often has to backup the database and other important documents.
once found the invasion, unless you can identify all the Trojan files, or to delete all files. The address bar will when the red horse.
on the web page background management program landing page links.
site is how to do the horse? Network, there are some network for the purpose of rogue shameful to others to attack, such as the others, plus the dark chain website linked to horse, the horse is a very serious matter for a web site, the site administrator best every day, take care of yourself the site no use is the server or virtual host, have to look at their website open have what abnormality. Once the horse must be immediately clear the malicious code, or light is the site included decreased, weight is K.
call to the ASP upload procedures must carry on identity authentication, and only allow people to use the trust upload program. This press release, including a variety of mall and forum, as long as you can upload files to the ASP authentication
to daily maintenance, and pay attention to whether there is a ASP file in the space of unknown source or origin.
to the regular website to download the ASP program, the database name and storage path changes after download, database file name must also have certain complexity. In order to keep the program is the latest version.
program to prevent unknown vulnerabilities, you can delete the background management program in the maintenance of the landing page, the next maintenance by FTP upload.
and regular security on the site, can use the Internet to some specific tools, such as an Internet security detection platform.
site was linked to horse
solutions Detection of
recommends that users to upload and maintain web pages through FTP, try not to install the ASP upload procedures.
ASP program administrator username and password should have certain complexity, cannot be too simple, but also pay attention to regular replacement.