Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall
At present the website of the Internet is always being monitored and attacked state, webmaster frequent to see the site log, there will always be RAR or PHP file requests, many are the purpose of the user to carry out the bulk of the exploration, once the site administrator for the server backup, then the RAR format files will be directly downloaded , this will cause a lot of damage to the site, if the unfortunate hacker attack and site domain name was successfully hijacked, how should we deal with it?
One: Robots shielding
Use robots to mask all searches, prevent search from crawling, or stop site content updates release only the home page, and all access is reported to 503 status. This is the author thinks that know that the site is hackers attack the most direct way, of course, this for the high weight of the site is not suitable, only for new sites or enterprise-class sites.
Two: Clean Trojan and Hacker program
A lot of times, Hacker Trojan program implanted into the picture, this is a very large amount of processing, in the Web server before processing all the files to enforce the highest authority restrictions, do not allow files to be copied and modified. The use of Trojan horse software to killing, but for high weight sites such as the first time can not deal with the hacker Trojan Horse, the proposal to use the standby server directly.
Third: Submit the hijacking address
Google and Baidu have submitted the address, the site will be hijacked the address submitted to them, to inform them of the site was attacked and domain name hijacked, so that the site's collection and ranking, of course, this and shielding search is the same step, just the order of the author straighten out. At this time may be a lot of webmaster search their site in search of the beginning of the danger of warning, this time no need to pipe him, as long as the processing of Trojans and submitted, this warning will automatically remove, generally after you clean up the Trojan horse after three days of open website.
Four: stability of additional external chain
The site was attacked by Trojans, the new webmaster attention, in order to prevent the impact of other sites, to determine their inability to solve the time period must inform the site friend chain objects. When the site was in the Trojan operation, keyword ranking will certainly be affected by a certain degree, at this time for Baidu must pay attention to the site outside the chain to maintain a stable increase, and the external chain to create the weight of the site is the higher the better.
The site was hacked, webmasters must not worry and trouble, as long as the good steps to deal with, the site's rankings and included will certainly return to avoid aimless and time planning to deal with.
This article originates from HTTP://WWW.KIDSNET.CN,A5, reprint please indicate the source, and retain the source integrity, thank you!