I gave a hacker, what should I do if the server was hacked

Updated on technology 2024-02-09
14 answers
  1. Anonymous users2024-02-05

    What's going on with this IP address, old attacker? It was suggested that he be sealed.

  2. Anonymous users2024-02-04

    If you unplug the network cable, I don't believe that this hairy hacker controls one of your computers all day long, and you pull out the network cable for two or three days, and he will die in a hurry

  3. Anonymous users2024-02-03

    Don't be afraid of hackers, you can also learn to hack just to go, so that you can't protect yourself, and you can also hack others, it is recommended that you go to the Huaxia Hacker Alliance, where the resources are abundant and the members are not bad. Definitely get you to learn about cybersecurity!

  4. Anonymous users2024-02-02

    This is a hacker using IP tracking software to carry out a remote attack, either the person only has access to your home IP address, or knows your Internet account number.

    One and a half ways to turn up the firewall defense to the maximum!

  5. Anonymous users2024-02-01

    Small problems, don't worry, it won't move you after a long time.

  6. Anonymous users2024-01-31

    1. Check the system logs to see what type of attack it is and where the attackers have gone. If there is any trace of whether the content has been modified again, etc., if any problems are found, we will clean it up in time.

    2. Turn off unnecessary services and ports.

    3. Scan the server regularly to see what problems exist, and patch the vulnerabilities in time; Check if there is a shadow account, an account that you did not create yourself, etc.

    4. Re-set the account password, the password setting is more complicated; and setting account permissions.

    5. Upgrade the security software on the server, or reset the protection parameters to make it conform to the current environment. If it is not installed, you can install a server security dog, and at the same time, you can also add the server to the security dog service cloud platform, so that when an attack occurs, you can quickly know and deal with it.

    6. Detect whether it has been hung with horses, tampered with, hung black chains, etc., and if so, clean up in time.

    7. If it is a large-traffic attack, you can take a look at DOSS traffic cleaning, which many security vendors have this service.

    8. Back up data files regularly. If you have made a backup before, you can replace important data.

  7. Anonymous users2024-01-30

    Install a firewall or other network security device.

  8. Anonymous users2024-01-29

    Choose Anti-DDoS Pro server rental to prevent traffic attacks. Yao Lei data answers.

  9. Anonymous users2024-01-28

    And then do it again.

    Server security.

    And then there is. I checked it out frequently. If yes.

    It is easy to do by dos.

    Watch the landing diligently. Records, such as:

    Permission Firewall.

    Wait. Plug the loopholes with. port for example.

    Wait. Check it out in detail.

    aspphp

    and other documents have not been implanted with a sentence Trojan and backdoor. The host rebuilds the system.

    Pay attention to backing up the previous one.

    documents, then.

    Use a good firewall.

  10. Anonymous users2024-01-27

    Don't resolve the domain name directly to the real IP address of the server, don't let the real IP of the server leak, add CDN relay to the front-end of the server (free CDN can generally prevent DDoS of about five G), if you have enough funds, you can buy a high-defense shield machine, which is used to hide the real IP of the server, the IP of the CDN is used for domain name resolution, and the IP address of the CDN is used for all resolved subdomains. In addition, other domain names deployed on the server cannot be resolved using real IP addresses, and all of them are resolved using CDNs.

    In short, as long as the real IP of the server is not leaked, the prevention of small traffic DDoS below 5G does not cost much, and the free CDN can cope with it. If the attack traffic exceeds 10 Gbit, then the free CDN may not be able to withstand it, and you need to buy a high-defense shield machine to deal with it, and the real IP of the server also needs to be hidden.

  11. Anonymous users2024-01-26

    **Security Net Shield makes** invulnerable l,x,f,s,,,2713,6987 Whether you have been attacked or not, if you want to protect the web page, I can solve the private server. Mobile games. Chess and cards. H5 has the most professional protection.

  12. Anonymous users2024-01-25

    DDoS attacks can generate a large amount of network traffic to VMs in a short period of time, which not only causes the attacked VMs to deny service, but also may affect the network access efficiency of the entire virtualization platform. As a result, virtualization platforms provide network traffic scrubbing appliances that are specifically targeted at DDoS attacks.

    The system provides a functional interface to prevent DDoS attacks. With the network monitoring system, you can use the anti-DDoS API to transfer DDoS attacks on specified IP addresses to traffic scrubbing devices.

    When a DDoS attack occurs, the network monitoring system detects abnormal changes in network traffic and sends an alarm. After the system automatically detects or manually determines the public IP address of the attacked VM, it can identify the public IP address of the attacked VM. In this case, you can call the anti-DDoS API of the system to start traffic scrubbing of the attacked IP.

    The traffic scrubbing device immediately takes over all packets for that IP address and scrubs out the attack packets, giving only the normal packets** to subsequent network devices such as F5. In this way, the normal traffic of the entire network can be guaranteed, and the DDoS traffic can be blocked. Keep your business from being compromised.

    1.Cloudbank 600G DDoS protection CPU: 16 cores Memory: 32G HDD: 240G SSD Bandwidth: G port 200M DDoS protection: 600G Telecom Yundi Independent cleaning.

    2.Yundi Death Resistance Unsealed IP CPU: 4 cores-24 cores Memory: 8G-64G HDD: 120G-1T Bandwidth: G port 300M DDoS protection: Death Resistance Unsealed Yundi independently blocks large packets in immortal mode.

    3.Distributed solution CPU: 4 cores-24 cores Memory: 8G-64G HDD: 120G-1T bandwidth: G port DDoS protection: Dead carry unsealed Multiple BGP nodes are resistant to distributed protection.

    Please deduct seven. One. Two. Three. Five. Eight. Seven. Zero. Seven.

  13. Anonymous users2024-01-24

    With a high-defense server, you must make a backup after the attack.

  14. Anonymous users2024-01-23

    Back up your data regularly.

    Even if the ** is attacked, even if the page content is tampered with, the loss can be recovered with the minimum cost, close the idle port, and modify the default port.

    Set permissions to reduce the risk of tampering.

Related questions
7 answers2024-02-09

I can tell you responsibly that the upstairs statement can't be completely irresponsible. >>>More

8 answers2024-02-09

You add my mailbox, and I'll send you a good firewall, which is free forever. >>>More

5 answers2024-02-09

For users who dial-up to the Internet and do not have firewalls and anti-virus software, what happens when the Internet is hacked? What are the consequences? Is it possible that hackers can no longer monitor the computer after it goes offline? >>>More

15 answers2024-02-09

Hu Kairui (meaning: auspicious, happy, healthy).

The name is far more than a code name for us, it inherits the imprint of family blood, but also embodies the parents' deep love and ardent expectations for their children, implying different ideals and ambitions, interests, hobbies and goal pursuits, it plays a great role in the subtle influence of life. Choosing a good name also needs to consider its cultural connotation, educational significance, pronunciation, font, family traditions, and other factors. >>>More

11 answers2024-02-09

First, first of all, ask the landlord, these days when you are in love, do you have text messages, msn, QQ, e-mail, etc. >>>More