Last updated：2020-06-03 14:20:40
|Category||Sub-category||Security protection feature|
|Login permissions||System weak password||Detect whether the system has a weak password.|
|Database weak password||Detect whether the database has a weak password. Currently, MySQL is supported.|
|Database permissions||Detect whether a system account is used to log in to a database to avoid risks caused by excessive permissions. Currently, MySQL is supported.|
|Backdoor attack detection||Webshell||Detect whether the system has a webshell.|
|Viruses||Detect whether the server has viruses.|
|System patch||Windows system patch||Detect whether a Windows server has a high-risk vulnerability, and fix a vulnerability once it is discovered.|
|Brute-force attack||FTP brute-force attack||Protect cloud servers against FTP brute-force attacks.|
|RDP brute-force attack||Protect cloud servers against RDP brute-force attacks.|
|Website security||Application vulnerability||Use the proactive defense engine to detect SQL injection and XSS attacks in real time.|
|Webshell upload||Proactively block webshell uploads.|
|CC attack||Use a unique anti-attack algorithm to effectively defend against CC attacks and various traffic attacks. Currently, Windows is supported.|
Did you find the above information helpful?
Please give us your feedback.
Thank you for your feedback.