A common summary of attacks on websites

Source: Internet
Author: User
Tags backup bandwidth cloud cloud hosting data hosting it is it is necessary

Intermediary trading SEO diagnostic Taobao guest hosting technology hall

Websites are attacked, sometimes in the moment, especially some of the larger sites. In this case, it is necessary to know some common ways to attack the website. Understand some common means of attack, for us to maintain a good website, to prevent attacks on the site has a certain positive effect. Here, I summarize several common ways to attack the site and approach listed below, for reference.

The first: hanging horse or hanging black chain

This attack is not harmful, but it should not be overlooked. Once your website is linked to a Trojan horse and a black link, your website will be abnormal when it is opened, not because the content of the web page is modified, that is, the web page opens many windows, etc. , This site is due to be attacked. Once the number of search engines your site is linked to horse, it may give your site downright punishment, even K out.

Approach: In addition to doing a good job of website file backup and data backup, but also to strengthen server security measures, such as installing a firewall, setting security policies. And often check the site's export link to see if there is suspicious links. Of course, you can often use some testing tools such as Baidu webmaster platform security testing tools.

The second: network traffic

This kind of attack is the CC attack that we often hear. There are two kinds of traffic attacks like bandwidth attack and application attack. The traffic attacks we usually refer to usually refer to the bandwidth attack, which is one of the most common attacks on websites One of the means. This kind of attack means generally floods one or more routers, servers and firewalls with a large number of data packets, and the network bandwidth is almost exhausted, making your website inaccessible and being paralyzed and unable to be opened normally. The purpose of such attacks is mainly to crack down on competitor sites, or psychological disorders caused by the view retaliation for the behavior of others' websites. Do not be alarmed when encountering traffic attacks. In general, web site space service providers will monitor traffic anomalies in time and handle them in a timely manner, usually without lasting for about 5-30 minutes.

Approach: You need to choose a certain strength and size of the web space service providers, such as Baidu Accel. You can also buy site security value-added service products, so that it can withstand large-scale attacks. For the average site, we do not need to worry too much, just need to do a good job of daily site backup and basic server security work.

The third: destroy data attacks.

Such attacks may have a greater impact, and may even allow website owners to suffer greater losses, but also very mean a means, but also a network of illegal activities. In the past, some large-scale websites took place the user name and password stolen, probably because of this attack. The more common SQL injection belongs to this type of attack, specifically to destroy and attack the data server. Some will replace the website on the site, and some will modify the site's website, to the site a lot of trouble.

Approach: Regular backup of website data and website key programs, web pages should also be regularly backed up, it is best to be able to package to the local computer. At the same time do a good job of setting the permissions of the key files and folders. Site is best to use all static pages, because static pages are not easily hacked, for the database and the site remote desktop and ftp and background-related password to adopt a more complex password, do not use easily guess the password.

Well, the above is the author summed up some of the website was attacked means and approach. In short, to enhance the security of the web server, select a strong, safe, more perfect security measures is the root of the engine room, but also to do their own server security policies and firewall installation and setup, and do a good job of daily backup Only by raising the awareness of website safety can we ensure the website is protected from illegal attacks and ensure the normal operation of the website.

This article from Yunnan Pacific Science and Technology Information Project (http://www.ynynyn.com/), respect for the author's labor results, please indicate the source reproduced.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.