Webmaster should understand the server security knowledge-anti-black
Source: Internet
Author: User
Keywordsservers Web services deception through webmasters
In a Web server, there are usually a lot of files or programs that are not published or downloaded, most of which are classified by a company or government agency, or a programmer's program source code. It can be seen that the security of a server is very important.
Many Internet users may not understand the specific use of Web servers, in fact, users in the network browsing the Web site, send and receive e-mail, play online games, etc., are provided by the network server services. When a user browses to a website, first will enter a URL in the address bar (such as www.8lma.com), at this time, the browser will be to a http://www.aliyun.com/zixun/aggregation/13351.html "> The domain name server sends the request, and the domain name server will find the IP address of the domain name in the database, then transmit the request to the server corresponding to the IP, and tell the website server the location. When the website server receives the information, it will feedback the user's data to the user's browser, so that the user can browse the content that is being fed back. If the network server does not find a domain name in the database IP or can not find feedback, then the network server will send a directive to the browser, then the user's browser will find a corresponding error in the local display page (such as: the page can not be displayed). This is the most common role of Web servers.
Common means
Most of the time hackers use Web servers as their targets, and access to Web servers to achieve their goals. To effectively block, you need to first those hackers are using what means to enter the network server, know their attack methods, can effectively solve these security risks.
First of all, to introduce hackers commonly used means:
1. Network scanning-Extensive search on the Internet to identify weaknesses in specific computers or software.
2. Network Sniffer program-view packets over the Internet to capture passwords or all content. Monitor network data flow by installing a listener program to obtain the user name and password that the user types when connecting to the network system.
3. Denial of service-by repeatedly sending too many requests for information to a device on a Web site, which causes the device to fail to complete a network service project (such as an e-mail system or online feature), called a "denial of service" issue.
?? 4. Deceive users-fake e-mail addresses or Web page addresses, cheat passwords from users, credit card numbers, etc. Deception is the process by which a target system is tricked into believing that information is coming from or being sent to a purpose that it believes. Spoofing can occur on the IP layer and above (address resolution spoofing, IP Source address spoofing, email spoofing, etc.). When a host's IP address is assumed to be valid and is believed by the TCP and UDP service, an attacker's host can be disguised as a trusted host or client, using the source route of the IP address.
?? 5. Trojan Horse-A user-aware program that contains instructions that can take advantage of known weaknesses in some software.
?? 6. Back door-to prevent the original entry point is detected, leaving a few hidden paths to facilitate access again.
?? 7. Malicious applet-Micro program, modify the file on the hard disk, send false email or steal password.
?? 8. Competition Dialer-can automatically dial thousands of phone numbers to find the path into the modem connection. A logic bomb is an instruction in a computer program that triggers a malicious operation.
?? 9. Buffer overflow-sends too much data to the computer memory buffer to destroy the computer control system or gain control of the computer.
?? 10. Password deciphering-use the software to guess the password. It is usually done by monitoring the password packets on the communication channel to decipher the encryption form of the password.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.