If the site has been hijacked, what kind of impact will cause?

  Website hijacked harm?
  1, a hijacked website, when you open the URL, when will jump to another web site, causing users can not normally access, resulting in a serious loss of site traffic, site ranking colleagues also negative.
  2, Pan resolve generate a lot of subdomains through, all pointing to other addresses.
  3, the domain name is resolved to an illegal website, or there is malicious site, resulting in damage to property users, constitute customer complaints.
  4, regular bounce some ads, the site will cause customers tired, not like the site, resulting in a decline in the reputation of the site.
  How to check your website is not being hijacked?
  IIS7 website monitoring
  whether the test site has been hijacked, DNS information pollution detection.
  Web site was hijacked how to deal with?
  1, the website domain name is resolved Pan
  Pan analytic closed domain, enter the domain name back after parsing click on our domain with an asterisk find DNS, delete the family to stay.
  2, hijacking
  under normal circumstances, when you are ready the site, the proposed site from time to time to back up your normal run, beating *** when we can not find the file, timely restore a site system. Solve common *** *** can find out deleted files, and then replace the backup files just fine, but if a malicious *** We are not to be found, only to restore a backup program through the correct website (So , develop good habits, regular backup of our website is good, in general, to update the site, we maintain a backup at least once a week is the most basic)
  3 browser is hijacked
  Encountered such a situation, sometimes the browser that comes with advertising, there is hijacked by others maliciously, for example, you find someone else to install the system, you could install his browser is hijacked and modified the because every time you open a browser, to show the time, they are all commission revenue. Only now, with the development of mobile phones, many mobile browser also particularly advertising, this time, the best way is to deal directly uninstall Quguan network in the new download a browser program installed.
  4, operators hijack
  this hijacking is the most difficult to deal with, we usually encounter is also the case, how to deal with this situation on the demand mentioned HTTPS encrypted
  1), https protocol needs to request zhengshu CA, is usually free zhengshu less.
  2), http is the hypertext transfer protocol, information is transmitted in the clear, https is encrypted with a security ssl transfer protocol.
  3), http and https use is completely different connection method, ports used are not the same, the former is 80, which is 443.
  4), coupled http very simple, no case; is constructed by the HTTPS protocol SSL + HTTP encrypted transmission protocol, a network authentication protocol, the http protocol than security.
  In a typical operator's hijacking, the use of https encryption, can hijack fell 90% domination!

Guess you like

Origin www.cnblogs.com/xiaokeaia/p/11547305.html