The successful way of Internet Entrepreneurship (v.): the processing method after the website is hacked

Source: Internet
Author: User

Intermediary transaction SEO diagnosis Taobao guest Cloud host technology Hall

After the website is built, maintenance and management become the work that needs to be carried on continuously. In this chapter, the site will be optimized for internal links, efficient maintenance, PR upgrade way to introduce.

Optimize the internal link of the website

Two, the website effective maintenance three general knowledge

Third, improve the site PageRank have a coup

Iv. Site Exchange links also beware of counterfeit

V. Objectionable content of the website against Vulgar Prohibition

Vi. simple configuration to make the Web server impregnable

Seven, to understand the "spider" to improve the site included

Eight, cleverly speed up the display of Web pages

Nine, improve the domain name PageRank tips

Ten, avoid messy online management of web site files

XI. website fault real-time monitoring automatic reminder

12, for the site to add a simple search function

13, the Web site to prevent the security of small Kam Bag

14, visitor inquiries and security measures

The right to set up Web sites to refuse hacking

16, refused to "be black" safety prevention

The above details can go to "Internet entrepreneurship Success (five): Web site to prevent the security of small Kam bag" read.

17, after the site was hacked to deal with the method

If the site has been found to have unusual conditions, such as the page was modified, the site was added malicious code or virus files, management account can not log in always reminder password error, it is likely that the site has been invaded. At this point, it is necessary to deal with the relevant process as soon as possible to prevent hackers to grow the Web page virus spread, affect the browser's computer security.

(1) Temporarily close the website

The site was hacked, the most common situation is to be implanted Trojan program, in order to ensure the safety of visitors, must first shut down the site, pending processing and then open. When you turn off, you can temporarily turn the domain name to another address, such as setting up a website post, or placing a notification page.

(2) Using Backup recovery

If a Web site file is corrupted or deleted by hackers, if the site data backup, you can directly restore the use of backup files, in case the backup is not backed up and the data is very important, we recommend that no action, immediately please the company dedicated to data recovery attempt to recover data on the server hard disk.

Because some virtual host service providers regularly back up the data in the server, if you are using a virtual host space, you can also contact a space provider to obtain a data backup.

(3) Patch Check Holes

When the bug is released, the program will release the program's patch file, just to the official website of the program to download the corresponding file, according to the instructions uploaded to the site space coverage of the original file can be. If the relevant patches are not present at the moment, you can temporarily disable or remove some feature files.

Then we can look at the Web site's access log, to find access to the IP address records, according to the query to the IP address, again see the hacker also visited which pages, check these pages have other vulnerabilities.

(4) Trojan Horse program detection

Webmaster can be based on the page file modification time to determine whether the Trojan is implanted, the method is to see all the changes in the file change date, because the Trojan modified these pages, so they modify the date is very close. Then query the newly established ASP, ASPX, ASA file for this date and isolate or delete the exception file. The program will automatically detect the files in the site and the security report will be displayed when the detection is complete.

can also use a special web Trojan detection tools to check, need to pay attention to some Trojan detection software is more stringent, some component files and background management procedures will be included in the dangerous documents, in use need to be carefully identified.

(5) Batch Repair Web page

The general hacker invades the website all is in the webpage to add the code to carry on the Trojan planting, so that users browse the Web site automatically open and download Trojan program, some Trojan virus will automatically in all the Web page file after adding a line of code: If a lot of web site files, manual removal is simply impossible. At this time we can use the Web page batch modified software for malicious code to delete the bulk.

First find the site in the Trojan file code, then download and unzip the software, open the software main program in the "Find what" column to enter the detected malicious code, and then select the Web Site Files folder, and then click the "Start Replace" button, the software will automatically complete the repair operation of the Web page. When you confirm that there is no malicious code, finally upload all files to the Web site space.

Figure 31 Text Batch replacement software

In fact, as long as the usual precautions, at the same time, if the site is black, take the right approach, can minimize the loss of their own site.

18, let the website lossless transition operation method

When an existing Web site encounters a data capacity bottleneck, you need to replace the Web site program, such as an open source CMS that is easier to use; legacy ASP databases cannot support large-capacity data and need to be converted to SQL. Replacement data loss and user experience, and so on, especially for search engines, the changes in the site structure will be likely to cause greater fluctuations in the rankings. How to transfer the site data and not damage to the site? Here is the introduction of site transfer, content page transition skills, I hope you can analogy to deal with their own site transfer problems encountered.

Tips:

Not only can be used to upgrade the site after the situation, but also for the transfer of the site after a small number of data loss, as well as domain name replacement and other circumstances.

1. Dynamic website retention data is the key

Now most sites are using the site to create and manage the website data, so that the original data is relatively simple to save, the general CMS system has the function of data import, then you can use this function of the original site data conversion to save. If the ASP database into PHP, you can refer to the previous mentioned access conversion MySQL conversion, and then in the background of the Web site to import data.

2. Website Data Lossless conversion more important

Although the conversion data is relatively simple, it is extremely troublesome to make a smooth transition. If you are only transferring previous site data, do not process the resulting directory changes and file name changes. may be detrimental to the site visitors experience the consequences, if visitors to the site through the search engine, but get a "this page can not be displayed" page, if it is you will do how to feel? More so that the webmaster depressed, there is no more than the search engine on the site's friendliness greatly discounted. Here we will enumerate the problems that may be encountered and explain the solution in detail.

(1) Bad user experience? set 404 Page Tips

Web site program changes will inevitably lead to Web page file address changes, so that visitors from the search engine will not find the required content, there will be no access to the prompts. Therefore, before the transfer should be prepared to deal with, the best way is to continue to save the previously generated HTML Web page files.

Of course, we can also use a different way to guide the viewer, or if the Web page is dynamic format can not be directly saved, you will be able to use the 404 Custom page to guide visitors. 404 is the default error code for the Web server, which displays 404 error prompts in the browser, such as when the Web page that is visited does not exist or is deleted and moved. Its default hint interface is very simple, we can modify the page for the flow of redemption, such as adding descriptive text, or set up the site's navigation and provide site search function.

Figure 32 Virtual Host custom 404 error Tip

At present, almost all of the virtual hosts provide a custom 404 error page function, just make a hint of the HTML Web page file, and then into the host management background to set it. If it is a server, you can modify it directly in IIS by opening the Custom Errors tab in the Web site properties and then finding the 404 error message for editing.

Figure 33 Setting 404 Tips in the server

(2) Search engine down right? 301 Redirect Response

Upgrading a Web site can also cause changes to the site's directory or page location. This site has been indexed by the search engine data will no longer exist, if the search for a large number of Web pages disappear at the same time, will be the site in search of the weight impact, here can be used 301 redirect function to make changes to the site.

For some changes in the domain name, such as the www. Domain name, Com/bbs replacement for BBS. Domain name. com, also can use 301 redirect function, it represents a permanent transfer of web site files. 301 redirects are the best solution for Web pages to change their address without compromising search engine friendliness.

The IIS server Set 301 redirection by selecting the Redirect to URL feature in the Site properties and then setting the redirected URL address, and then checking the resource's permanent redirect check box.

Figure 34 Setting 301 redirection in the server

If the server supports the. htaccess feature for Apache or virtual hosts, you can simply set the file to a file or directory 301 redirect by simply writing the following code to the. htaccess file.

Redirect permanent/http://the address to which the contents of the directory are redirected/;
REDIRECT permanent/test.html http://test.html content redirected to the address/;

For a Dynamic Web page file, you can add the following code to the Web page file to set it up.

ASP Web page Files

<%@ Language=vbscript%>
<% response.status= "Moved Permanently" Response.AddHeader "Location", "http://redirect address" >

PHP Web page file

? Header ("http/1.1 moved Permanently");
Header ("location:http://redirect Address"); >

Through the above settings, whether the Web site replacement program or modify the directory, can be a lossless transition.

Please pay attention to the other paragraphs in chapter Fifth:

19. Database backup and management of website

RELATED links:

The successful way of Internet Entrepreneurship (IV.): Improve the function to make the website more easy to use

"Internet Entrepreneurship success: Web site planning, construction, promotion of profitable combat strategy" is a comprehensive explanation of the whole process of website construction of a book, is also the author of five years experience in the establishment of a summary of the station.

This book revolves around the whole process of website construction, from the beginning of the site planning, one by one explained the site creation, site content management, website maintenance, network marketing programs, website SEO, website profitability and other practical operations, and in the form of examples for you to introduce the success of the network business case and website operation of the misunderstanding, So that we can learn the most direct site experience.

A5 Webmaster Network will be serialized this book, if you want to first read, you can go to the Network of Excellence Online bookstore Purchase, the book in Xinhua bookstore throughout the country also has sales.

Author: Tao Qiufung (endto) publishing house: Computer newspaper Electronic audio-visual publishing house.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.