Web anti tamper system is designed for the website carefully developed a tamper protection products, the main function of the system is through the file driver technology to provide comprehensive protection for Web site directory, to prevent hackers and viruses in the directory ", electronic documents, pictures and database files of any type of illegal tampering and destroying. Tamper proof system to protect the site safe operation, maintenance of the government and the enterprise image, ensure the normal operation of the Internet business, completely solve the illegal website was revised, is efficient, safe, easy to use a new generation of web page tamper resistant products.
When deploying a web site to tamper with a standard site, the Web server and content management system follow the same machine and need to add a backup server to it. The automatic anti synchronization mechanism for web pages is completely independent of the content management system and works well with all content management systems, and the content management system itself does not need to make any changes.
标准部署图
Multiple mirror server deployments
For large web portals, there are multiple independent Web servers, and their network addresses and web content are different, and even the operating system is different. They may share a set of content management systems, and may also use different publishing systems and publishing formats. After deploying the webpage tamper proofing, all heterogeneous architectures of Web servers have been incorporated into a unified file synchronization upload management platform, that is, the backup server, through proper configuration, can realize the complex access structure of M xn.
多镜像服务器部署
Leading kernel drive protection technology
The system will monitor the program to tamper with the core operating system through the embedded kernel file driver, triggering automatic monitoring through the events of all documents, the contents of the folder (including HTML, ASP, JSP, PHP, audio, pictures, video and other file types) control the multiple attribute, through the built-in hashing algorithm, real-time monitoring if found, change, real-time blocking tampering. Through non protocol, the pure kernel safe outbound check method to check the integrity of the station content.
Fast synchronous channel processing
System uses fast synchronization channel processing, mainly used for website content update and repair files "purposes, will be particularly important for fast synchronization channel technology in multi server load balancing application, ensure the update to the Web server network website content quickly on.
Full content recovery mechanism
In order to ensure the normal operation of the website and content by all kinds of attacks do not affect the release of the website, tamper proof system in the internal implementation of a complete set of content recovery mechanism, when the "malicious destruction by accident, the system will automatically enable file security check module, the main page ID file fingerprint comparison, such as checking found file attributes change of real-time recovery from a trusted backup end, ensure the authenticity of documents.
Customer value
Effectively prevent the risk of tampering with your web pages
After the deployment of Topsec web tamper resistant system, triggering technology through the system underlying file filter driver technology and events that can be achieved when the tamper proof system to detect tampering, including protection of the file folder to add, delete, modify operation, immediately into the block. If the front end of the file is tampered with, the system will automatically recover the tampered files in a timely manner through the recovery mechanism.
Protected file diversity
Topsec web anti tamper system can not only carry out safety protection for all kinds of Web documents, effectively prevent malicious tampering, but also to the user on the Web server documents tamper blocking, for example in the annex upload pictures, audio, video and other documents. In addition to protecting the multimedia files mentioned above, files stored in non web formats can also be protected, such as common word, Excel, program code, and so on.
Easy deployment does not affect current user habits
Topsec web anti tamper system can be combined with the user's current website mode, or the existing CMS system for anti tampering system deployment, after the deployment of tamper proof, according to the publisher's operation, through the rapid synchronization tamper proof, real-time background update the web page or file synchronization to the monitoring server.
Kernel drive protection principle