Some views on improving steady operation of new station

Source: Internet
Author: User

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

Compared to the beginning of the site, the idea is very simple, have a good dream, consider all aspects are not very comprehensive. I do for Gu net (Taobao selling women promotion www.egouo.net) Webmaster, just started to do the site when the idea is so simple, think everything is so beautiful, can quickly through the ancient Amoy net to earn Taobao customers the first bucket of gold.

In order to launch as soon as possible Amoy popular women to promote the site, on the network to download a website source code, and not from its official online download. With some simple changes of my own, my first website was officially online. But, everything is so bad, a no flow, two did not earn Taobao commission, three has been black two times. Take the 3rd let me enough bitter brain, finally add up the data are all destroyed. Why the site is always attacked, the old hackers? And so on, I need to think about and solve.

The first time was black also did not think more, thought is I do several pages of the vulnerability (did not do SQL injection prevention), modified those pages and then began to re-enter the data. This morning, the opening of the Web page, 360 security guards began desperately error, a check and was black, this time fortunately, did not lose much, because of the previous lesson, not regularly to the data back up. But why is black, this time will be a good study, but also consulted the space service provider! First of all, I will share the analysis, said the wrong, please understand

1, the site to do a good job of SQL injection prevention, whether it is their own code, or online, to audit, download down there may be a loophole

2, the network download the source, preferably on its official website to download, other downloads may have been modified, so it is easy to be used by people. I now use do not rule out this possibility, before using, have the ability of the best to audit their code, see if there is a "back door"

3, it is best to change the table name in the database, of course, this also needs to modify the source code, in order to reduce the workload can be used to modify the source code batch. Since it's open source, anyone can download it, including hackers, who can analyze the source code and the database to attack it.

4, decided to use the Web site before the source code, it is best to study it, select those with less loopholes in the source code, and timely repair loopholes. Today, I searched the version I used, and found that there are many loopholes ah.

5, to Do data backup work, just in case!

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.