Old boy Education daily: March 7, 2017-enterprise interview question and answer: How does Linux server prevent the Trojan horse?

Source: Internet
Author: User


(i) Solution strategy

to the Enterprise interview is a number of competitors, so pay attention to the dimensions and height of the answer, we must direct the second to kill competitors, to fix high-paying offer.

(ii) Solution tactics

web Upload a directory of ways to upload a trojan to linux server, depending on the site from which the malicious person visited the website -->linux system -->http service Middleware services program code storage, layer multiplication protection.

(iii) Answer reference from user access point of view

  1. the developer code limits the upload file type, such as the inability to upload . PHP Program ( JS and back-end code control).

  2. Detection of uploaded content (including text and files) can be detected by program, Web Service layer (middleware layer), database and other levels of control.

  3. control permissions to upload directories and permissions for non-site directories ( Linux File directory Permissions +web Service layer Control).

  4. Access and execution control (Web Service layer + file System storage layer) After Trojan file is passed.

  5. important configuration files, commands, and WEB configuration and other files to do MD5 fingerprint and backup.

  6. install anti-virus software ClamAV and so on, regular monitoring of the Trojan horse.

  7. Configure the server firewall and intrusion detection services.

  8. Monitor server file changes, process changes, port changes, critical security logs, and timely alarms.

(iv) from the perspective of internal management: prevention of the right to be raised

  1. VPN Management Server or Web Management Server.

  2. SSH Monitor the intranet.

  3. Use of Springboard machine, Operation Audit.

  4. sudo centralized management, locking key files.

  5. The site directory, upload directory permissions belong to group control.

  6. Do system and site file backup fingerprint monitoring alarm.

  7. Dynamic password Authentication.

(e) Best users answer

650) this.width=650; "src=" Https://s2.51cto.com/wyfs02/M01/8F/41/wKioL1jY8bjTV_u4AAWI_XaFP1o011.png "title=" 1.png "alt=" Wkiol1jy8bjtv_u4aawi_xafp1o011.png "/>


This article is from the "Long Wing blog" blog, please be sure to keep this source http://youjiu.blog.51cto.com/3388056/1910889

Old boy Education daily: March 7, 2017-enterprise interview question and answer: How does Linux server prevent the Trojan horse?

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.