I am very happy to share some things with my colleagues here. today I will share with you how to ensure host security and provide basic protection for website security operations. the hosts here include vps, VM instances, as long as they are for daily access
I am very happy to share some things with my colleagues here. today I will share with you how to ensure host security and provide basic protection for website security operations. the hosts here include vps, VM instances, as long as they are web hosts for daily access.
Host Security: The success of a website requires a good host. a good host can carry the frequent access of users to continue working. Generally, you will not buy a host, I will buy a host only when I feel it is necessary to invest in it. as a website operator who is just engaged in website operation, from the perspective of investment, generally, you will first try to purchase a virtual host.
One of the best advantages of a VM is that it is cost-effective and does not require server configuration. you can upload programs through ftp and set basic website information, such as mysql connections. after that, you can go online, what are the disadvantages? the virtual host is a public ip address. if one of the websites is k, it will still have a certain impact on the website, in addition, the speed of cheap virtual hosts is also slow, mainly depending on the host service provider. the host service provider is a kind of good-looking. it's okay. The website is too busy and cannot be opened for half a day. go back to the topic, in this case, the user will not worry about host Security. of course not. First of all, when you purchase the service, you should first understand that those providers focus on security and can provide quality services, even if you do not know, do not purchase virtual hosts of some unknown companies. I personally recommend that you buy first-line hosts such as HiChina. after HiChina is paid by Alibaba, this is an outstanding solution, and host security can be fully guaranteed.
If you do not select a virtual host, you may choose vps. what is vps like? in fact, vps virtualizes multiple servers on one server. of course, when you purchase it, the host provider assigns you a virtual server for your service. in the user's opinion, it is a separate server. generally, vps is an independent ip address. compared with those virtual hosts, this is indeed a huge advantage. As long as you do the website in a regular way, it is not a mess, it will not be k, back to the topic, then vps will basically go out by yourself, when the host provider assigns you, it is assumed that a computer is assigned to you. you have to do everything on your own for this computer. if the host machine is used, there will usually be 2 middle operating systems, windows, which everyone is familiar, in linux, it may not be necessary. it is difficult to use the command line. no matter how you do it, you cannot run such a few points.
Modify the remote port. many users still use the default port 3389. what is the port 22?
Change the administrator password. do not use any default administartor or root.
The modified username and password must be kept in mind. some friends will go to the game after the change. as a result, the password and account will be re-played, so this will not be done, seriously, you need to reinstall the system.
Install anti-virus software
Do not use a browser to access the Internet on vps, especially on IE. if you must use a browser to access the Internet, open the Internet Explorer and consider google [we strongly recommend that you do not use the Internet to avoid viruses or Trojans]
Next, when installing the website program environment, be sure to download the normal installation package from the regulation Source. if iis is going, the sky will be there, download it, and so on. download the downloaded content anyway, it is best to take anti-virus first
Make sure that the website environment is installed, and then start uploading the program. after testing, start launching the website.
After completing the above steps, it is the most important step. except port 80, if ftp (Port 21 by default), ftp port, or remote (port 3389 by default) exists ), in linux, port 22 is used. access is prohibited from other ports except the remote port.
If it is neither a virtual host nor a vps server, the host security is the same as that of the vps host. the vps is the same as that of the purchased server, however, the performance of your server may be awesome.