The harm and solution of global asa Trojan horse hanging on the website
during this period of time, found that several customer websites were black, and these sites appear in the case of Web root directory is more than a document, the name is global.asa. Here we do a special analysis of global.asa Trojan horse:
one, the website is hanged the harm of global.asa Trojan
site is hanging global.asa Trojan, especially if one does not understand the network marketing, do not understand the site optimization of the people, basically have no effect, because generally does not affect the normal operation of global.asa trojan website, hackers generally use global.asa trojan is not to destroy the operation of the site, they were similar and black chain site, is generally on the website of the search engines have a very bad influence. Usually the search engine included a large number of rather baffling the site title, but the title is definitely not your website content, click on the link to the web page is still, but a different title, click on the Baidu snapshot found Baidu prompt: "sorry, you look at the page does not allow Baidu to save the snapshot, you can directly access to certain sites" yes! This shows that your site has been caught! Which is a direct consequence of the web site in the search engine ranking drop or disappear, serious will also allow visitors to access your network in the computer poisoning station when
two, why hackers use global.asa to name Trojan file
to find out why hackers use global.asa to name Trojan files, we must first understand what the global.asa file is. We can see the introduction given by experts in Baidu Encyclopedia: Global.asa file is an optional file, it can contain objects, each page can be accessed in a ASP application variable and method declarations. All legitimate browser scripts can be used in Global.asa. In Global.asa, we can tell application and session objects what to do at the start and end. The code that completes this task is placed in the event manipulator.
from the above presentation, we should conclude that the global.asa trojan is actually a script Trojan horse. So why do hackers use global.asa to Trojan? This is because the global.asa file is a special file, he can call a lot of procedures, when hackers can access the site visitors in the call to jump command function.
The realization principle of
three and global.asa Trojan horse
we learned that Global.asa files are accessed primarily on session level events and are invoked in the following three cases:
1, when Applic>