Joke Collection Website - Blessing messages - What are the measures to prevent hacker attacks?

What are the measures to prevent hacker attacks?

/Article_Print.asp? ArticleID=23 16

-How to prevent hackers?

1, mask can IP address:

This method is the most effective. Once the network administrator finds the suspicious IP address application, he can block the corresponding IP address through the firewall, so that the hacker can't connect to the server again. However, this method has many shortcomings, such as the dynamic IP used by many hackers, that is, their IP address will change, one address will be blocked, and the server can still be attacked as long as other IPS are replaced, and advanced hackers may forge IP addresses, which may block the addresses of normal users.

2. Filter packets:

By writing firewall rules, the system can know what kind of packets can enter and what kind of packets should be abandoned. In this way, when a hacker sends an offensive packet, the information will be discarded when passing through the firewall, thus preventing the hacker from attacking. However, this method still has its shortcomings, for example, hackers can change the form of offensive code, making it impossible for firewalls to distinguish between true and false packets; Or hackers just send a lot of data packets endlessly until the server is overwhelmed and the system crashes.

3. Modify the system protocol:

For vulnerability scanning, the system administrator can modify the corresponding protocol of the server. For example, vulnerability scanning determines whether a file exists based on its application return value. If the value is 200, it means that the file exists on the server. If it is 404, it means that the server has not found the corresponding file. However, if the administrator modifies the return value or blocks the 404 value, the vulnerability scanner is useless.

4, often upgrade the system version:

After any version of the system is released, it will not be attacked for a short time. Once the problem is exposed, hackers will flock to it. Therefore, when maintaining the system, administrators can often browse famous security websites and find new versions or patches of the system to install, so as to ensure that the loopholes in the system have been fixed before being discovered by hackers, thus ensuring the security of the server.

5, timely backup of important data:

Better late than never, if the data is backed up in time, even if the system is attacked by hackers, it can be repaired in a short time to recover unnecessary economic losses. Like many foreign commercial websites, system data is backed up every night. In the early morning of the next day, no matter whether the system is attacked or not, the data will be recovered to ensure that the database in the system will not be destroyed every day. It is best to put the backup of data on other computers or drives, so that after hackers enter the server, the damaged data is only a part, because the backup of data can not be found, and the loss to the server will not be too serious.

However, once attacked by a hacker, the administrator should not only try to recover the damaged data, but also analyze the source and attack method of the hacker in time, fix the vulnerabilities exploited by the hacker as soon as possible, then check whether the hacker has installed Trojan horses, worms or opened some administrator accounts, and try to clear all clues and backdoors left by the hacker to prevent the next attack by the hacker.

6. Use encryption mechanism to transmit data:

For personal credit cards, passwords and other important data, the transmission between the client and the server should be encrypted before sending. The purpose of this is to prevent hackers from listening and intercepting. There are always different cracking methods for various popular encryption mechanisms on the network. So we should look for the kind that is difficult to crack, such as DES encryption method, which is a set of encryption algorithms without reverse cracking. Therefore, when hackers get this encrypted file, they can only use brute force to crack it. As long as an individual user chooses an excellent password, the hacker's cracking work will be terminated after endless attempts.