Website was hacked prevention and treatment

Injecting a lot of energy, to improve the website keyword ranking through effective SEO method, but the site was hacked, is a sad thing. SEO optimization as a people, we need to improve the security of the site to an important position, but also need to master the website was hacked prevention and treatment methods.
First: What type of website was hacked?
In general, there are several types.
1: The website is linked to the Trojan. By acquiring the site background, ftp and other administrative privileges, offenders will be implanted malicious code hidden on the site. When ordinary users to access the site, malicious code that is Trojans will run automatically. As a result, visitors computer poisoning, password, etc. will be transferred to the hands of the people hanging horse; in addition, if the site has been suspended Trojans, search engines, anti-virus software and browser will be defensive, if the site hangs Trojans, on there will be safety tips, which is extremely detrimental to webmasters, even if the site is K, will lead to a sharp decline in site traffic.

2: a malicious domain is resolved. The same principle, if the hacker destroyed the right domain management webmaster, it is possible for a malicious website Pan resolution.

3: is cracked website, the JS code to jump directly to get the original normal traffic to the site.

4: Baidu snapshot hijacking. When hackers hijack your website snapshot, you do not work, usually at 1:00. And 5:00 or 6:00 in the morning. They have a specific way to get into the background of your site, find a partner title tags and websites as relevant to their site content, wait for the spider to catch it and get the original information in the morning. If you do not know, you will not easily find anything. As a result, the snapshot into a second day of hijackers site, resulting in your snapshot was hijacked.

Second: How to effectively prevent the website being hacked?

Wherein operating point of the core and the site server security settings, including but not limited to, the following:

1: regularly check the server logs, mainly to see if there is suspicious access to the website page.

2: Modify the time by ftp site files view, to see if there is an abnormal time.

3: Verify web application needs to be updated, if needed, update to the latest version as soon as possible.

4: If the site uses a third-party plug-ins, to confirm its source and evaluate its safety performance.

5, modify the construction site of an important program file name, change the default background login address, to prevent hackers use software to automatically scan specific files in order to obtain the appropriate permissions.

6: Set ftp, domain name, space, background site login user name and password as complicated as possible, do not use weak passwords.

7: Choose a good reputation, strong technical server.

8: If possible, as far as possible and close unnecessary ports, and limit unnecessary upload function.

9: Setting firewall needs to communicate with the service provider space is usually on the server side, and let them set.

In short, we need to do is to make the site itself more secure, to prevent hackers from accessing our website.

Third: If the site was hacked, search engine optimization as a staff, how to deal with?

Once a site linked to the horse, the Pan-analysis, snapshot hijacked home page automatically jump, need to search the site's source code, it will not be deleted site code itself; the site in need of repair vulnerabilities, hackers do not give the opportunity to use; modify the site the user name and password, contact the provider space, strengthen the security settings of the server; complaints by way of the website traffic to a minimum, ranking loss. (Blank seo blog: www.konbaiseo.com)

Guess you like

Origin blog.csdn.net/weixin_43741880/article/details/85329297