Three steps to deal with a Web site being hacked

Source: Internet
Author: User
Keywords Hackers

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

At present the website of the Internet is always being monitored and attacked state, webmaster frequent to see the site log, there will always be RAR or PHP file requests, many are the purpose of the user to carry out the bulk of the exploration, once the site administrator for the server backup, then the RAR format files will be directly downloaded , this will cause a lot of damage to the site, if the unfortunate hacker attack and site domain name was successfully hijacked, how should we deal with it?

One: Robots shielding

Use robots to mask all searches, prevent search from crawling, or stop site content updates release only the home page, and all access is reported to 503 status. This is the author thinks that know that the site is hackers attack the most direct way, of course, this for the high weight of the site is not suitable, only for new sites or enterprise-class sites.

Two: Clean Trojan and Hacker program

A lot of times, Hacker Trojan program implanted into the picture, this is a very large amount of processing, in the Web server before processing all the files to enforce the highest authority restrictions, do not allow files to be copied and modified. The use of Trojan horse software to killing, but for high weight sites such as the first time can not deal with the hacker Trojan Horse, the proposal to use the standby server directly.

Third: Submit the hijacking address

Google and Baidu have submitted the address, the site will be hijacked the address submitted to them, to inform them of the site was attacked and domain name hijacked, so that the site's collection and ranking, of course, this and shielding search is the same step, just the order of the author straighten out. At this time may be a lot of webmaster search their site in search of the beginning of the danger of warning, this time no need to pipe him, as long as the processing of Trojans and submitted, this warning will automatically remove, generally after you clean up the Trojan horse after three days of open website.

Four: stability of additional external chain

The site was attacked by Trojans, the new webmaster attention, in order to prevent the impact of other sites, to determine their inability to solve the time period must inform the site friend chain objects. When the site was in the Trojan operation, keyword ranking will certainly be affected by a certain degree, at this time for Baidu must pay attention to the site outside the chain to maintain a stable increase, and the external chain to create the weight of the site is the higher the better.

The site was hacked, webmasters must not worry and trouble, as long as the good steps to deal with, the site's rankings and included will certainly return to avoid aimless and time planning to deal with.

This article originates from HTTP://WWW.KIDSNET.CN,A5, reprint please indicate the source, and retain the source integrity, thank you!

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.