Php Chinese network (www.php.cn) provides the most comprehensive basic tutorial on programming technology, introducing HTML, CSS, Javascript, Python, Java, Ruby, C, PHP, basic knowledge of MySQL and other programming languages. At the same time, this site also provides a large number of online instances, through which you can better learn programming... Reply content: Thank you!
The following two steps are the foundation of server security protection
- Use the sandbox/mandatory access control Solution to disable all unnecessary path access, file read/write, and process execution permissions of the apache process. In Linux, SELinux and AppArmor are used.
- Start the apache process with a minimum account. Use setcap to listen to port 1024 or lower for apache's execution File (httpd)
"He does not know the path from which the hacker uploads these files, nor is he planning to find program vulnerabilities .』
Is there only a way to "turn off the server" and add a firewall?
Disable all unnecessary ports
Tomcat access and password
Do not use ssh tools for various attacks. There may be Trojans, to Download PHP files securely from the official website, use url rewriting to restrict access to PHP files other than the whitelist (that is, hackers cannot execute php files even if they have uploaded php files ). I think it is feasible, but is there a better way? The program must have a place to upload files. check whether the code is vulnerable.