Alibaba cloud DNS misjudges mining virus
Publish: 2021-04-20 21:55:50
1. LCS is a decentralized digital currency of the blockchain. The smart contract of the blockchain can't be tampered with. Combustion means that the more mining, the less it is. All of them are absent from work. They release three times of their investment. Now they release 1.2% every day. The earlier you dig, the more you dig,
2. It should be calculated according to the actual situation. If the manager of the platform insists on doing it even though he knows that he has violated the law, then it must be a kind of fraud. Knowing the law and violating the law add one more crime. Do you understand!, Of course, criminal liability may not be so serious, but joint and several liability is absolute. In the case of police interrogation, one has to identify himself as a victim, just a small manager
3. PS aux looks at the process number, finds the location of the virus file according to the process number, does not delete, first looks at crontab - E, whether there are abnormal tasks, and then looks at whether there are abnormal files or changes in your home directory, and whether the boot file has written tasks.... If you don't know much about Linux system, it's recommended to reload the backup data (be careful to disguise as data file). Because it's really troublesome to delete, I deleted it all afternoon
4. It's not a rational way to turn off the computer to avoid attack. And also very unreliable, so that the sub site simply can not run normally
if the server is attacked, it is recommended to check the system log of the server and the running log of the website, analyze what type of attack it has suffered, and then decide which server should mediate and adopt the corresponding security policy to defend it
you can also install protection software such as safety dog for defense
server security dog mainly protects the server from malicious attacks, including DDoS, ARP firewall, remote desktop guard, port protection, network monitoring, etc
the website security dog mainly protects the website on the server, including online horse scanning, SQL injection protection, CC attack protection, resource protection, etc
the protection directions of the two are different. It is suggested that combined use can make the protection more comprehensive
at the same time of defense, you can check the protection log to understand what types of attacks the server and website are subjected to, and then adjust the protection rules according to the types of attacks, which can be more effective for defense.
if the server is attacked, it is recommended to check the system log of the server and the running log of the website, analyze what type of attack it has suffered, and then decide which server should mediate and adopt the corresponding security policy to defend it
you can also install protection software such as safety dog for defense
server security dog mainly protects the server from malicious attacks, including DDoS, ARP firewall, remote desktop guard, port protection, network monitoring, etc
the website security dog mainly protects the website on the server, including online horse scanning, SQL injection protection, CC attack protection, resource protection, etc
the protection directions of the two are different. It is suggested that combined use can make the protection more comprehensive
at the same time of defense, you can check the protection log to understand what types of attacks the server and website are subjected to, and then adjust the protection rules according to the types of attacks, which can be more effective for defense.
5. In case of packet loss, the network is not good, or the server network is not good, but the possibility is relatively small. If you can spell other things normally, then see if your broadband operator and Ali's are not the same operator, and the network between cross operators is not very stable
6. Now the domain name needs to do real name authentication before it can be used normally. I suggest you see if the domain name has real name authentication, and whether the DNS resolution and domain name status are normal.
7. If there are frequent problems in domain name resolution, you can try to change a set of DNS, or if it doesn't work, you can transfer the domain name to other service providers.
8. Generally, your domain name is not resolved
if your domain name is not a sister, you can't find the corresponding DNS address. It's recommended to go to your domain name space to do domain name resolution.
if your domain name is not a sister, you can't find the corresponding DNS address. It's recommended to go to your domain name space to do domain name resolution.
9.
The probability of DNS resolution authentication is very high. Although it is a third-party API resource, DNS resolution can also be used
explain the reason:
- file authentication, maybe the domain name can be resolved normally or the web error cannot be authenticated Li >
-
DNS resolution authentication, as long as you add DNS and wait for it to take effect, unless DNS limits the region
-
it is recommended to use Alibaba cloud charging certificate to ensure high trust rate and stability
< / OL >
solution: you can choose to use the manager's email authentication or text letter authentication for the charging certificate
10. Hello
it doesn't matter. For domain names registered in other places, you can also apply for SSL Certificate in alicloud to authenticate the domain name DNS. You can authenticate the domain name manually.
it doesn't matter. For domain names registered in other places, you can also apply for SSL Certificate in alicloud to authenticate the domain name DNS. You can authenticate the domain name manually.
Hot content