Web spoofed prevention Solving Escape from disaster attackers to consciously and unconsciously leave the attacker's error web page. There are several ways here. Access Bookmark or use the "Open location" provided in your browser to enter the other web page, leave the traps set by the attacker. However, if the user uses the "Back" button, the original error web page will be re-entered. Of course, if the user holds the incorrect web that is accessible to Bookmark, the next time you may enter the trap set by the attacker. It is recommended to discover and punish an attacker through tracking attackers. In this way, if an attacker wants to make a web spoof, then it is inseparable from the help of the web server. However, the Web server they use is likely to be the product after being attacked, just like a car who is driving theft. Prevention WEB spoof is a deception that is quite dangerous and not easy to be perceived today. Fortunately, some of the protection we can take. Short-term solutions In order to achieve short-term effects, it is best to prevent from the following three aspects: 1. Prohibit JavaScript function in the browser, then all kinds of rewriting information will be protracted; 2. Make sure the browser's connection status is visible, It will give you all kinds of information for the current location; Now, JavaScript, ActiveX, and Java offer more and more powerful features, and more and more gratifying activities provide a powerful means. In order to ensure safety, it is recommended that users consider prohibiting these functions. In doing so, the user will lose some functions, but it is compared to the consequences that may bring, everyone will give their own conclusions. Long-term solution 1. Change the browser to make it a function of reflecting the real URL information without being blinded; 2. For web-browser conversations created by secure connection, the browser should also tell the user who is in another One end, not just a safe connection. For example, after the secure connection is established, a prompt message "Netscapeinc." And so on. All solutions can be selected based on user security requirements and actual conditions.