ASP Trojans and other ASP programs are not essentially different, as long as they can run ASP space to run it, this nature makes ASP Trojans very difficult to detect. Even good anti-virus software may not be able to detect whether it is an ASP Trojan or a normal ASP website program. To this end, to deal with this virus, can only take effective measures to prevent?
First: start from the source, how do intruders upload asp Trojans? Generally, several methods, through sql injection Means to obtain administrator privileges and write the asp trojan to the server by backing up the database. Or enter the background through the asp program upload function vulnerabilities, upload Trojans, etc. Of course, under normal circumstances, these asp programs that can upload files are restricted, most of which limit the upload of asp files. (For example: news release, image management program, and forum programs that can upload more types of files, etc.) If we upload the asp trojan directly, we will find that the program will prompt you to upload it directly. However, due to the artificial asp setting error and the vulnerability of the asp program itself, the intruder can take advantage of the opportunity to upload the asp Trojan.
Therefore, the main point of preventing the asp Trojan is how to ensure the security of the asp uploader in your own space. If you are using someone else's program, try to use a large-scale program that is famous. Vulnerabilities are naturally less, and try to use the latest version, and often go to the official website to view the new version or the latest patch, and the default path of those databases, the administrator password default, must be changed, form a habit guarantee program Security.
So if you are a programmer, what I want to say is that we should try to write a program that involves usernames and passwords from a security perspective, preferably on the server side. Less appear in the ASP file, the user name and password connected to the database should be given the minimum permissions; need to verify the ASP page, can track the file name of the previous page, only the conversation from the previous page can be Read this page. Prevent ASP homepage .inc file leakage problem; prevent UE and other devices from generating some.asp.bak file leaks, etc. Especially the upload function must pay special attention to
The above is just some requirements for customers, but the space provider Because it is impossible to foresee what programs virtual host users will upload on their own sites, and whether each program has a vulnerability, it cannot prevent intruders from exploiting the behavior of the client itself in the site to upload the asp Trojan. Space providers can only prevent intruders from using the compromised site to re-invade other sites on the same server. This also shows that to prevent asp Trojans, virtual host users must strictly control their own procedures!
This small series summarizes the ten principles of ASP Trojan prevention for your reference:
1. It is recommended that users upload and maintain web pages through ftp, and try not to install asp uploading program.
2, the call to the asp upload program must be authenticated, and only allow trusted people to use the upload program. This includes various news releases, malls, and forum programs. As long as you can upload files, asp must be authenticated!
3, asp program administrator's user name and password must have some complexity, not too simple Also pay attention to regular replacement.
4, to the regular website to download the asp program, the database name and storage path should be modified after downloading, the database file name must also have some complexity. It is recommended that my company's customers use the database file extension of .mdb, because our company server has the .mdb file anti-download function.
5. Try to keep the program up to date.
6, do not add a link to the background management program landing page on the page.
7, in order to prevent the program from having an unknown vulnerability, you can delete the login page of the background management program after maintenance, and then upload it via ftp for the next maintenance.
8. Always back up important files such as databases.
9, daily maintenance, and pay attention to whether there are unknown asp files in the space. Remember: a sweat, change a safe!
10, once found to be invaded, unless you can identify all Trojan files, delete all files. Before re-uploading files, all asp program usernames and passwords must be reset, and the program database name and storage path and the path of the daemon should be re-modified.
Doing the above precautions, your website can only be said to be relatively safe, and you must not neglect it, because intrusion and anti-invasion are an eternal war!
When we use WinXP computer, we will pop up an offline prompt when browsing the webpage: the requeste
Sometimes it is afraid of mistakes in the operation of the important folder in the system, sometimes
What is a cookie, I believe everyone knows about it! It is the data that some websites store on the
There are two kinds of display flashing. One is black screen flashing, the other is flashing screen,
How does the WinXP system set the slide background?
Add a cool background image for your disk.
Six Wonders of WinXP File Properties You Don't Know
Master teaches you to recover the cheats of accidentally deleted files
Play the recycling bin, let the garbage become treasures
Windows media player can't play this file?
Easily solve the problem of insufficient virtual memory in Windows
WinXP system prohibits Flash Player update prompt method
How to input RMB symbol in WinXP system¥
How to solve the abnormal/unknown software exception of WinXP application?
Linux system how to create a scheduled task with crontab
How to refuse to remotely modify the key value of the Win8 registry
Win7 creates strong passwords to improve password security.
Win10 system 10122 can not activate the problem how to solve
What should I do if I get a reminder to access the win7 Ultimate computer when I wake up?
How to create a new account in Windows 7
How does Win10 fix this computer to the taskbar to access the
Win7 computer will have one more TEMP folder every time you use the browser desktop
Win10 click on the start menu folder prompt link failure solution
How to solve the problem that Win8 system can't update error 80244fff