the content is set to single-byte type"
After this code is run, a nodownload table is generated in the database, and the field in the table is notdown. If a data table with the same name already exists in the Database, change nodownload in the Code to the name you want.
Iv. asa type
The true meaning of this method is to use IIS to protect the ASA file, so that the database file cannot be directly downloaded from the URL, but this method is misunderstood as long as the file suffix is changed to ASA. You must know that IIS only applies to global. the asa file name is protected by requests. Therefore, this method can only set the database name to global. and set it to global. it is better not to place the asa in the root directory of the host or virtual directory, otherwise it will be normally global by IIS. asa file.