Some people often ask: how can my website be effectively prevented from being infected by Trojans due to inexplicable Trojans? This issue needs to be analyzed based on specific situations.
1. If it is your own server
Because you only need to log on remotely, you can manage the entire server with relatively high permissions, so you can set all the website folders (except the database) to read-only.
If it is because of webshell, you must first find the Shell file implanted after the hacker intrusion, delete it, and then set it. However, webshells are generally obtained through injection or remote overflow. Therefore, website injection prevention and server patching are required.
Ii. Purchased space for a virtual host
In this case, you have few operations, so you only need to log on to the management system and set them.
Currently, general systems have such functions. You can find it. Set the relevant file to read-only! Or set directory permissions. Setting it to read-only is one of the best ways to prevent intrusion.
Iii. Procedures
Check your program. The method is to sort files by time in ftp to check whether your files have been modified by others. In addition, try to filter out sensitive characters.
4. Once a trojan occurs, you need to find it quickly. Generally, the trojan appears in the form of a file or in the form of a file in your upload image directory and file directory. Find these two places carefully.
5. Contact the space service provider as soon as possible and ask them to scan your website to avoid the existence of all suspicious files.