Alibabacloud.com offers a wide variety of articles about how to prevent trojan malware, easily find your how to prevent trojan malware information here online.
an analysis by a security agency in China, such malicious viruses may cause nearly 4 million yuan of losses to Chinese mobile phone users every day. 4. Malicious promotion and spread of various types of software infected with such malicious viruses. You may find that your mobile phone has been installed with some applications or software for no reason. What's more, these software may be infected by malicious nature, not only threatening your mobile phone, but also by reading your email address
I don't know how to defend. How can I attack? Preventing problems before they happen may be the basic prerequisite for ensuring the effectiveness of any security means. Because of the diversity and complexity of malware, it is the most effective way to prevent malware. Practice has proved that the discovery and removal of mal
Office2016 How to set up a tutorial to prevent malware attack operations
The latest news is that Microsoft has finally introduced an important security feature for Office 2016 that can be used to keep away from macro malware attacks. For years, the "macro virus" has been a mishap in the Office suite. Despite the convenience of macro operations, there are still
. Bookcomments.add (bookcomment);Db. SaveChanges ();Viewbag.refreshcomments = true;}If CAPTCHA failed add error messageif (!captchasuccess){Modelstate.addmodelerror ("Captcha","Invalid CAPTCHA");}Viewbag.bookid = bookcomment. BookId;Return Partialview (bookcomment);}protected override void Dispose (bool disposing){Db. Dispose ();Base. Dispose (disposing);}}}(Translator: After I practice, I do not know whether this CAPTCHA background style can be customized, if possible, it is too cool!) )"MVC3"
ASP Trojan Horse
* To invade, it is important to upload the ASP wood to the target space immediately!* So how do intruders upload ASP Trojans?
since most of the Web site intrusion is done using ASP trojan, close-up of this article so that ordinary virtual host users can better understand and prevent ASP
In general today, ASP Trojan often through the following four points to operate the server, so we just have to set all around to be able to from a
Before the use of IIS server webmaster a lot, especially for the ASP site, to prevent the ASP Trojan has become the site security of the most critical content.
In general today, ASP
iisexecutable privilege, the upload .jpg image can also execute an ASP Trojan. Haha
The upload format is xxx.asp;_200.jpg.
Upload is uploaded in the format of .jpg, but there is. asp in the middle. This can also execute scripts, which should also be a bug in IIS.
Solution:
1. The directory that can be uploaded does not allow IIS to execute scripts.
2. Use other software with file protection to prevent
First determine the file size:
If File.filesize
After uploading the file to the server, determine the dangerous action characters in the user file:
Set MyFile = Server. CreateObject ("Scripting.FileSystemObject")
Set MyText = Myfile.opentextfile (FilePath, 1) ' reads text file
Stextall = LCase (mytext.readall)
mytext.close
Set MyFile = Nothing
sstr= ". getfolder|. createfolder|. deletefolder|. createdirectory|. deletedirectory|. SaveAs
|wscript.shell|script.encode|server.|.
Although it can minimize the losses caused by Trojans and backdoors, the best way is to prevent them from happening.
1. Basic backdoor defense skills
First, you must disable unnecessary ports on the local machine or only allow access from specified ports. Second, you must use the Trojan-killing software to effectively prevent Trojans and backdoors. Third, you mus
Trojan is the use of IE to spread the vulnerability, we take the ice Fox prodigal son of the Web Trojan (with "Ice Fox prodigal son Trojan Horse" made by the Web Trojan), the Web page can bypass the security settings of IE, when users connect to the page, It can download a Trojan
Since most of the Web site intrusion is done using ASP trojan, close-up of this article so that ordinary virtual host users can better understand and prevent ASP Trojan Horse. Only space and virtual host users to do a good job of preventive measures can effectively prevent ASP Troj
A Trojan is a very special program, which is different from viruses and malicious code. Trojan horses is highly concealed and you do not know that they are running. However, they produce no less harm than viruses. Once a trojan is installed on your machine, someone on the internet can use it to obtain your password and information. Even some advanced hackers can
Teach everyone to prevent Trojan, only for the Web Trojan, effective rate of more than 90%, you can prevent more than 90% Trojans on your machine is executed, and even anti-virus software can not find the Trojan could be prohibited to execute. Let's talk about the principle
SEO How to prevent the site is hung Trojan?!
Since doing the station, the site has been hung two times Trojan, not only to make their own work flow increased a lot, but also to the Web site traffic growth has brought bottlenecks, the economy has a lot of losses! Fortunately, it has added a lot of awareness of the safety of the website and
According to rising global anti-virus monitoring network, there are two viruses worth noting today: "Trojan. PSW. win32.XYOnline. jg) "and" QQ pass variant YRH (Trojan. PSW. win32.QQPass. yrh) "virus. The JG virus of xiyou Trojan is used to steal the account of the Online game "Fantasy xiyou Online", which may cause a variety of Chinese antivirus software to fail
Prevent ASPX Trojan's IIS spy pervert featureIf the server supports the ASPX language, and has been uploaded aspx Trojan, using the Trojan inside the IIS SPY function, you can read all the user's password in IIS, including using IIS to do FTP, but also can read all the user's FTP user name and password, it is very abnormal. Here's how to
cacls c:winntsystem32cmd.exe/e/d guests cmd
cacls c:winntsystem32shell32.dll/e/d guests shell.application
cacls c:winntsystem32scrrun.dll/e/d guests FSO
Removing Wcript.shell components
How to prevent ASP Trojans from running on the server
Just a simple look, personal feeling is good, share with you, but the site's security configuration problems, so like some of the formation can be directly restored.
If your server is being plagued by an ASP
.
Controls permissions to upload directories and permissions for non-site directories (Linux file directory permissions +web service layer control).
Access and execution control (Web service layer + file system storage layer) after Trojan file.
MD5 fingerprints and backups of files such as important profiles, commands, and web configurations.
Install anti-virus software CLAMAV, etc., regular monitoring
The. NET Trojan is very strong at present,
This Trojan is a. NET program production, if your server support. NET that must pay attention to,, into the Trojan has a function called: IIS Spy
, you can see the physical path of all sites after you click. A lot of people have been raised before, but no one has ever solved the answer.
Defense methods:
"%systemroot%
ASP Trojan Attack principle is generally through file upload loophole, send Trojan file to the server, and then run can read all the information in your system. The General ASP Trojan file is the use of FSO components to operate, there is no FSO components. For example, how to prevent ASP
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.