If your server is being plagued by ASP Trojans, then I hope this article can help you solve the problem you are facing.
more popular ASP Trojan mainly related operations to the server through three techniques.
First, use the FileSystemObject component FileSystemObject can file
routine operations
can modify the registry, the component was renamed, to prevent the harm of such Trojans.
HKEY_CLASSES_ROOT \\ Scripting.FileSystemObject \\
changed its name to other names, such as: their future instead FileSystemObject_ChangeName
call when using this component you can call this a normal
< BR> clsid value will also have to change it
HKEY_CLASSES_ROOT \\ Scripting.FileSystemObject \\ value
cLSID \\ project can be deleted to prevent the danger of such Trojans.
cancellation of this component command: RegSrv32 /u C: \\ WINNT \\ SYSTEM \\ scrrun.dll
ban to prevent Guest users scrrun.dll call this component.
use the command: cacls C: \\ WINNT \\ system32 \\ scrrun.dll /e /d guests
Second, the use WScript.Shell assembly
WScript.Shell DOS operating system kernel can call the the basic command
can modify the registry, the component was renamed, to prevent the harm of such Trojans.
HKEY_CLASSES_ROOT \\ WScript.Shell \\
and
HKEY_CLASSES_ROOT \\ WScript.Shell.1 \\
changed its name to other names, such as: change WScript.Shell_ChangeName or WScript.Shell.1_ChangeName < BR>
own time after the call to use this component you can call this a normal
clsid value will also have to change it
HKEY_CLASSES_ROOT \\ WScript.Shell \\ value
cLSID \\ project value
HKEY_CLASSES_ROOT \\ WScript.Shell.1 \\ CLSID \\ project can be deleted to prevent the danger of such Trojans.
Third, the use Shell.Application components
Shell.Application can call the kernel to run basic DOS commands
can modify the registry, the component was renamed, to prevent this The hazards of Trojans.
HKEY_CLASSES_ROOT \\ Shell.Application \\
and
HKEY_CLASSES_ROOT \\ Shell.Application.1 \\
changed its name to other names, such as: change Shell.Application_ChangeName or Shell.Application.1_ChangeName < BR>
own time after the call to use this component you can call this a normal
clsid value will also have to change it
HKEY_CLASSES_ROOT \\ Shell.Application \\ value
cLSID \\ project HKEY_CLASSES_ROOT \\ Shell.Application \\ value
CLSID \\ project can be deleted to prevent the danger of such Trojans.
ban to prevent Guest users shell32.dll call this component.
use the command: cacls C: \\ WINNT \\ system32 \\ shell32.dll /e /d guests
Note: operations are required to take effect after you restart the WEB service.
four, call disable the Cmd.exe
Guests group call user cmd.exe
cacls C: \\ WINNT \\ system32 \\ Cmd.exe /e /d guests
Through the above four steps, you can basically prevent several popular Trojans, but the most effective way is to set the security level to a higher level by setting the server and program security to a certain standard through comprehensive security settings. To prevent more illegal intrusions.
For the DHCP server, we understand some of its basic conditions and configuration
Internet Data Center (IDC), which is developed along with the growing needs of the Internet, is an I
ip address ping nowhere can only be host internal firewall or group policy restrictions. Check that
W3SVC is perhaps the least noticeable component of the IIS 6.0 archit
Grading defense against Linux server attacks
Too much to do: how to avoid excessive server integration
IIS HTTP 500 error solution under Vista
Iis support f4v format file playback configuration method
Linux server front-end error tips and meanings
IIS 301 redirects to the domain name at the beginning of www
IIS local debugging does not recognize the IP solution
Configure Nginx subdomain generic resolution binding to a separate directory
IDC server administrator must have LINUX knowledge
Eight Ways to Improve the Execution Efficiency of IIS 5.0 Web Servers
Win10 Edge browser relies too much on IE11?
Use the Diskpart command that comes with win7 to partition
How to open Win8 Remote Desktop
Barcodes can also be printed in Excel
Detailed loading method of sound card driver under Linux operating system
Windows 7 does not allow the virus to execute the method
Cool dog music making ringtones method skills
How does the Win7 system display the file suffix name and how to modify it?
Don't wait to push. Teach you how to upgrade win10 immediately?