Static website hosting - Object Storage Service

You can set your bucket to the static website hosting mode. After the configuration takes effect, you can access the website respectively. For more information, see Static Website Hosting. Set website hosting Use ...

Best practices for Web application protection - Web Application Firewall

This topic describes the best practices for Web application protection based on WAF. The following aspects are protection against Web attacks, such as SQL injection, XSS, remote command execution, and webshell upload. For more information about ...

Definitions of common web vulnerabilities - Web Application Firewall

to web servers, but the attacks spread across the websites to steal the users’ sensitive account information and passwords target user groups in an SNS community. Hijacking of users’ web behaviors: An advanced type of XSS attack hijacks a ...

Politique de confidentialité du site Web Alibaba Cloud International - Legal

ès et l’utilisation du site Web Alibaba Cloud International actuellement disponible à l’adresse Web ou les Services Cloud) ; nécessaire afin que nous puissions nous conformer aux exigences légales (par exemple ...

Enable Web tamper protection - Security Center

Enterprise Edition and Pro Edition provide the Web tamper protection feature to protect your websites. To use this feature, purchase Web tamper protection licenses, and then add servers ...

WAF FAQ - Web Application Firewall

? Yes, WAF can protect any web server/applications that can be accessed through the Internet, whether it is inside or outside Alibaba Cloud. You can protect your web service in AWS, Azure, or any other ...

Log on to the web console of an SAG device remotely - Smart Access Gateway

to remotely log on to the web console of a Smart Access Gateway (SAG) device. You can set the private IP address used to remotely log on to the web console through the Alibaba Cloud SAG console. Remote logons to the web ...

Web application protection - Web Application Firewall

Web application protection provides different levels of protection policies, including loose, normal, and strict, to prevent common Web ...

Deploy a Web cluster - Elastic Compute Service

describes how to deploy a Web cluster by using Terraform. Background information In this example, the entire application is deployed in one zone, and the "Hello, World" web page can be accessed only through port 8080 ...

[Vulnerability notice] Web SQL injection vulnerability in FineCMS - Security Advisories

for some parameters, allowing attackers to construct a malicious request to start web SQL injection attacks on the website, and Web Application Firewall service to intercept the attacking code for this vulnerability. Stay tuned with the latest patches released on the FineCMS official website. ...

Call an API on the web page - OpenAPI Explorer

Open a web browser and enter https://api.aliyun.com to access OpenAPI Explorer. In the left-side navigation pane ...

Web configurations for SAG-1000 devices - Smart Access Gateway

steps that you must follow to complete Web configurations for SAG-1000 devices. Before you access Alibaba Cloud through Smart Access Gateway (SAG) devices, you must complete Web configurations for the SAG devices ...

Collect logs through Web Tracking - Log Service

Service provides Web Tracking, JS, or Tracking Pixel SDK for the preceding lightweight tracking collection. The lightweight collection solution Web Tracking in this topic only uses an HTTP GET request to ...

Web vulnerabilities - Security Advisories

information. Vulnerability threatXSS attacks are directly harmful to web servers, but they can spread from website to website to groups in an SNS community.Hijacking users’ web behaviors: An advanced type of an XSS attack can hijack users’ web ...

[Vulnerability notice] Unauthorized access vulnerability in Master Web UI in Spark - Security Advisories

DescriptionThe default port of Spark Master Web UI is 8080. The default port may allow external users to access data on the, the Spark UI uses the standard YARN web proxy and implements authentication through the installed Hadoop filters. Spark also ...

Deploy a Java Web project - Elastic Compute Service

This article describes how to deploy a Java Web project on a Linux instance with the basic configuration. This The following programs are used as examples to deploy the Java Web project: OS: CentOS 7.4 Tomcat: Tomcat ...

Web SQL injection attack - Security Advisories

DescriptionA web SQL injection attack is the process in which attackers perform unauthorized queries by tricking the database server. Web SQL injection attacks take advantage of the SQL syntax and target code defects. When the attacker is able to ...

[Vulnerability notice] Web SQL injection vulnerability in comment_manage.php in ECshop - Security Advisories

filtering policies for some parameters. Attackers can construct a malicious request to start web SQL injection attacks on the with an immediate effect. Using Alibaba Cloud Security Web Application Firewall can intercept the attacking code targeting this ...

[Vulnerability notice] Web SQL injection vulnerability in jsrpc.php in Zabbix - Security Advisories

malicious request and use the guest account permissions in Zabbix to start web SQL injection attacks on the website, and to further Use Alibaba Cloud Security Web Application Firewall to intercept the attacking code for this vulnerability. Upgrade Zabbix to ...

JSON Web Token (JWT) - API Gateway

JSON Web Token (JWT) (RFC7519) is a simple authentication method. API Gateway can host the public JSON Web Keys (JWK) of users ...