In recent years, the zencart website has been redirected to hacked and more frequently. Although zencart updates vulnerabilities, hackers always have a way to find intrusion methods, after intrusion, the website is suddenly redirected, webpage files are maliciously modified or hidden links are added, and the payment method or recipient information of the website is even modified. I have provided several useful solutions to these problems. 1. Use the ftp tool to link your php virtual host. htaccess file to check whether the file is modified. If it is modified, upload it again. htaccess file 2. When a trojan is found to be infected with a Trojan, back up the program to a local computer and Use anti-virus software to delete some simple Trojans. However, many Trojans are hard to be found, these Trojans are generally stored in other directories except des, especially the images directory. Many Trojans disguise themselves as image files and open them to check whether the file is a real image file, if not, delete the file directly. Another simple method is to use a browser home to access the problematic file. Generally, a password is used to access the trojan file and delete it directly. 3. For Jump code, there are generally js Code and php code. You can go to the database and run the following code updateproducts_description set products_description = replace (products_description, 'replacement word ',") replace the text with your website jump page. 4. Check whether the background administrator has added the database password and the background path of the background password. 5. there are still problems, find the server access log and record it when it is almost hacked to see how it was infiltrated. Next, let's talk about some preventive measures. 1. Update the website patch in time. 2. Modify the background. directory address 3. modify. the htaccess rule Disables direct access to files. The following code is used: select all
<Files *. php> Order Deny, AllowDeny from all </Files>
4. When installing or writing some extensions or modules by yourself, pay attention to the Code parameter security to prevent SQL injection.