Tips to build a friend--"website building Safety is very important"

Source: Internet
Author: User

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

Hackers, a familiar word, do site people should have contact. Hackers on the site to attack a lot of tricks, the most common is "traffic attack", I believe that many people have encountered. Experience to know the loss of serious, Web server was attacked, system paralysis, resulting in two days can not access. Before being attacked, I only know the fur of the hacker. A lesson for the site was invaded to do in-depth research, and share with you.

First of all, introduce the hacker attack. There are many versions of the definition of the word hacker, all of which involve difficulty programming techniques. And hacker attacks are different, quite with the often said Hacker. These people focus on deliberately destroying other people's computers and telephone systems, causing cyber intrusion or damage to others. Called this behavior a hacker attack.

Hacker attacks in a way called traffic attacks, mainly for network bandwidth to attack, that is, the use of a large number of false attack packets submerged legitimate network packet, resulting in network congestion, information can not reach the host. The attackers were not aiming for sabotage, but for extortion. The attacker directly contacted the claim for money or had been attacking. I suddenly realized that I was being blackmailed, did not think the real life will happen in the Internet also appeared. High-tech makes me deep in the internet blackmail, laugh and cry.

The current Internet development by leaps and bounds, security guard is in the leeward, long can not perfect. High-tech has become a prop for bad intentions to harm others ' interests. Alipay has been stolen through the network password, resulting in loss of money examples have occurred. Even in the banner of online shop, the use of time difference or other methods to induce others to purchase payment after no tidings. It seems that the Internet security improvement is imminent.

As the saying goes, villains, outsmart, hacker attack can not avoid, we only take effective measures to prevent as far as possible. For example, when building a station as far as possible using High-performance network equipment. In routers, switches, hardware firewalls and other equipment selection as far as possible to choose well-known, good reputation products. And as much as possible with the network provider to reach an agreement, when there is a malicious attack, you can find them at the network point set traffic restrictions. Station friends to avoid the use of NAT, because NAT needs to return to the address, the conversion process will be the network packet checksum calculation, waste CPU time. Network bandwidth directly determines the ability to resist attacks, so be sure to ensure adequate. This time I only used 10M bandwidth, and later learned that this is difficult to combat synflood attacks, so we recommend at least 100M of shared bandwidth. Finally, it is worth noting that the site as far as possible to make static pages. Because the site into a static page, not only to improve the ability to attack, but also misleading hackers, at least to the intruder to enhance the great difficulty.

This attack, let me see Hacker's overbearing, they use high level, write program pilfer number, invade. Ask for money, it can be said to create a network kidnapping, demand to pay the ransom. can also be likened to the imposition of a Web site protection fees.

It seems that traffic attacks have to the network blackmail vicious development trend for the general webmaster, must pay attention to the existence of hackers, timely to prevent important data loss, resulting in serious losses.

QI Original, reprint please keep the source address http://www.ok.net.cn/blog/?post=852, thank you

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.