In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-02 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/02 Report--
How does the virtual host query whether the Trojan horse is hung? In view of this problem, this article introduces the corresponding analysis and answers in detail, hoping to help more partners who want to solve this problem to find a more simple and feasible way.
1. Check whether the inclusion of the website is normal. The method is: site:www. Do not add http in front of your domain .com to see if there are any private servers and other illegal ones. If so, your website has been hung up.
two。 The website can't be opened. Most likely it was a ddos attack, or the home page was removed. If it is ddos, you can enable the firewall, and if the home page is removed, you can restore it with backup.
3. Open a navigation or URL and find a jump to another site or page, indicating that your site has been made a js jump and hung up.
4. Website background can not enter, or there is no executive authority, indicating that your background has been tampered with, you can use ftp to look at the relevant files, change the background password.
5. Right-click to view the source code of the web page. If there are some messy links, the site is blacklinked.
Preventive measures of hanging horses on virtual host
1. It is recommended that users upload and maintain web pages through ftp, and try not to install asp upload programs. Download the asp program to the regular website, after downloading, modify its database name and storage path, and the database file name should also have a certain degree of complexity.
2. Check the security of the website regularly. Specifically, you can use some tools on the Internet to keep the space program of the website up-to-date.
3. The user name and password of the asp program administrator should be complex, not too simple, and should be changed regularly. Calls to the asp upload program must be authenticated and only trusted people are allowed to use the upload program.
4. Do not add the link to the login page of the background management program on the web page. Once you find that it has been invaded, delete all files unless you can identify all the Trojan files.
5. In order to prevent unknown vulnerabilities in the program, you can delete the login page of the background management program after maintenance, and upload it through ftp next time. Backup important files such as databases from time to time. Daily maintenance and pay attention to whether there are asp files of unknown origin in the space.
This is the answer to the question about how to query whether the Trojan horse has been hung on the virtual host. I hope the above content can be of some help to you. If you still have a lot of doubts to be solved, you can follow the industry information channel to learn more about it.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.