How to effectively prevent Trojan Horse interference and prevent backdoor viruses

Source: Internet
Author: User

Although it can minimize the losses caused by Trojans and backdoors, the best way is to prevent them from happening.

1. Basic backdoor defense skills

First, you must disable unnecessary ports on the local machine or only allow access from specified ports. Second, you must use the Trojan-killing software to effectively prevent Trojans and backdoors. Third, you must learn how to operate processes, always pay attention to the system running status to see if some unknown processes are running and stop them in time.

2. Securely configure the Web Server

If a company or enterprise has established a homepage, how can we ensure the security of its Web server?

First, disable unnecessary services. Second, establish security account policies and security logs. Third, set secure IIS, delete unnecessary IIS components, and configure IIS security.

When configuring IIS security, you must modify the default "Inetpub" directory path. You can delete the "Inetpub" Directory of drive C, create an "Inetpub" directory on drive D, and then point the home directory to the new "Inetpub" Path in IIS manager. In addition, you also need to delete the default virtual directories such as "scripts" and "print", and then delete unnecessary mappings in the IIS manager. Generally, You can retain ASP and ASA.

In the "IIS Information Service" Manager, right-click the host name, select "properties"> "main directory", and click "advanced, you can delete unnecessary mappings in the ing label. In addition, select the "website" tab in the Properties window, select "enable log", and select "use W3C to expand the log file format, the customer's IP address, user name, server port, method, URI root, HTTP status, and user agent should be recorded every day, and logs should be reviewed every day.

After the above basic work, you also need to set the access permission for the Web site directory.

In general, do not grant directory write and directory browsing permissions. The ASP file directory uses the script permission instead of the execution permission. In the "IIS Information Service" Manager, expand the virtual directory of the website, right-click a virtual directory, and choose "properties"> "virtual directory, under "local path", you can set the permission for this directory to "read" or "directory browsing. In addition, you can strictly set user directory permissions in the NTFS partition format.

For the most important data in enterprises, we must strengthen protection against Access database downloads.

When using Access as the background database, it is very dangerous to download the Access database file if someone knows or guessed the path and name of the server's Access database through various methods. Therefore, you need to change the default database file name, create a complex and unconventional name for your database file name, and store it in a relatively deep file directory. In addition, you can add a password to the Access database file.

Open the IIS website property Settings dialog box, select the "main directory" tab, and click the "configuration" button to open the "Application configuration" dialog box. Then, click "add", enter "asp. dll" in "executable files", and enter "extension". Mdb, select "limit as", and enter "deny". After confirming the application, complete the settings. In the future, when intruders attempt to download data, they will be prompted to prohibit access.

Finally, you must configure a secure SQL Server.

SQL Server is the most widely used database system in various website systems. Once attacked, the consequences are very serious. Although the default SA user has all permissions to operate the SQL Server database, the SA account token is set to a blank password, so you must set a complex password for the SA account. In addition, you must strictly control the permissions of database users. Instead of directly querying, modifying, inserting, and deleting permissions, you can only grant users the permission to access views and execute stored procedures.

Pay attention to security when choosing to create a website Web program. Although many website systems are powerful, due to the security awareness of programmers, there are some serious security vulnerabilities, such as common SQL Injection Vulnerabilities and brute-force databases, attackers may exploit this vulnerability. At the same time, we should also back up the data on the website server in order to recover data in time in case of an accident.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.