How the server administrator should deal with Web sites being linked to the Trojan

Source: Internet
Author: User

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

All the time. For Web server administrators. The biggest headache is the website has the loophole. By some so-called "hacker" invasion. Upload Webshell (Web trojan). Then modify the site source code. Put on a Trojan horse. or be heavily loaded with Windows. Serious will also be downloaded EXE executable file. Direct implantation of the Trojan. So that real users do not dare to browse the site.

For a Web server. Of course there are a lot of web sites. The website has no loopholes. Web server administrators do not know. Even on the server, a new IIS account is created for each site. This prevents cross directory intrusion.

Recently, a friend recommended a "sword child server Trojan Monitor", can be very good to avoid the site was invaded to hang horses. Let's take a look at the whole software screenshot.

  

On the left, first add the site directory address you want to monitor. Because this software supports subdirectories. So you can choose to compare the upper directory. such as our server put all the sites to D:\www\. So all the sites are in the WWW directory. Then we just have to add the D:\www\ directory. Then select the included subdirectory on the right so that all sites under www will be monitored and protected. Choose a good catalog, we have to choose " Discover Trojan features to send mail "and" Discover Trojan features renamed protection ", what these two mean.

1. Find Trojan features to send mail.

Just under the directory or subdirectory of the monitor. The hacker uploads the file or modifies the website source code to have the Trojan horse characteristic. The software sends an e-mail message to the specified mailbox. To tell you. Now your server of a website below the source code has been modified, at the same time the characteristics of the Trojan horse. You'll know for the first time.

2. Discover Trojan character name protection

Send the message above. So if I don't have time to get on the server immediately. Check this out. As long as found that the modified source code has Trojan characteristics. will be renamed as the XXX.txt suffix file. So even hackers in the source code to join the Trojan Horse. Because the source file has been renamed as a. txt suffix.

We click on the start to monitor it.

Now let's try the effect. Just discover the Trojan. First, a bubble tip pops up. Is it really good?

  

  

You see the effect of it. So the software will automatically help us deal with the files with Trojan features. Everyone places our server administrators.

The software's more versatile you can see for yourself. It's all in Chinese. If you still don't understand. You can go to http://baiduwk.ys168.com/to download a video voice tutorial to watch.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.