A few days ago, a friend said that his station consumes a lot of clouds, and then the log found that most of the access is cron.php. Then it is not the intranet IP access, nor has it been monitored. It is estimated that it has been maliciously accessed by others. However, it seems that the modification of the name is also somewhat unsafe, and the IP blacklist effect will not be very strong. Because IP can be changed at any time, I added a piece of code to solve this problem. Is to add a get to cron.php parameters, and then modify the cron in config.yaml, the problem of malicious access is resolved, the consumption in these days must be reduced. This example tells us that if you are using an open source program, when someone finds your open source program, you can look at the code and try to consume your cloud beans. Therefore, we have to eat a long and a wise, although the technical content is not so high, but it will still be much safer. After all, he doesn't know if your cloud beans are consumed, and he just tries to attack your program. . But I set the more cumbersome, because at the beginning, cron is output ok, now he does not have GET to pass data, but also returns ok, but the actual implementation is successful, the return is yes. Let's get to the point below, first add the following sentence to cron.php. If (empty($_GET['password']) |
|
$_GET['password'] != 'user@test') exit('ok'); //password and user@test can be modified arbitrarily. //The access method is the domain name/program name.php?password=user @test then modify the config.yaml file, add the simple cron.php followed by "program name.php?password=user@test” here" program name.php?password=user@test” not absolute . If you modified the password and user@test in the if area, then this also needs to be modified. As the example below. - description: Task url: cron.php?password=user@test schedule: */1 * * * *This article is from [System Home] www.xp85.com
CF9 new version of the sheep and sheep battle is about to strike, QQ browser is also the latest priv
. Microsoft uses to promote its products in the Asian market, so the following is the birth of Touko
Why is Youku video black? Many small partners have encountered this situation, Youku video suddenly
CF new character flying fox has been put on the road in the city, I believe that many small partners
How do you get photos to smog? Meitu Xiuxiu gives photos to smog tutorial
WiFi is not a "stealth killer" WiFi radiation impact measured
IE11 browser tips: Clear incompatible management add-ons
System Daquan teaches you how to get rid of Youku's 30-second ad
Adobe Acrobat XI 11.0.5 Chinese crack version of the graphic installation tutorial
IE11 browser how to view webpage error details
What should I do with the word table header? 1 minute to teach you to solve the orphan layout
Simply create a colorful interactive PPT
OTG installation and uninstallation should protect the USB flash drive according to the process.
Don't be afraid of changing bricks! Qi rabbit brush machine to save brick repair tutorial
How does Ali Wangwang send pictures to sellers? Send a detailed picture tutorial
Win7 always tips to scan and repair the U disk solution
How does the Win8.1 system close application notifications?
Win10 Build 10025 new browser function upgrade: video can play full screen
How to uninstall Linux system partition
How win8 responds to ARP attacks
Windows 7 environment directly installed low version of XP system
Upgrade Win8.1 system prompt 0x80004003 error how to do