How to Improve server security in website construction

Source: Internet
Author: User

To build an enterprise website, domain names and servers are required. If many enterprises are willing to choose their own servers, they must ensure the security of their servers, because website stability is crucial to website optimization, the following is a website editor in Yantai to show you how to improve server security.

I. Security Vulnerabilities
1. Secret files, directories, or important data that cannot be accessed by others on the Web server.
2. When a remote user sends a message to the server, especially a credit card or something, it is intercepted by criminals.
3. Some vulnerabilities in Web servers allow some people to intrude into the host system, damage some important data, and even cause system paralysis.
4. CGI security vulnerabilities include
(1) intentionally or unintentionally missing buckets in the host system to create favorable conditions for illegal hackers.
(2) When a program written in CGI script involves a remote user entering a Form from a browser and performing a search index ), or form-mail or other commands on the host may cause danger to the Web host system.
5. Some simple Web servers downloaded from the Internet cannot be used as commercial applications without considering some security factors.
Therefore, you must pay attention to system security when configuring servers or compiling CGI programs. Try to block any existing vulnerabilities and create a secure environment.
Ii. Improve system security and stability
Web server security prevention measures:
1. Restrict the opening of accounts on Web servers and regularly delete users with broken processes.
2. For accounts opened on Web servers, make relevant requirements in terms of password length and regular changes to prevent theft.
3. Try to use FTP, MAIL, and other servers to separate them. Remove irrelevant applications such as ftp, sendmail, tftp, NIS, NFS, finger, and netstat.
4. Remove some unneeded interpreters on the Web server, that is, when PERL is not used in your CGI program, try to delete PERL from the system interpreter.
5. Regularly view log logs files on the server and analyze all suspicious events. When rm, login,/bin/perl,/bin/sh and other records appear in errorlog, your server may have been infiltrated by some illegal users.
6. Set the system file permissions and attributes on the Web server. assign a public group to documents that can be accessed and assign only read-only permissions. All HTML files belong to this group, which is managed by the Web administrator. Only the Web administrator has the right to write the Web configuration file.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.