11 ways to secure your site

Source: Internet
Author: User

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

1. Custom 404 page and custom transfer ASP error messages

404 can let the hacker batch search your backstage some important files and check the webpage to have inject flaw. ASP error, you may send the unknown to the person you want the information.

2. Routine Maintenance

A. Regularly back up data.  It is best to back up every day, download the backup file should be deleted in time on the host backup file B. Periodically change the name of the database and administrator accounts. B. Use Web or FTP management to view the volume of all directories, the last modification time, and the number of files to check for exceptions to the file. And see if there are any unusual accounts.

3. Modify Background files

First step: Modify the name of the validation file in the background.

The second step: Modify the conn.asp, prevent illegal downloading, can also encrypt the database after modifying the conn.asp.

Step three: Modify the Acess database name, the more complex the better, you can change the directory of the data. 4. Restrict Login Background IP

This method is most effective, and each virtual host user should have a feature. Your IP is not fixed on the point of trouble every time to change it, safety first.

5. Carefully select the website program

Notice whether the Web site program itself has loopholes, good or bad you my heart should have a scale.

6. Cookie Protection

When landing, try not to visit other sites to prevent cookies from leaking. Remember to exit when the key exits are closing all browsers.

7. Create a robots to effectively prevent the use of search engines to steal information

8. Self Test

Now in the online hacker tools a basket, not to find some to test your site is OK.

9. Revise the account secret

Whether it's business or not, passwords are mostly admin. So the first thing you get from a Web site program is to change the ledger. Do not use the old habits you used before, a little special. Try to combine alphanumeric characters with symbols. In addition, the password preferably exceeds 15 digits.

10. Carefully upload the vulnerability

As far as I know, uploading vulnerabilities is often the simplest and most serious, allowing hackers or crackers to easily control your site. You can prohibit uploading or restricting the type of files uploaded. If you don't understand, you can find your website program provider.

11. Directory Permissions

Ask your administrator to set up some important directory permissions to prevent irregular access. Do not script permissions to the uploaded directory and do not give the upload directory a write right.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.