Web protection from a hacker's perspective

Source: Internet
Author: User

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

One, look for a good space service provider

Chinese hacker Alliance has been invaded for a long time, I also happened to see. As one of the three major hackers, the Chinese Black Alliance has strong technical support, and the website is almost inviolable. What was it then? side Note! Maybe your site is full static HTML, and there's no building, but it's still invaded. This is the use of the side note. In particular, users of virtual space, using the Ming boy or Ah D will find and your site with the same server other sites, and then take advantage of other sites vulnerabilities easy intrusion Server, and then find your site ... Of course, good quality server can be a side note, my website server on the side note.

Second, timely backup data

If you want to make the site bigger, if your site's data is important, if you don't want to donate money to the data recovery company to do what might be useless behavior. Please back up your data in time. There is always a group of hackers on the internet to scold the "hacker", will be crazy to delete data and so on. A timely backup can also respond to unexpected events, minimizing losses.

Third, modify the database and login address

Mainly used for ASP+ACC website. One of the simplest intrusion methods for ASP+ACC sites is Bauku. Bauku is the download database. In particular, some popular professional cms (such as New Yun), if not modified, it will be very easy to Bauku intrusion. Modify the database, but also to modify the conn.asp, the file is not necessarily this, but the function is the same, is linked to the database, to change to the new address of the database, otherwise the Web site can not link to the database to use. It is recommended that you add "#" to the name of the database, which effectively prevents downloading.

Also modify is the background landing address, and remember it. In the batch invasion, when the site can not be swept out of the background landing address, it will stop the intrusion, because even the user name and password, landing can not be no way. Because of the mass invasion, there is no time to guess the landing address. That's why the chances of a ASP+ACC invasion are much greater than the discuz! forum (php+mysql).

Iv. Modification of Copyright

The suggestion is to make a decision after reading the official explanation. Or you can change it after you buy the copyright. After copyright modification, it is recommended to change the template. Although the copyright is insignificant, it has an important role in the hacker invasion. When the intrusion is in trouble, usually look at the site copyright, and then download the source code, looking for the vulnerabilities can be exploited, more convenient intrusion. After modifying the copyright, most hackers still know your website's system. This is, you modify the template (preferably your own design), people look at your site to think that you have written. However, there are still advanced hackers, with experience and the operating mechanism of your site, even a folder or a picture of the default location to determine your site's system (such as: View a default image address, and then search, find a site with the same address picture, through their site traces easy to determine your site's system). But there are not many advanced hackers, the chance to invade your site is very small.

Finally, to remind the vast number of webmaster, the site was hacked, to actively respond, catches, your site was the hacker stared at, indicating that your site's influence gradually picked up, and should not give up.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.