*** common type of investigation and treatment recommendations

First, what is chicken ***:

Broiler and is to be ****** ***, inside the computer into a virus and *** like backdoor, a remote computer with administrative rights, by a remote-controlled PC ***.

It is advised broiler or ARP *** deal:

1, the system level checks

(1) in the case of regular checks of system users, if found suspicious account administrators to check whether the group increased by an unknown account.

(2) check their Web site directory permissions, try to reduce the rights of unrelated users.

Per month (3) Windows client hosts must fight system patches, around the 15th of each month Microsoft will release a patch, please patch.

(4) advised to turn off unneeded services.

(5) the proposed closure of a number of high-risk ports, such as 135, 139, and so on.

2, the program checks from

(1) regularly check the site for suspicious executable files.

(2) avoid the use of free components and third-party controls, if you use third-party controls better watch updates.

(3) regular backups of your database and web application.

3. Submission System Initialization

The system is infected with a virus or *** ******, damaged system files, can not be repaired by conventional means, seriously affect use. No important data system disk, reinstall the system can be selected directly; (reinstall the system, other disk data affected)

Second, what is DDoS ***:

DDoS is a Distributed Denial of Service English acronym, which means "distributed denial of service" then what is a denial of service (Denial of Service) do? It can be understood, all can lead to legitimate users can not access the normal behavior of network services are regarded as a denial of service ***. That is the purpose of denial of service *** is very clear, is to prevent legitimate users to access network resources properly, so as to achieve the purpose of *** ulterior motives. It is also a denial of service ***, but DDoS and DOS or different, DDoS *** strategy of focusing on by a lot of "bots" (who is *** *** over host or indirect use) to victim host sends a large number of seemingly legitimate network packets, resulting in network congestion or server resource exhaustion denial of service, distributed denial of service once implemented ***, *** network packets will flock like a flood victim host so that the legitimate users of network packets flooded, leading to legitimate users can not access the server's network resources, therefore, denial of service *** has been called "the flooding ***", means there is a common DDoS *** SYN Flood, ACK Flood, UDP Flood, ICMP Flood, TCP Flood, Connections Flood, Script Flood, Proxy Flood and the like; and DOS *** focuses on the host by using a specific network vulnerability cause stack failure, system crash, the crash host can not provide normal network services, resulting in a denial of service, common DOS *** means there TearDrop, Land, Jolt, IGMP Nuker, Boink, Smurf, Bonk, OOB and so on.

DDoS *** initiated a large number of connection to access your site, producing a large number of connections and traffic, resulting in server load is too high and insufficient bandwidth, it does not affect your website data. DDoS *** has some relevance, there is no good solution, only to *** source in the form of broken network can not find the target host.

DoS *** investigation was recommended precautions:

1, troubleshooting tips

(1) Check the website and server data, if there are loopholes, the site content may be transferred out of ***, *** avoid the same again.

(2) Please see if competitors malicious ***, comprehensive investigation and processing.

2, the precautions

(1) procedures to prevent, recommended zend, MD5 encryption, etc. in the program code encryption program on their own, to avoid procedural flaws lead to *** *** implanted in the virus program, while eventually *** virtual into the room for this vulnerability launch DoS ***.

Strengthen (2) a host of security measures, it is recommended not to use the default remote port on the server and all the passwords have to use complex passwords, such as remote password, FTP password, database password. Simple passwords are easy to decipher *** customers will eventually host as a chicken to initiate DDoS *** to other servers.

Guess you like

Origin blog.51cto.com/14662442/2477031