How to prevent Trojan horse in Linux system?

Source: Internet
Author: User

As a maintenance engineer, the responsibility is not urgent to quickly locate and deal with problems, but to prevent the situation, this is our value, is not?


(i) Solution strategy

When interviewing and being interviewed, we need to pay attention to the dimensions and height of the answer, we must directly kill the competitor, the boss.


(ii) Solution tactics

< Span style= "Background-color:rgb (255,192,0); font-family: ' The song Body '; > via upload to directory this way to upload Trojans to linux server,

can be started by visiting a website from a malicious person -->linux system -->http Service - Middleware Services - Program Code -->db--> storage, layer multiplication protection.


(c) from the Span style= "font-family: ' The song Body '; Color:rgb (62,62,62); Background-color:rgb (255,192,0);" > user access angle answer reference

    1. The developer code restricts the upload file type, For example, you cannot upload a. PHP program (JS and Backend code control).

    2. Detects uploaded content, including text and files, and is controlled through programs, the Web services layer (middleware layer), and the database.

    3. Controls permissions to upload directories and permissions for non-site directories (Linux file directory permissions +web service layer control).

    4.   Access and execution control (Web service layer + file system storage layer) after Trojan file.

    5. MD5 fingerprints and backups of files such as important profiles, commands, and web configurations.

    6. Install anti-virus software CLAMAV, etc., regular monitoring Trojan horse.

    7.   Configure server firewalls and intrusion detection services.

    8. Monitors server file changes, process changes, port changes, critical security logs, and timely alerting.


(iv) from the perspective of internal management : Prevention of the right to be raised

    1. A VPN Management Server or a Web Management server.

    2. SSH monitors the intranet.

    3. Use of Springboard machine, Operation Audit.

    4. sudo centralized management, locking key files.

    5. The site directory, upload directory permissions belong to group control.

    6. Do system and site file backup fingerprint monitoring alarm.

    7. Dynamic password Authentication.


This article is from the "funny Brother Notes" blog, be sure to keep this source http://qiuyt.blog.51cto.com/1229789/1919663

How to prevent Trojan horse in Linux system?

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.