当前位置:网站首页>How to prevent malicious crawling of information by one-to-one live broadcast source server
How to prevent malicious crawling of information by one-to-one live broadcast source server
2022-07-03 23:06:00 【Cloudleopard network technology】
In the process of running the one-to-one live broadcast source code , The generated data will be stored on the server , For any platform , Data security is the problem that needs to be solved most in data storage . Except for malicious access 、 Domain name hijacking and other data problems , Some crawlers will crawl website information maliciously , At this time, it is necessary to intercept , Prevent data leakage .
The one-to-one live broadcast source code can be configured on demand nignx The environment and Apache Environmental Science , Achieve interception , The specific operation steps are as follows :
One 、Nginx Environment :
1. create profile
For example, enter nginx Install under directory conf Catalog , establish : test…conf
The contents are as follows :
# prohibit Scrapy Wait for the tool to grab if ($http_user_agent ~* (Scrapy|Curl|HttpClient)) {
return 403;
}
# Prohibit designation UA And UA Empty visit
if ($http_user_agent ~ "WinHttp|WebZIP|FetchURL|node-superagent|java/|
FeedDemon|Jullo|JikeSpider|Indy Library|Alexa Toolbar|AskTbFXTV|AhrefsBot|
CrawlDaddy|Java|Feedly|Apache-HttpAsyncClient|UniversalFeedParser|ApacheBench|
Microsoft URL Control|Swiftbot|ZmEu|oBot|jaunty|Python-urllib|
lightDeckReports Bot|YYSpider|DigExt|HttpClient|MJ12bot|heritrix|EasouSpider|Ezooms|BOT/0.1|
YandexBot|FlightDeckReports|Linguee Bot|^$" ) {
return 403;
}
2. Import the configuration file created above into the website configuration file
Include test.conf;

3. restart nginx Services take effect
systemctl restart nginx
Two 、apache Environment
1、 modify httpd.conf The configuration file
Add the following code , restart Apache take effect
Shell
DocumentRoot /home/wwwroot/xxx
SetEnvIfNoCase User–Agent “.*(FeedDemon|Indy Library|Alexa Toolbar|AskTbFXTV|AhrefsBot|CrawlDaddy|CoolpadWebkit|Java|Feedly|UniversalFeedParser|ApacheBench|Microsoft URL Control|Swiftbot|ZmEu|oBot|jaunty|Python-urllib|lightDeckReports Bot|YYSpider|DigExt|HttpClient|MJ12bot|heritrix|EasouSpider|Ezooms)” BADBOT
Orderallow,deny
Allow fromall
deny fromenv=BADBOT
3、 ... and 、 test
1、 Use curl -A Simulate grabbing , such as :
curl -I -A 'Spider' www.test888.cn
give the result as follows :
[[email protected]]# curl -I -A 'Spider' www.test888.cn
HTTP/1.1 403 Forbidden
Server: nginx/1.12.0
Date: Wed, 24 Apr 2021 11:35:21 GMT
Content-Type: text/html
Content-Length: 169
Connection: keep-alive
above , It is the one-to-one live source code that intercepts the content of information crawled by crawlers , Preventing malicious crawling is just one of the security strategies to ensure data security , To learn more about security policies , You can pay attention to the following content .
Statement : The above content is original by cloudleopard technology , Without the author's consent , Prohibited reproduced , Otherwise, relevant legal liability will be investigated .
边栏推荐
- Arc135 partial solution
- [15th issue] Tencent PCG background development internship I, II and III (OC)
- Exclusive download! Alibaba cloud native brings 10 + technical experts to bring "new possibilities of cloud native and cloud future"
- finalize finalization finally final
- FPGA tutorial and Allegro tutorial - link
- 1 Introduction to spark Foundation
- 4 environment construction -standalone ha
- 3 environment construction -standalone
- Recursion and recursion
- Why should enterprises do more application activities?
猜你喜欢

How can enterprises and developers take advantage of the explosion of cloud native landing?

Ningde times and BYD have refuted rumors one after another. Why does someone always want to harm domestic brands?

Pointer concept & character pointer & pointer array yyds dry inventory

Scratch uses runner Py run or debug crawler

3 environment construction -standalone

webAssembly
![[network security] what is emergency response? What indicators should you pay attention to in emergency response?](/img/ff/c733ffbb922760910ab09af3ae2886.jpg)
[network security] what is emergency response? What indicators should you pay attention to in emergency response?
![[note] IPC traditional interprocess communication and binder interprocess communication principle](/img/f6/36c28df02198539e27352e3cdf4ba6.jpg)
[note] IPC traditional interprocess communication and binder interprocess communication principle
![Buuctf, web:[geek challenge 2019] buyflag](/img/02/d3add04f8145621bff35d46b82ba53.jpg)
Buuctf, web:[geek challenge 2019] buyflag

Programming language (2)
随机推荐
The difference between single power amplifier and dual power amplifier
Learning methods of zynq
Take you to master the formatter of visual studio code
How to connect a laptop to a projector
FPGA tutorial and Allegro tutorial - link
[note] glide process and source code analysis
3 environment construction -standalone
To rotate 90 degrees clockwise and modify the video format
Pointer concept & character pointer & pointer array yyds dry inventory
Leetcode: a single element in an ordered array
2022.02.13
Hcip day 16 notes
File copy method
How to solve the problem of computer networking but showing no Internet connection
Flutter internationalized Intl
LeetCode 1647. Minimum deletion times of unique character frequency
Blue Bridge Cup -- Mason prime
Summary of basic knowledge of exception handling
How can enterprises and developers take advantage of the explosion of cloud native landing?
string