Current location - Quotes Website - Collection of slogans - How to deal with the black chain of website? How to deal with the black chain of the website
How to deal with the black chain of website? How to deal with the black chain of the website
The website has been hung with a black chain. How should I delete it?

The website has been hung with a black chain. The deletion method is as follows: 1. Go to the homepage of Baidu Webmaster Tools, and then click Next.

2. Select the website linked to the black chain.

3. Click webanalytics on the left to enter the drop-down list and directly open the external chain analysis. Then Baidu will automatically detect all external links of the website.

4. After the test, a detailed list will be provided at the bottom. Just find the black chain in the list. Then remove the outer chain at the rear point of the chain.

Five effective ways to check whether a website has a black chain.

First, always check the source code of the website.

Second, skillfully use the "website dead chain detection" function in the webmaster tool.

Third, use FTP tool to check the modification time of website files.

Fourth, always modify the ftp user name and password.

Fifth, skillfully use the "same IP site query" function in the webmaster tool.

What are the common ways for websites to be attacked?

1, data corruption attack

This kind of attack may have a great impact on the website, and may even cause great losses to the website owner. It is also a very despicable means, and it also belongs to a kind of network illegal behavior. In the past, the user names and passwords of some large websites were stolen, probably because of this attack. Common SQL injection also belongs to this kind of attack, which specifically destroys and attacks data servers. Some will replace the pages on the website, and some will modify the pages on the website, which will bring great trouble to the website.

2. Web page tampering

Web page tampering is aimed at some loopholes in the website program, and then a Trojan horse is implanted in the website to tamper with the web page. When the webpage information changes and users visit the website, visitors will distrust it and be intercepted by browsers and search engines. If this happens, you need to install 360 host guards for detection, and change the program to fix the vulnerability in time.

3. Hang a horse or a black chain

This kind of attack is not very harmful, but it cannot be ignored. Once your website is hanged with Trojan horses and black links, your website will be very abnormal after opening. Either the content of the webpage is modified, or the webpage opens a large number of windows, etc. Such websites are all caused by attacks. Once the search engine detects that your website has been hung up, it may give your website a penalty of demotion, or even a serious K drop.

4. Traffic attack

Attacking with traffic is also a way to attack websites. Users can request access to websites with the help of multiple simulation servers, among which CC attack is the main one. After the attack, the CPU of the server will peak and the website will be paralyzed. In order to avoid this situation, we should choose some large host servers with firewalls, such as New Network Interconnection and Alibaba Cloud.

5. Domain name attack

Domain name attacks mainly involve the transfer of domain name ownership and the transfer of domain name registrars; Without the control of domain names, domain names will be bound and resolved to hacker websites, which will disperse the weight of pan-resolution and cause distrust of search engines and security platforms, thus reducing the power and marking black.

6. Malicious scanning

Malicious scanning is mainly to automatically scan websites through some tools, and then find out vulnerabilities to attack. To solve this problem, you can close the idle port.

How does SE judge dead links?

First, skillfully use the "dead link detection" function in the webmaster tool. You can use the "dead link detection" function in the webmaster tool to view all the links in the website page. This tool can check whether the links in your website are accessible, and it can also display all the links in the website page. If you find an unknown link, take relevant measures to delete it immediately, which may be a black link. Second, always check the source code of the website. Under normal circumstances, the black chain hangs on the front page the most. Maybe some friends who sell black chains also have a preference for hanging the inner pages of the website, which can be a little more difficult. The webmaster needs to check the source code of the website frequently. Click on the text position of the website and right click, and there is an option of "viewing the source file". Click to view it. If your website is set without right click, you can view the source code of the website by downloading some relatively easy-to-use browsers. Third, use ftp tool to check the modification time of website files. Each website file has its own modification time. If there is no modification time, the system will display it according to the creation time of the file. If I say that the upload time of this website is April 1, I checked it through ftp tool, and most files are April 1, and suddenly I see that the modification time of a file is almost the same as it is now. Then your file may have been tampered with, the source code of the file has been modified, and the black chain has been hung. Now you'd better download this file to the local area, and carefully check whether there are any traces of black chain hanging in the source code of the file. Of course, when checking, if you are an asp+access website, you can see that the modification time of your database file is almost the same as it is now, which can basically be ignored. For example, if your website articles have statistics of clicks, once visitors browse the website articles, they will be written into the database, which will naturally modify the database modification time. Fourth, skillfully use the "same ip site query" function in the webmaster tool. With this tool, you can query some websites on the same server as yours. If your own website is hacked, you should check other websites on the same server. When you find that some other websites have been hacked, we can suspect that it is a server security problem, not a loophole in our own website program. What we need to do now is to contact immediately. Fifth, some friends who often modify the ftp user name and password of the website will get your ftp password through illegal means. If your ftp password is simple, such as "123456" and other dangerous passwords, they will feel insecure. In this case, they will be able to "start" your website better. We need to set a more complicated password.

What about vpi hijacking?

Causes and solutions of hijacking

The primary reason why the website is hijacked is that there are loopholes in the website, and hackers implant malicious code to hijack the website.

1, there is a loophole in the website.

This is the most common cause of hijacking. Hackers invade websites through website vulnerabilities and then hijack them with malicious code. If malicious code is found in the website, there is no doubt that it is hijacking caused by website vulnerabilities.

In view of this hijacking, malicious codes and Trojans need to be cleaned up and then deployed, so as to completely solve the problem of hacker intrusion and make the website 100% anti-hanging, anti-black chain, anti-tampering, anti-hijacking, anti-Trojan and anti-intrusion.

The background of Dede was invaded, and the background of the website was hung with a black chain. What should I do?

65438+

2. Back up the uploadfile program, download it locally, check whether there is a. php suffix and analyze it. 3. Back up the database and download the backup locally. 4. Back up the whole program and download it locally. 5. Delete the whole website on the server, download a version consistent with your program in Germany and Germany, upload it to the server and reinstall it. 6. Check the database, upload files and.