Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall
With the rapid development of the Internet, more and more people look at the webmaster this industry, countless people are joined to this industry, for those who do not learn programming, choose Open Source program to do the best, so open source program more and more popular and chasing stick, because the operation is extremely easy to grasp, the function of everything, These open source programs and are all the form of the company or team to act, especially dedecms,discua,wordpress these programs with a lot of people to occupy the site, the exact number of the author can not be counted.
Since the choice of these open source programs, that the replay in the first place is the security of the site, in the previous talk about "why Baidu repeated keyword monopoly situation?" is almost all Discua Forum series site was hanging horse. So we use open source program to build a station or use open source program to do two times to develop the program, should pay attention to the site's awareness of prevention.
Anti-human heart can not be no, fat based on the current site is black status quo, summed up open source program to do station 8 security work:
1, regular data backup, this is the most important, what can happen, and these data are our webmaster's baby, can't afford to hurt. Once the site is hacked or made an error, it can be quickly restored to the security state with a backup to avoid greater loss.
2, the administrator password attention combination, do not use the open source program's initial password and the default administrator username, improve the management background password intensity, uses the letter, the numeral as well as the special symbol various combination password.
3, timely download the official patches, repair security vulnerabilities. Focusing more on the official dynamics of open source programs, a person's power is limited.
4, change the Open source program key folders and files of the default file name, catch chickens often use the program automatically scan some specific folders and files to determine which open source program
5, check the Web site program whether there is a SQL injection vulnerability, this SQL injection is too easy to master, many sites provide such tools download and video tutorials, the author also scanned the site of others.
6, develop a regular check server log habits, check whether there are suspicious for non-foreground pages of access, or a particular page is often a large number of IP access.
7, often check the website file whether there are abnormal changes or increase.
8, we often use the upload tool to use the regular station download the program, and in the server background to shut down or to limit the unnecessary upload function.
This article starts A5 and Fat SEO blog www.pangziseo.com/website/44.html, reprint retains this link.