Always do more backups at the end, in case of errors there is still a chance to remedy them. The thoughts were all simple when everyone first started building websites. At that time, everyone had great dreams and ideas, though they were scattered and not very comprehensive. Initially, the purpose was simple, and the wishes were beautiful: to make more money through the websites they built.
After downloading a website source code online, such as for Fuzhou website construction, it was actually to optimize the website. And it wasn't downloaded from the official website but slightly modified by oneself. The first website began operations, but in fact, everything encountered many setbacks: no IP, no profit, and even being penalized several times, which was quite frustrating. All the data and content added with much effort were penalized. Why was the website always attacked? Why was it constantly hacked? I kept thinking about ways to solve these problems. I thought it was due to some fault in the pages I made. For the first penalty, I didn't think too much about it. Perhaps it was because I didn't prevent SQL injection, so after revising several pages, I started adding data again. But by the next day, 360 Security kept reporting errors. After analyzing it, the site was penalized again. Luckily, the loss wasn't significant this time because I had learned from past failures and asked many space service providers. So here's my summary:
Whether it's your own code or not, the website must first be well-prepared against SQL injection attacks (Fuzhou Network Company). Also, during the process of making the network, analyze whether the downloaded code might have errors. It's recommended to download from the official website first, then from other websites. Downloads from other places may be pirated and modified, making it easier to be deceived. Although I can't rule out this possibility now, before using it, I carefully analyzed its code to see if there could be any backdoors.
In fact, modifications to the source code are also necessary, including changing table names in the database. To reduce workload, relevant software can be used for batch modification of the source code. Since it's open-source, anyone, including hackers, can download it and use it to attack your website.
It's essential to conduct detailed research before the website goes live. Use source codes with fewer errors as much as possible, and promptly fix any vulnerabilities. Today, I checked the version I'm using, and found that there are a lot of vulnerabilities.