How do I know if a web page is a trojan? What is a web trojan? What to do if you are tied to a horse

Updated on technology 2024-02-09
10 answers
  1. Anonymous users2024-02-05

    Generally, it is attacked because there is a vulnerability in the ** program or a vulnerability in the server.

    Hanging horses are the biggest headache for everyone, solutions: 1It's easy to find the trojan's ** in the program.,Delete it directly.,Or overwrite the source program that you didn't send to the server once but it's hung up again and again.,You have to solve this problem in depth.。

    But this is not the best solution. The best way is to find a professional to do security to help you solve it.

    I heard from a friend that Sine is safe and good, and you can check it out.

    Clear the horse + patch the vulnerability = completely solve.

    Clear the horse. 1. Look for the label of the hanging horse, such as there is or.

    Or maybe you used 360 or sick antivirus software to block Nethorse**. SQL databases are trojans, generally JS trojans.

    2. After finding the malicious intent, the next thing is to clear the horse, if it is a web page that is hung with a horse, you can use manual clearing, you can also use batch clearing, the web page is relatively simple, I will not talk about it in detail here, now focus on SQL database cleaning horse, with this sentence "update table name set field name = replace(field name,'aaa',''Explain the meaning of this sentence: replace the content of the field name containing aaa with empty, so that the child can delete the nethorse in batches one table at a time.

    In the case that there is no backup of your **program or database,You can implement the above two steps to clean the horse,If your **program has a backup,Just overwrite the original file。

    Patching vulnerabilities (patching vulnerabilities means doing security.) )

    1. Modify the username and password of ** background and the default path of the background.

    2. Change the database name, if it is an access database, it is better not to use mdb for the extension of the file, change it to asp, and the file name can also have a few more special symbols.

    3. Then check whether there are injection vulnerabilities or cross-site vulnerabilities, and if so, it will be quite anti-injection or anti-cross-site patches.

    4. Check the upload file of **, there are common cheat upload vulnerabilities, and filter the corresponding **.

    6. Write some anti-hanging horses**, so that the frame ** and other hanging horses are invalid.

    7. Disabling FSO permissions is also a relatively absolute method.

    8. Modify the read and write permissions of some folders.

    9. If you are your own server, it is necessary not only to make your ** program safe, but also to make your server safe!

  2. Anonymous users2024-02-04

    **After hanging the horse, you go to browse this**, you can't see your own content, and it's replaced with other content.

  3. Anonymous users2024-02-03

    The web page is trojanized, and you have to find a team and company that specializes in security and server security to solve the problem for you. I heard that sinesafe is good.

  4. Anonymous users2024-02-02

    Web page trojan refers to the embedding through the vulnerability invasion and modification of related web pages, such as inserting malicious js** in the pages that users often browse, or the classic flash leak bend finger hole file, so that when others browse the closed loss of the trojan web page, it will be executed malicious**and**related Trojan files to the user's computer, many users did not run suspicious files before, but the Trojan horse, most of them are caused by browsing the web page of the trojan.

  5. Anonymous users2024-02-01

    A few days ago, some **institutions** in the United Kingdom and the United States ** were infected by maliciously**, and more than thousands** were recruited, and these infected computers began to dig digital encryption activities. I know of more than 4,000 judges** who have been used to mine Monero, and the source of the infection is a tool used to assist the visually impaired in reading macro pages. This kind of web page is very dangerous, and it is best to install security software such as Tencent Mobile Manager on your mobile phone to check the security of your mobile phone.

  6. Anonymous users2024-01-31

    You can use the security dog to scan and detect it, clear the files of the trojan, etc., to defend against attacks.

  7. Anonymous users2024-01-30

    **Hung horse,That's you**program has a loophole will be hung horse,It is recommended that you find a professional to do**safe sinesafe to solve it for you,My** have encountered this situation of being hung up before.,At that time, the inclusion was gone.,I really cried to death.,Find sinesafe to do**security maintenance,**Until now, I have never been hung up again, safety needs maintenance, sinesafe is trustworthy Hanging horses can find them to solve it for you.

  8. Anonymous users2024-01-29

    Workaround:

    Replace files other than databases and upload directories;

    Remove Trojans from the database**.

  9. Anonymous users2024-01-28

    **Trojan is embedded in**malware**, when users browse these web pages, they may be attacked by malicious attacks from the source of trojans. If you accidentally enter the ** that has been trojanized, you will be infected with the Trojan virus, and you will lose a large number of files and account passwords, which is extremely harmful. In fact, it can be scanned by the monitoring system, knowing that one of Chuangyu's products is called WebSoC knowing**Stereoscopic monitoring system, which can be scanned on a large scale, can scan 500,000 URLs per day, and it is very stable, you can try it.

  10. Anonymous users2024-01-27

    Solution: It is easy to find the ** of the trojan in the program, delete it directly, or overwrite the source program that you did not send to the server once but are hung up again and again, and you have to solve this problem in depth. But this is not the best solution.

    The best way is to find a professional security company to help you solve it, and domestic security companies such as SineSafe and NSFOCUS are more professional.

Related questions
9 answers2024-02-09

Start by adding the following **::

script> >>>More

7 answers2024-02-09

Oh, in fact, you don't need to do anything dw (but you can also get up You can also go directly on** full site system with CMS (background management) I don't know if you know how to get up anyway, you can also step by step You will know slowly Upload is simple But it costs money But there is also free space. >>>More

12 answers2024-02-09

Hehe, Yahoo Assistant believes that it has been defined as rogue software by the vast majority of users, so it is best not to touch it. I recommend the landlord to use maxthon, the Chinese name is Maxthon. This is a multi-page browser,Compared to IE,Save system resources,In the options inside,Click "maxthon option",Click on the regular,Then click on the "exit" item inside,Haha,See the landlord。 >>>More

14 answers2024-02-09

It's that you haven't set it up, this problem can be solved: open OutlookExpress, click "Tools" - "Account", double-click your account, then click the "Advanced" tab, and select "Keep a copy of the email on the server" at the bottom of the window, and that's it, the two items below it, you can set it up as you like. However, once you have this set up, you'd better go to the server regularly to delete emails, otherwise there will be more and more emails on the server.

7 answers2024-02-09

1 Custom deletion (i.e., delete which history you want to delete). >>>More