Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall
All the time. For Web server administrators. The biggest headache is the website has the loophole. By some so-called "hacker" invasion. Upload Webshell (Web trojan). Then modify the site source code. Put on a Trojan horse. or be heavily loaded with Windows. Serious will also be downloaded EXE executable file. Direct implantation of the Trojan. So that real users do not dare to browse the site.
For a Web server. Of course there are a lot of web sites. The website has no loopholes. Web server administrators do not know. Even on the server, a new IIS account is created for each site. This prevents cross directory intrusion.
Recently, a friend recommended a "sword child server Trojan Monitor", can be very good to avoid the site was invaded to hang horses. Let's take a look at the whole software screenshot.
On the left, first add the site directory address you want to monitor. Because this software supports subdirectories. So you can choose to compare the upper directory. such as our server put all the sites to D:\www\. So all the sites are in the WWW directory. Then we just have to add the D:\www\ directory. Then select the included subdirectory on the right so that all sites under www will be monitored and protected. Choose a good catalog, we have to choose " Discover Trojan features to send mail "and" Discover Trojan features renamed protection ", what these two mean.
1. Find Trojan features to send mail.
Just under the directory or subdirectory of the monitor. The hacker uploads the file or modifies the website source code to have the Trojan horse characteristic. The software sends an e-mail message to the specified mailbox. To tell you. Now your server of a website below the source code has been modified, at the same time the characteristics of the Trojan horse. You'll know for the first time.
2. Discover Trojan character name protection
Send the message above. So if I don't have time to get on the server immediately. Check this out. As long as found that the modified source code has Trojan characteristics. will be renamed as the XXX.txt suffix file. So even hackers in the source code to join the Trojan Horse. Because the source file has been renamed as a. txt suffix.
We click on the start to monitor it.
Now let's try the effect. Just discover the Trojan. First, a bubble tip pops up. Is it really good?
You see the effect of it. So the software will automatically help us deal with the files with Trojan features. Everyone places our server administrators.
The software's more versatile you can see for yourself. It's all in Chinese. If you still don't understand. You can go to http://baiduwk.ys168.com/to download a video voice tutorial to watch.