= Website Security =
* [[http://www.google.com/webmasters/tools|Google Webmaster Tools]]
* Login, then Home > Add Site. Eg: ''http://www.example.com''
* Verify:
* Traffic > Links to Your Site
* Traffic > Internal Links
* Install Lynx web browser to test site. In Ubuntu:% apt-get install lynx-cur
% lynx www.example.com
* Install a sitemap following [[http://support.google.com/webmasters/bin/answer.py?hl=en&answer=183668|sitemap standards]] (use a [[http://code.google.com/p/sitemap-generators/wiki/SitemapGenerators|sitemap generator]]):
http://www.example.com/foo.html
http://example.com/image.jpg
http://www.example.com/video123.flv
http://www.example.com/videoplayer.swf?video=123
http://www.example.com/thumbs/123.jpg
Grilling steaks for summer
Get perfectly done steaks every time
* List all files with a certain datetime stamp that match the compromised files: % ls -l -R | grep --color=auto '2011-08-02 16:18'
* List all files with a certain string inside: % grep -H -r "redeem reward" /home/tom | less
* Update server operating system. Eg. Ubuntu: % apt-get update
% apt-get upgrade
Upgrade operating system to newer version. Eg. Ubuntu: % do-release-upgrade
== References ==
* [[http://www.opinionatedgeek.com/dotnet/tools/base64decode|Base64decode for encrypted malware]]
* [[http://ddecode.com/phpdecoder|PHP Decoder: Decrypting malware]]
* [[http://stackoverflow.com/questions/5922762/eval-base64-decode-php-virus|Cleaning Eval-base64-decode PHP virus]]
* [[http://support.google.com/webmasters/bin/answer.py?hl=en&answer=183668|Creating Sitemaps]]
* [[http://support.google.com/webmasters/bin/answer.py?hl=en&answer=35769|Google: Webmaster Guidelines]]
* [[http://support.google.com/webmasters/bin/answer.py?hl=en&answer=163634|Google: Cleaning Your Site]]
* [[http://support.google.com/webmasters/bin/answer.py?hl=en&answer=2721435&topic=2371375&ctx=topic|Google: Hacked Content]]
* [[http://hakipedia.com/index.php/Local_File_Inclusion|Hakipedia: Local File Inclusion]]
* [[http://www.imperva.com/docs/HII_Remote_and_Local_File_Inclusion_Vulnerabilities.pdf|Imperva: Remote and Local File Inclusion Vulnerabilities (PDF)]]
* [[http://blog.sucuri.net/2011/02/the-attack-from-the-ccs-domains-considered-harmful.html|Sucuri: Website Attack Cleaning]]
* [[http://sitecheck.sucuri.net/scanner/|Sucuri: Website Malware Scanner]]