Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall
One, look for a good space service provider
Chinese hacker Alliance has been invaded for a long time, I also happened to see. As one of the three major hackers, the Chinese Black Alliance has strong technical support, and the website is almost inviolable. What was it then? side Note! Maybe your site is full static HTML, and there's no building, but it's still invaded. This is the use of the side note. In particular, users of virtual space, using the Ming boy or Ah D will find and your site with the same server other sites, and then take advantage of other sites vulnerabilities easy intrusion Server, and then find your site ... Of course, good quality server can be a side note, my website server on the side note.
Second, timely backup data
If you want to make the site bigger, if your site's data is important, if you don't want to donate money to the data recovery company to do what might be useless behavior. Please back up your data in time. There is always a group of hackers on the internet to scold the "hacker", will be crazy to delete data and so on. A timely backup can also respond to unexpected events, minimizing losses.
Third, modify the database and login address
Mainly used for ASP+ACC website. One of the simplest intrusion methods for ASP+ACC sites is Bauku. Bauku is the download database. In particular, some popular professional cms (such as New Yun), if not modified, it will be very easy to Bauku intrusion. Modify the database, but also to modify the conn.asp, the file is not necessarily this, but the function is the same, is linked to the database, to change to the new address of the database, otherwise the Web site can not link to the database to use. It is recommended that you add "#" to the name of the database, which effectively prevents downloading.
Also modify is the background landing address, and remember it. In the batch invasion, when the site can not be swept out of the background landing address, it will stop the intrusion, because even the user name and password, landing can not be no way. Because of the mass invasion, there is no time to guess the landing address. That's why the chances of a ASP+ACC invasion are much greater than the discuz! forum (php+mysql).
Iv. Modification of Copyright
The suggestion is to make a decision after reading the official explanation. Or you can change it after you buy the copyright. After copyright modification, it is recommended to change the template. Although the copyright is insignificant, it has an important role in the hacker invasion. When the intrusion is in trouble, usually look at the site copyright, and then download the source code, looking for the vulnerabilities can be exploited, more convenient intrusion. After modifying the copyright, most hackers still know your website's system. This is, you modify the template (preferably your own design), people look at your site to think that you have written. However, there are still advanced hackers, with experience and the operating mechanism of your site, even a folder or a picture of the default location to determine your site's system (such as: View a default image address, and then search, find a site with the same address picture, through their site traces easy to determine your site's system). But there are not many advanced hackers, the chance to invade your site is very small.
Finally, to remind the vast number of webmaster, the site was hacked, to actively respond, catches, your site was the hacker stared at, indicating that your site's influence gradually picked up, and should not give up.