Dog Chen Fen: Safeguarding Cyber ​​Security in Three Steps

Dog Chen Fen: Safeguarding Cyber ​​Security in Three Steps The 7th China IDC Industry Annual Grand Ceremony (http://) takes the theme of “fine operation and innovation service”, gathers domestic and international telecommunication experts, senior Internet professionals, and industry elites to conduct in-depth analysis and discussion on issues such as the fine-grained operations of the IDC industry. The conference will be held on January 16-18, 2013 at the National Convention Center.

Recently, Chen Fen, Technical Director of Security Dogs, was invited to attend the IDC Grand Press Conference Room.

When asked how to deal with the main security problems encountered by current servers and websites, Chen Fen said that server security and website security are a comprehensive system engineering, there is no absolute security, only relative security, webmasters and friends can Starting from the following three aspects, do a good job of the security of the server and the website: First, the security of the server environment; Second, the security of the website; Third, the website's own security.

Chen Fen, Technical Director of Security Dogs, began to research and develop server security software in 2007. He has been focusing on this field and has published three individual patents and won the third prize of Xiamen Science and Technology Progress Award. In 2010, he led the team to focus on the development of security dog ​​software, and committed to developing the security dog ​​into the most comprehensive security software and service provider in the field of server security.

China IDC Circle: What are the major security issues currently encountered by servers or websites? How big is its impact? How should we respond?

Chen Fen: This year, many major websites have caused sensational social security incidents. For example, the passwords of many community websites have been leaked, and a group of government agencies such as the Family Planning Commission, the Personnel Examination Bureau, the Civil Affairs Bureau, and the China Blue Association have been tampered with. All these reflect the serious situation of the current Internet security. Cyber-attacking behavior has gradually become a means for young people to compete and pride themselves, and it has also become an important means for illegal elements to seek illegal interests. It is understood that in 2011, public security agencies throughout the country investigated 27,000 network-related cases, and arrested 58,000 suspects involved in network-related crimes. If the security situation is not well prevented and controlled, it will have a serious impact on the development of the Internet industry.

Security dogs have helped hundreds of thousands of webmasters and server administrators improve the security defense capabilities of their servers and websites since they went online. They have resisted the detection and invasion of criminals and successfully intercepted 457,595,018 intrusion attacks. According to the security dog ​​user feedback data, we ranked the user's most concerned about the site and server security issues: DDOS attacks, the site was tampered with, the site is sensitive to data is downloaded, the site is linked to the horse, the site is injected into the attack and so on.

China IDC Circle: How should users respond to these security issues?

Chen Fen: Server security and website security are a comprehensive system project. There is no absolute security, only relative security. Many sensational attacks in this year are directed against some big websites. As our common users, we are most important to do our usual preventive work and try our best to minimize losses. Security dog ​​software, the purpose of development is to hope that the majority of users can help improve the prevention capabilities in this area.

Webmasters and friends can start from the following aspects, and do a good job of server and website security: Server environment security: Web site security can not be separated from the security of the server where the site is located, so to ensure the security of the server. First of all, we must make the server system security settings, and secondly we must close unnecessary ports and unnecessary services. Website permission security: The permissions of the website must be controlled. Generally, we need to establish a separate user for the website. Website's own security: Attacks that generally target websites include SQL injection attacks, cross-site scripting attacks (XSS), and hackers uploading nets and horses to upload vulnerabilities, hanging horses, hanging black chains, and tampering. To avoid these attacks, you can take several measures: ensure the security of the website code itself, strictly limit the suffix of the uploaded file, and use third-party defense tools to protect it, such as website security dog ​​software.

China IDC Circle: It is reported that security dogs have been focusing on the security field and doing some research and development. What are the major aspects involved? What is the customer group facing?

Chen Fen: Security dog ​​software has been dedicated to solving server security and website security problems. Currently, security dog ​​products include server security dogs, website security dogs, and security dog ​​cloud center and a series of server-oriented and website security software.

With servers and websites, there is a market for security dog ​​software. Through market research and pre-market promotion work, we divided the target users into the following four groups: station owners, IDC operators, corporate users, and government users.

China IDC Circle: Where is the difference between security dog ​​software and traditional antivirus software? What are the main highlights or features of security dog ​​software? At present, there are many security softwares that are free. What are the free services for security dog ​​software?

Chen Fen: The security dog ​​is actually a security software. We have the same point with traditional antivirus software. We use the system driver layer to develop various active defense functions, such as DDOS firewall, ARP firewall, system account protection and file system. Protection and so on. The difference is that traditional anti-virus software is more biased toward internal rules, such as virus databases and some behavioral features to control and kill viruses. The security dog, in addition to some internal rules, opens up more interfaces for users to customize the rules to meet their own requirements, especially for server security defenses.

Security dog ​​provides the concept of free high-quality products and services. Users can download and install the software directly on our official website. If any problems related to security dog ​​products are encountered during use, we can obtain our customer service personnel and technology. Support staff help. Second, our products use a kernel-driven approach, minimizing resource consumption, and maximizing the protection of servers and websites without affecting server and website operations. Again, for most personal webmasters who are not familiar with server security configuration, we strive to make the product simple, fast, and foolproof server security software that can be used without any configuration after installation.

Current server security dog ​​and website security dog ​​all functions, such as kernel driver-based anti-DDOS attack, anti-ARP attack, anti-WEB CC attack, kernel drive-based file system active protection, kernel-driven server-based active defense, network Horse scanning and killing, net and horse active defense, anti-SQL injection function, anti-XSS cross-site attack function, anti-theft chain anti-download, these features, we promise to be permanently free. After the cloud center is on the line in the future, we will provide web page tamper protection, server emergency response and other charging functions to meet the needs of some high-end users.

China IDC Circle: In recent years, the development of cloud computing in China has been in full swing and has become a trend. How do security dogs cater to such a situation? Or where are the security dogs and cloud computing? It is reported that the security dog ​​has recently launched the Cloud Security Center platform. Can you briefly introduce it?

Chen Fen: Cloud security is an extension of cloud computing. Cloud security needs to address the security of data stored on a large number of distributed computers, the defense against hacker attacks, and the security of user privacy. This requires companies that provide cloud computing security to be powerful. Security core technology, sufficient user base and strong financial support. The security dog ​​cloud security system “Secure Dog Cloud Security Center” is a SaaS+C (Cloud + End) security platform that implements SaaS-based server and web site active monitoring, active defense, and active alerting. Security dog ​​cloud + end mode refers to the security dog ​​cloud security center + has hundreds of thousands of users of security dog ​​software. The “cloud” refers to the security dog ​​cloud security center, which is a cloud security platform that has been carefully developed by the security dog ​​team over the past year and that is built using cloud computing technology: the “end” refers to the security dog ​​software, which has been on the line since It has grown to hundreds of thousands of customers and grows at tens of thousands of levels every month. With the large accumulation of software customer data, the "cloud identification" of the Security Dog Cloud Security Center can accurately and quickly determine the new Trojans, net horses and attack characteristics, and the results of the identification will reach all users within a very short time.

China IDC Circle: The 7th China IDC Industry Annual Grand Convention is coming soon. What expectations do you have for this session of the General Assembly?

Chen Fen: IDC Industry Annual Ceremony is an annual event for IDC companies. First of all, I would like to thank IDC Circle for the efforts and efforts that IDC and related companies have made over the years. Let these companies have the opportunity to come together each year to communicate new technologies and new technologies. The model, talk about cooperation and development, IDC industry annual ceremony made an undeniable contribution to the development of IDC industry.

The theme of this conference is "fine operations, innovative services". We also hope that through this conference, we will learn together with IDC companies and apply "fine operations and innovative services" to the day-to-day management of enterprises. Enhance the company's core competitiveness and contribute its own strength to the development of the industry.

As a provider of cloud computing security products, security dogs hope to communicate with more companies and understand their needs during this conference, and discuss with them the better security solutions in the new situation. Cloud computing is an important direction for future development. Cloud security is an important condition for whether cloud computing can be healthy and long-term development. We hope to collaborate with more cloud computing providers and cloud security providers to accompany the development.

Finally, I would like to thank IDC for the opportunity to give security dogs, and I wish the IDC industry annual grand ceremony to be successfully and successfully held.

Roll Holder

Roll Holder,Toilet Roll Basket,Tissue Paper Stand,Wall Mounted Toilet Roll Holder

Heshan Jasupi Sanitary Ware , https://www.jasupifaucets.com

Posted on