Interpreting Web site intrusion methods and how to deal with Web site security issues

Source: Internet
Author: User
Keywords Jie Yi Tong

Intermediary transaction SEO diagnosis Taobao guest Cloud host technology Hall

For most stationmaster, the website is invaded is the topic that often can see, but if happen to own body can produce strong indignation feeling, this is the difference between the bystander and the participant. During the first year of running the site, and did not encounter the problem of invasion, but in the last year, encountered 3 times, every time I hurt the brain, repeated thinking, exactly where there is a problem, the Internet is also a matter of opinions, some extreme netizens even upload static web pages. So share the site with three different types of intrusion experience it!

Type one: templates are all modified to add a large number of black chain code.

I have a habit, is to open the computer after the first view of the site visits, and then look at the site included, by the way to see the number of friends chain. That night around 12 o'clock, just when I want to shut down the rest of the time, and check the friend chain, suddenly found many unfamiliar URLs, the page does not show, view code found, CSS settings hidden. Immediately sleepy Italy, the first is suspected is not the space business, space business, 24 hours on duty engineer, telephone consultation only know is invaded, suggest I upgrade background program.

The first time was invaded, quite nervous, worried about Baidu included problems, as well as keyword ranking problem. Although the previous site has a backup, but in the background to change some of the template code, resulting in a recovery, found that a lot of templates are modified before, so after 2 hours of tossing, finally recovered, but forgot to change the site title, the second genius found, and changed again. This is a big blow to me, although Baidu included no reduction, but the site ranked down.

Because the Web site space can not be updated online dedecms, so lazy to manually update, which is precisely the main reason for the invasion. So in time to update the background program.

Type II: Homepage template was modified, added 4 keywords to a single URL, hidden links, and added Super admin.

  

Although had the first experience, this time should not panic, but this fellow incredibly added super administrator, too arrogant. View the Friends of the Web site, most are also added hidden links. May be through this channel, notice my site, of course, may also be through my website. About adding Super admin, I think may be the member registers the function the flaw, through the hand-written SQL statement submits the command, obtains the Administrator account password. The latest version has fixed the vulnerability, but if you do not register, then disable this function, such as: System-System Basic parameters-Membership settings are open: No.

Type III: Homepage template was modified to add 3 keywords to a single URL, Ming link.

The third time was invaded, very helpless, but still want to strengthen self-test, must be the background of the loophole, this will all the password update to strengthen, including the space password, database password, background login password, all using a different password, and the use of Digital + letter + punctuation format. In addition, change the background default landing path, the original is Jieyitongtop.com/dede path, now the name of the folder complications, and then delete the install folder. This time the problem should be my ftp password simple cause, the Internet has an FTP password scanning software, you can directly scan out the weak password, directly through the administrator landing modify the site. So improve password security.

In order to avoid the site was invaded, I summed up, but also through these tips, can get you enough attention, can also help you improve your site.

  

1, with the host site too much, there is a side-note risk.

My site on the existence of such a problem, the original to cheap, after the purchase of the same IP to find a lot of sites, these sites are only in the server under different folders, side note the risk is relatively large, even if their own program password is no problem, may also be due to other sites of the Trojan infection Conditional words, or choose more professional space provider bar, security is guaranteed!

2, DEDECMS program, the function is not used, it is recommended to delete or disable.

This is the focus of the intrusion, such as not delete the Install folder, or do not change the default background landing path, there is no need for membership registration, but also not disabled and so on. The background program is not tailored for your site, we need to further modify the perfect.

3, the site password in terms of length and complexity should be strengthened.

The security of the password, is to arouse our attention enough, and then the perfect procedure, in front of the password is also helpless, password settings are not good, everything is free to talk.

4, strengthen the computer security, do not use the password on the unsafe computer.

The password is set up, the protection is not good, also cannot play the role of security, the danger that the password leaks is devastating. Use their own computer, to timely upgrade anti-virus software, timed anti-virus detection.

5, every day must check friends chain, timely detection of black chain.

Webmaster tools can check the site's friends chain, convenient and efficient, the purpose of the site invasion, mostly to increase the black chain, through the view of the chain can be found in time unfamiliar links, timely processing.

In fact, many of the problems can be avoided, but because the general effect of the problem caused by frequent, so still need our early detection problems, strengthen self-examination. Security work is not a matter of time, we need timely upgrade update, but also to strengthen the awareness of prevention, do the preventive measures!

Original article, reprint please specify the Source: http://jieyitongtop.com/blog/index.php/archives/2481.htm

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.