21:16 阿里妈妈: SEO信息查询 - 站长实用工具 » Delicious/chedong
搜索引擎收录和反向链接数量查询;
Best practices against hackingGoogle Webmaster Central Blog » 车东's shared items in Google Reader
These days, the majority of websites are built around applications to provide good services to their users. In particular, are widely used to create, edit and administrate content. Due to the interactive nature of these systems, where the input of users is fundamental, it's important to think about security in order to avoid exploits by malicious third parties and to ensure the best user experience.

Some types of hacking attempts and how to prevent them

There are many different types of attacks hackers can conduct in order to take partial or total control of a website. In general, the most common and dangerous ones are SQL injection and cross-site scripting (XSS).

SQL injection is a technique to inject a piece of malicious code in a web application, exploiting a security vulnerability at the database level to change its behavior. It is a really powerful technique, considering that it can manipulate URLs (query string) or any form (search, login, email registration) to inject malicious code. You can find some examples of SQL injection at the Web Application Security Consortium.

There are definitely some precautions that can be taken to avoid this kind of attack. For example, it's a good practice to add a layer between a form on the front end and the database in the back end. In PHP, the PDO extension is often used to work with parameters (sometimes called placeholders or bind variables) instead of embedding user input in the statement. Another really easy technique is character escaping, where all the dangerous characters that can have a direct effect on the database structure are escaped. For instance, every occurrence of a single quote ['] in a parameter must be replaced by two single quotes [''] to form a valid SQL string literal. These are only two of the most common actions you can take to improve the security of a site and avoid SQL injections. Online you can find many other specific resources that can fit your needs (programming languages, specific web applications ...).

The other technique that we're going to introduce here is cross-site scripting (XSS). XSS is a technique used to inject malicious code in a webpage, exploiting security vulnerabilities of web applications. This kind of attack is possible where the web application is processing data obtained through user input and without any further check or validation before returning it to the final user. You can find some examples of cross-site scripting at the Web Application Security Consortium.

There are many ways of securing a web application against this technique. Some easy actions that can be taken include:
Some resources about CMSs security

SQL injection and cross-site scripting are only two of the many techniques used by hackers to attack and exploit innocent sites. As a general security guideline, it's important to always stay updated on security issues and, in particular when using third party software, to make sure you've installed the latest available version. Many web applications are built around big communities, offering constant support and updates.
To give a few examples, four of the biggest communities of Open Source content management systems—Joomla, WordPress, PHP-Nuke, and Drupal—offer useful guidelines on security on their websites and host big community-driven forums where users can escalate issues and ask for support. For instance, in the Hardening WordPress section of its website, WordPress offers comprehensive documentation on how to strengthen the security of its CMS. Joomla offers many resources regarding security, in particular a Security Checklist with a comprehensive list of actions webmasters should take to improve the security of a website based on Joomla. On Drupal's site, you can access information about security issues by going to their Security section. You can also subscribe to their security mailing list to be constantly updated on ongoing issues. PHP-Nuke offers some documentation about Security in chapter 23 of their How to section, dedicated to the system management of this CMS platform. They also have a section called Hacked - Now what? that offers guidelines to solve issues related to hacking.

Some ways to identify the hacking of your site

As mentioned above, there are many different types of attacks hackers can perform on a site, and there are different methods of exploiting an innocent site. When hackers are able to take complete control of a site, they can deface it (changing the homepage), erase all the content (dropping the tables of your database), or insert malware or cookie stealers. They can also exploit a site for spamming, such as by hiding links pointing to spammy resources or creating pages that redirect to malware sites. When these changes in your application are evident (like defacing), you can easily spot the hacking activity; but for other types of exploits, in particular those with spammy intent, it won't be so obvious. Google, through some of its products, offers webmasters some ways of spotting if a site has been hacked or modified by a third party without permission. For example, by using Google Search you can spot typical keywords added by hackers to your website and identify the pages that have been compromised. Just open google.com and run a site: search query on your website, looking for commercial keywords that hackers commonly use for spammy purposes (such as viagra, porn, mp3, gambling, etc.):

[site:example.com viagra]

If you're not already familiar with the site: search operator, it's a way to query Google by restricting your search to a specific site. For example, the search site:googleblog.blogspot.com will only return results from the Official Google Blog. When adding spammy keywords to this type of query, Google will return all the indexed pages of your website that contain those spammy keywords and that are, with high probability, hacked. To check these suspicious pages, just open the cached version proposed by Google and you will be able to spot the hacked behavior, if any. You could then clean up your compromised pages and also check for any anomalies in the configuration files of your server (for example on Apache web servers: .htaccess and httpd.conf).
If your site doesn't show up in Google's search results anymore, it could mean that Google has already spotted bad practices on your site as a result of the hacking and may have temporarily removed it from our index, due to infringement of our webmaster quality guidelines.

In order to constantly keep an eye on the presence of suspicious keywords on your website, you could also use Google Alerts to monitor queries like:

site:example.com viagra OR casino OR porn OR ringtones

You will receive an email alert whenever these keywords are found in the content of your site.

You can also use Google's Webmaster Tools to spot any hacking activity on your site. Webmaster Tools provide statistics about top search queries for your site. This data will help you to monitor if your site is ranking for suspicious unrelated spammy keywords. The 'What Googlebot sees' data is also useful, since you'll see whether Google is detecting any unusual keywords on your site, regardless of whether you're ranking for them or not.

If you have a Webmaster Tools account and Google believes that your site has been hacked, often you will be notified according to the type of exploit on your site:
Hacked behavior removed, now what?

Your site has been hacked or is serving malware? First, clean up the malware mess and then do one of the following:
We hope that you'll find these tips helpful. If you'd like to share your own advice or experience, we encourage you to leave a comment to this blog post. Thanks!

Posted by Paolo Petrolini and Iris Mariano, Search Quality Team
电脑时区选择中没有北京的问题Blog on 27th Floor » 车东's shared items in Google Reader
安装Linux的时候要选时区,在下拉列表中就会发现,里面没有北京,却有上海和重庆,还有乌鲁木齐。为什么呢?这个问题一直没有得到解答。日前有空,上网搜了一番,基本有了答案。

电脑里用时区这个东西,历史并不长,按Wikipedia的说法,最早应该是在1986年,一位叫做Arthur David Olson的人整理了这个时区数据库。时区定义为1970年以来使用同一时间的国家或国家下面的地区。目前它的编辑和维护者叫Paul Eggert。这个项目每年发布数次,包括程序代码,用于编译使用这个数据库,还有数据本身。这些数据极其代码,全部放在公共领域,也就是任何人不占有其版权,任何人可将它用于任何目的。

这些数据在GNU c里面,在各种Linux/Unix系统里面都用得到,比如Debian GNU/Linux系统上就放在/usr/share/zoneinfo下面,但这里的数据都是编译过的二进制数据,看不出什么来。但网上也可以浏览这些时区,比如Wikipedia提供的时区列表,还有PHP这个编程语言也提供

从中就可以看出,代表中国的共有5个城市,分别是哈尔滨、上海、重庆、乌鲁木齐和喀什。这是为什么呢?

继续看Wikipedia,原来在1949年以前,天朝一共有5个时区,分别以这5个城市为代表,分别是:长白时区GMT+8:30、中原标准时区GMT+8、陇蜀时区GMT+7、新藏时区GMT+6和昆仑时区GMT+5:30。这是1912年北京观象台制订,并在后来由内政部批准过的。

天朝还是挺大的。但实际上跑到拉萨去似乎也感觉不到有什么不妥,也许是大家自然而然地起晚了?反正没有什么感觉。但据说电信服务设定优惠时段到西部就要顺延2个小时。

还有一次,记得是老虎庙老师的blog上曾经发表过他在北京同西安之间进行视频通话的照片对比,北京天已经黑了,西安还很亮。

中原地界很大,但真考查起城市来,确实上海名气更大,尤其是在国际上更是如此。之后全国采用+8的时间,也自然是上海了,其他4个城市仍然保留,也算是很有历史意义。据说也有人大代表提议多划时区。

对于自己的城市不在列表中这个大问题,许多人都有异议,但既然这些数据都是公开的,也就可以打造自己的时区列表,把自己的城市也加上就是了。LinuxJournal这篇文章就讲了怎么把自己的城市加入时区列表的做法

到/usr/share/zoneinfo或/usr/lib/zoneinfo目录下,将Asia/Shanghai拷贝为Asia/Beijing,因为时区是一样的,数据也就用一样的。

编辑zone.tab文件,还是找到刚才copy的城市再copy一行,只是其中的数字代表城市的经纬度,这个要修改正确。

然后再登录进来就能在选时区的地方看到自己的城市了。
cathayan.org 版权所有。
01:40 AdSense for domains 最新更新 » Google AdSense 中文博客


我们前些天发布了新产品 AdSense for domains,但是我们发现这一产品存在与中国域名提供商的兼容性等技术问题,所以一些发布商无法投放AdSense for domains 广告。我们目前正在与技术部门解决这一问题,有进展时我们会第一时间在这里通知各位发布商。在此之前,请大家暂停使用这一产品。

给大家带来的不便,我们十分抱歉,我们会尽快解决,感谢大家的理解!

AdSense 中文小组

^==Back Home: www.chedong.com

^==Back Digest Home: www.chedong.com/digest/

<== 2009-02-19
  二月 2009  
            1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28  
==> 2009-02-21