Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall
With the rapid development of the Internet industry, a variety of web sites springing up, these sites to the vast number of Internet users living information and online learning provides a lot of convenience, but the forest is big what the birds have, some unscrupulous hackers for self-interest everywhere looking for loopholes in the site to hang a horse, Wanton theft of the user's various information and account password illegal profit, a large number of users to become their profit-making "victims." Those computers in the Trojan virus network users, their bank accounts and other information has been greatly threatened.
Unfortunately, one of my three-year-long website was also hanged. One morning when I opened the site to update the article, the page in the middle of a 360 screen pop-up prompted the box, the tip has blocked malicious Web pages, I entered my site in Baidu, found in Baidu search out the results behind all with a Web site was hanging horse tips (pictured),
Any person sees hangs the horse the webpage will immediately close, later who dares to enter my website Ah, quickly clear the horse! I use FTP to download the home page code to the local, at the bottom of the Web site to find a section of the Code of the horse, and then the code removed, upload code to space to go, after good, I use 360 network Shield test , the test results show that the home page is not a good report of the virus, I think this should be no problem! Who knows that by the evening, I opened the Web page and pop-up 360 of the poison tip box, showing the site was Hung horse, I quickly put this problem to the space business technician to reflect, tell them to check the server is not what loophole, They checked and told me that the server is no problem, the same server other sites are normal, only I this site was hung horse, should be the site has been exploited by hackers. I have always behaved as a standing, honest man, how hackers have been staring at my website? It seems that the hacker's morals are very corrupt.
I have done this site for more than three years, has not been hanging Ma Mai never checked the site has any loopholes, this time if the site does not find a loophole and plug the site will be Yongwuningri. I first changed the default address of the site background, and modified the administrator login username and password, and then modified the database username and password, and deliberately in the database user name added a few special symbols. Finally I log into the site space management background, to find the "Set up FSO Permissions" option, closed the Web site's FSO permissions, and then found the "Set Write permission" option, closed the site's home page file Write permission, the best I have the FTP password is also modified to more complex password.
After this, I use FTP to the site's home page back to the site to upload files to space, pass good after I use 360 net shield and Jinshan Net shield all test again, show webpage Normal, again did not appear the hint of poison, I keep observing for one weeks, this website never reported poison, finally solved this problem completely. After this incident, I have summed up the following experience:
1, the FTP password as far as possible to set a complex point, the password is best to contain uppercase and lowercase English letters and numbers as well as special characters (such as c7b64¥8f63ce687&), so that hackers with weak password scanning Tool will not scan your FTP username and password.
2, the site background do not use the default path and administrator account and password, now there are many on the network through the default path to guess the background account password tool, if you do not modify the default path and administrator account number and password, some people with bad intentions can easily guess to your website background account and password into your site backstage illegal operation, Also to your site security left a hidden danger, all must promptly modify the site background default path and administrator account and password.
3, change the site database name, if it is an Access database, the file extension is best not to use MDB, changed to ASP, file name can be more than a few special symbols.
4, the site's injection and cross-station vulnerabilities are often exploited by hackers loopholes. Check the site has not injected loopholes or cross-station loopholes, if you have to immediately hit the anti-injection or cross-stop patch, so that hackers no opportunity.
5, preventive, write some anti-hanging horse code, so that the frame code, such as Hanging horse invalid.
6, it is best to close the FSO permissions of the website.
7, set up a good site for each folder read and write permissions.
Here I would like to remind you webmaster, try not to download some of the free online programs, those programs are mostly left behind the backdoor, have the financial ability to purchase the commercial version of the program or their own development of a dedicated web site program. Special dubbing http://www.ggpy.org webmaster is willing to work with webmaster friends to explore the Web site security of the corresponding road.