= Website Security = * [[http://www.google.com/webmasters/tools|Google Webmaster Tools]] * Login, then Home > Add Site. Eg: ''http://www.example.com'' * Verify: * Traffic > Links to Your Site * Traffic > Internal Links * Install Lynx web browser to test site. In Ubuntu:% apt-get install lynx-cur % lynx www.example.com * Install a sitemap following [[http://support.google.com/webmasters/bin/answer.py?hl=en&answer=183668|sitemap standards]] (use a [[http://code.google.com/p/sitemap-generators/wiki/SitemapGenerators|sitemap generator]]): http://www.example.com/foo.html http://example.com/image.jpg http://www.example.com/video123.flv http://www.example.com/videoplayer.swf?video=123 http://www.example.com/thumbs/123.jpg Grilling steaks for summer Get perfectly done steaks every time * List all files with a certain datetime stamp that match the compromised files: % ls -l -R | grep --color=auto '2011-08-02 16:18' * List all files with a certain string inside: % grep -H -r "redeem reward" /home/tom | less * Update server operating system. Eg. Ubuntu: % apt-get update % apt-get upgrade Upgrade operating system to newer version. Eg. Ubuntu: % do-release-upgrade == References == * [[http://www.opinionatedgeek.com/dotnet/tools/base64decode|Base64decode for encrypted malware]] * [[http://ddecode.com/phpdecoder|PHP Decoder: Decrypting malware]] * [[http://stackoverflow.com/questions/5922762/eval-base64-decode-php-virus|Cleaning Eval-base64-decode PHP virus]] * [[http://support.google.com/webmasters/bin/answer.py?hl=en&answer=183668|Creating Sitemaps]] * [[http://support.google.com/webmasters/bin/answer.py?hl=en&answer=35769|Google: Webmaster Guidelines]] * [[http://support.google.com/webmasters/bin/answer.py?hl=en&answer=163634|Google: Cleaning Your Site]] * [[http://support.google.com/webmasters/bin/answer.py?hl=en&answer=2721435&topic=2371375&ctx=topic|Google: Hacked Content]] * [[http://hakipedia.com/index.php/Local_File_Inclusion|Hakipedia: Local File Inclusion]] * [[http://www.imperva.com/docs/HII_Remote_and_Local_File_Inclusion_Vulnerabilities.pdf|Imperva: Remote and Local File Inclusion Vulnerabilities (PDF)]] * [[http://blog.sucuri.net/2011/02/the-attack-from-the-ccs-domains-considered-harmful.html|Sucuri: Website Attack Cleaning]] * [[http://sitecheck.sucuri.net/scanner/|Sucuri: Website Malware Scanner]]