Joke Collection Website - Blessing messages - What does the website monitoring service specifically include?
What does the website monitoring service specifically include?
First, the website basic monitoring
ICP record monitoring: Check the records of the website.
WHOIS query monitoring: query whether the basic information of website domain name is normal.
IPv6 monitoring: Check whether the website supports IPv6 network access, and count whether the internal and external links are reachable.
HTTP detection: detect abnormal HTTP connections and conduct functional, performance and security tests.
DNS dial test: create, modify and delete dial test tasks, and bind alarm strategies.
Second, the website content monitoring
Misspelled words monitoring: the text content is summarized, the sentence confusion is calculated by language model, and the optimal solution is obtained by arranging the results.
Cross-link monitoring: comprehensive report is given according to error type/resource type/internal and external link type, and recording and filtering functions are supported.
Sensitive word monitoring: Customize sensitive information base, and capture website text, pictures, JS information, etc. , compared with the font, give an alarm.
Picture compliance: intelligent picture review, filtering all kinds of illegal pictures.
Streaming media monitoring: provide digital streaming media monitoring scheme to detect audio and video security.
Double audit: double audit by machine and manual to eliminate sensitive content and ensure website compliance.
Artificial Internet reading: Public opinion experts provide all-weather Internet reading services.
Third, network security monitoring.
Tampering: including monitoring and alarming titles, pictures, contents, hidden links, etc.
Hang a horse: detect whether the website is inserted into a Trojan horse program to prevent the website from being implanted with malicious code.
Dark chain: dark chain detection, intelligent identification of illegal content on the website.
Vulnerability scanning: vulnerability scanning of WEB applications, including WEB injection vulnerabilities, weak password monitoring, file upload vulnerabilities, etc.
Penetration: Evaluate the network's ability to resist attacks through WEB penetration test.
- Related articles
- How does grandma write in the obituary?
- Why can't Xiaomi mobile phone card 2 be corrected?
- The complete works of txt of Iron Blood Wulin novels are free.
- Is it credible for ICBC to reserve SMS?
- How to change the notification tone (information tone) of HTCg 1 1
- How to open the oppo ring Taiyun
- Which is better, Huawei Nova A9 or Redmi K40 ¡ª¡ª Comparison of parameter configuration between Huawei Nova A9 and Redmi K40
- The attendance SMS service in Guangdong School Communication Service has been activated. Why can¡¯t parents¡¯ mobile phones receive their children¡¯s credit card information?
- Xiamen University 2023 Postgraduate Entrance Examination Results Announcement Time
- If you don't want to do unsuitable work, should you tell the leader? How can I put it?