For some, your own website is entertainment and a good reason to while away your time. But someone uses this resource as a source of income that needs protection from fraudsters.
Necessary
- - your site;
- - Internet access.
Instructions
Step 1
Websites are hacked for many reasons. For example, having gained access to someone else's resource, you can change the contact information to your own. Thus, potential customers are "stolen". It also becomes possible to add a hidden link to another site to the site in order to increase its link mass. And there are times when competitors order the hacking in order to prescribe malicious code that will "infect" the computers of visitors to a given site.
Step 2
In order to avoid unpleasant situations, do not enter the site administration panel from the computers of your friends, in an Internet cafe, at an institute. If this does happen for some reason, do not save the password using the browser function, and always click on the "Exit" button when finishing work.
Step 3
When working with a resource, use only a special control panel. In the "Administrators" group, disable the ability to edit data directly through the site.
Step 4
Use an individual strong password to enter the administration panel. Change it periodically and never store it in your computer software. These actions will make it possible to avoid not only hacking, but also the penetration of virus programs.
Step 5
Also, to protect your site from viruses, periodically check your computer with an antivirus, which should be regularly updated. Do not use Internet Explorer in your work. It is the most vulnerable browser for scripting viruses. The best solution is Opera. Do not open dubious sites and links that come to your mail, through messages on social networks, ICQ. Update the CMS version regularly. For more security of your resource, the content management system should have the latest and safest option.
Step 6
As often as possible, make a backup copy of your site's databases, which you can use at any time to restore the entire resource in the event of a hack. It is also convenient if you are just starting to work in this area and you yourself can make a mistake, the result of which will be the deletion of important information.