Four steps to protect Windows data from Google hackers

Source: Internet
Author: User

Using appropriate countermeasures can help you keep highly confidential information away from Google and cannot be searched by Google hackers. Here are four steps. You can try to do this:

1. Consolidate your server and isolate it from the external environment

Unfortunately, many key servers are still completely exposed to the Internet. Now please tighten your server's access control and put it behind the firewall.

2.set the robots.txt file to prohibit Google Indexing Of Your webpage

You can set the "googlebot" "User-agent:" parameter to protect files and directories on the network server from Google indexing. The method is in "Disallow: "section lists the information you want to keep confidential.

Or, if you want all Web Robots not to access your website or webpage, set the "User-agent:" parameter to "*", but remember, malicious people hanging around the Internet can get this file from your Web Server and see what information you don't want others to see. If this looks like a weakness of the Internet, then it is. You can upload the robots.txt file, but you should allow the robot to index only the specific public pages, or prohibit them from indexing any information starting with the root directory by entering "Disallow.

Please visit The Web Robots Pages (The http://www.robotstxt.org/wc/robots.html vendor gets information on how to configure your robots.txt file and how to execute more anti-bot spoofing. Google also has a FAQ on Googlebot's operation (http://www.google.com/bot.html ).

3. Remove highly confidential information from the public server

Create an organizational policy to protect highly confidential information (such as passwords and confidential files) from servers that are accessible to the public. Otherwise, use any possible access control measures to protect them, ensure that these policies can be enforced, and manage those who violate the rules.

4. Ensure that your server is secure

To maintain server security, use the Google testing tool and Google search I have discussed in this series of techniques to perform hacker testing on the tool.

I highly recommend using automated testing tools, such as SiteDigger and Gooscan for hacker testing. Manual execution of multiple queries is not only slow, boring, but not easy to manage.

Remember, these tests are just mining tests conducted by Google. They do not represent all hackers and Internet security. These are not the best tools to test all system vulnerabilities. As an alternative, you must use "multi-layer" testing: Google and other free, open-source, and-in my opinion, most comprehensive and reliable-commercial tools for testing, these commercial tools I recommend with SPI Dynamics WebInspect (for Web applications, http://www.spidynamics.com /), Application Security's AppDetective (for Web databases, http://www.appsecinc.com/) and Qualys's QualysGuard (for operating system and network Vulnerabilities, http://www.qualys.com /).

If simulated hackers, penetration tests, and general network security audits are part of your responsibilities, these Google Hacking technologies and tools will become part of the security toolbox you need. For the sake of security, Please execute it now and it will be executed frequently later.

About the author: Kevin Beaver is an independent information security consultant and author. He is also a spokesman for Principle Logic and LLC in Atlanta. He specializes in those who need strict security protection, or companies seeking solutions to emergencies provide information security research services. He is the author or co-author of four books on information security, including Hacking for Dummies (_ 1_2/002-6195114-4480811? V = glance & s = books "> http://www.amazon.com/exec/obidos/tg/detail/-/076455784X/qid=1086746862/sr=1-2/ref=sr_1_2/002-6195114-4480811? V = glance & s = books) and the forthcoming Hacking Wireless Networks for Dummies (http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764597302.html ). These books are all planned and published by Wiley Publishing Group. You can contact Kevin Beaver via kbeaver@principlelogic.com, this is his personal mailbox. You can also.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.