relevancenofollow

nofollow  时间:2021-05-23  阅读:()
AnatomyofCommentSpam2014,Imperva,Inc.
1.
ExecutiveSummarySpamisdefinedasirrelevantorunsolicitedmessagessentovertheInternet,typicallytolargenumbersofusers,forthepurposesofadvertising,phishing,spreadingmalware,etc.
Byspammingmultipletargetsoveralongperiodoftime,spammersareabletogainprofit,anddoharm.
Liketheflyersinourmailboxes,digitalspamstarteditspathtogloryviaemail.
However,withtheevolutionofwebtechnologiesandwebsiteinteraction,spammershavemovedtoreachingusersviatheweb,injectingspamcommentsintoforums,commentfields,guestbooks,andevenwebsiteslikeWikipedia,whichallowusergeneratedcontenttobepublished.
Andthus,commentspamwasborn.
Commentspammersaremostoftenmotivatedbysearchengineoptimization,sothattheycanuseapromotedsiteforadvertisementandmalwaredistribution.
Attackersarealsoknowntousecommentspamforthepurposeofclickfraud.
Thecommentspamissuehasbecomesoprevalentthatorganizationsarefightingback,byimplementingmitigationservices.
Interestingly,therehavebeenincidentsofspammersfightinganti-spammersinanattempttoshutdownthosemitigationservices,andmanyofthosecounterattackshavebeensuccessful.
Wedecidedtostudythecommentspamspacefrombothends.
Inourresearch,weexaminedtheattacker'spointofview,includingthecommentspamtechniquesandtools.
Inaddition,weexaminedthevictim'spointofviewtounderstandhoworganizationsdealwithcommentspamtoday.
1.
1KeyFindingsOverthecourseoftwoweeks,fromSeptember1toSeptember14in2013wemonitoredcomment-spammeractivityagainstmorethan60differentapplications.
Herearesomeofourkeyfindings:58percentofallcommentspammersareactiveforlongperiodsoftime.
17percentofallcommentspammersgeneratedthemajorityofcommentspam.
Inordertounderstandhowacommentspammerattacksawebapplication,welookedcloselyatasinglevictim.
Thisreportincludesthiscasestudyandwhatwehavelearned:80percentofcommentspamtrafficisgeneratedby28percentofattackers.
Overtime,commentspammersincreasedtheirvelocityagainsttheattackedwebsite.
1.
2MainConclusionsOurconclusionswerestraightforward:Identifyingtheattackerasacommentspammerearlyon,andblockingtherequests,preventsmostofthemaliciousactivityIPreputationwillhelpinsolvingthecommentspamproblem,byblockingcommentspammersearlyintheirattackcampaigns2TableofContents1.
ExecutiveSummary.
12.
Introduction.
33.
TheAttacker'sPointofView.
44.
CommentSpaminPractice.
45.
TheVictim'sPointofView106.
MitigationTechniques.
126.
1ContentInspection.
126.
2SourceReputation126.
3Anti-automation136.
4Demotivation.
136.
5ManualInspection.
137.
CaseStudies.
147.
1AnalyzingaSingleVictim.
147.
2AnalyzingaSingleAttacker.
157.
3AttackersAbuseGoogleAppEngineforCommentSpam.
198.
SummaryandConclusions.
2032.
IntroductionWikipedia'sdefinitionforcommentspam1:"Commentspamisatermusedtorefertoabroadcategoryofspambotpostingswhichabuseweb-basedformstopostunsolicitedadvertisementsascommentsonforums,blogs,wikisandonlineguestbooks.
"Anexampleforacommentspammedsite:Figure1–ASpammedSiteExampleAttackersusecommentspamforvariousreasons.
Themostsignificantoneis'SearchEngineOptimization'(SEO)–improvingasite'srankingwithinasearchengineresultset(withrespecttogivensearchterms).
Asiterankingwithinasearchengineresultsetisbasedonthenumberandqualityofwebsitesthatholdlinkstoit(AKA"backlinks").
Thus,postingmanycommentscontaininglinkstoatargetsiteincreasesitsrankingwithinsearchengineresultsets(especiallywithrespecttokeywordssurroundingthelink).
Attackersthenusethepromotedsiteforadvertisement(usuallyofdubiousmerchandise)andmalwaredistribution.
AttackersarealsoknowntousecommentspamforthepurposeofClickFraud.
1http://en.
wikipedia.
org/wiki/Comment_spam43.
TheAttacker'sPointofViewThereareafewbasicstagesanattackerfollowswhenaspiringtoproducecommentspamtraffic.
Eachofthesestagescanbeperformedseparatelyandneedstobefine-tuned:TargetAcquisition(AKAURLharvesting):Thetaskoffindingqualityvulnerablewebsitestopostcommentsonisnamed"URLharvesting".
TheURL'squalityismeasuredbytherelevancetothepromotedsite;theURL'sownsearchengineranking;thedifficultyofpostingcomments(forexampleun-protectedpublicpostsorCaptchaprotectedposts)andthesite'spolicyregardingsearchengines(forexamplethefollow/nofollowvalueofthe"rel"attributeofhyperlinks).
Posting:PostthecommentsonthechosenURLs.
Verification:Verifythatthecommentswereindeedpublished.
4.
CommentSpaminPracticeTheattacker'ssuccessreliesonpublishingcommentspaminlargescales.
Largescalecommentspamisachievedbyautomatingtheaforementionedcommentingprocess.
Forthispurpose,automatictoolsweredevelopedwhichsupportthisprocessandoffercomplementaryservices.
Thetools'inputisasetofkeywordsrelevantforthepromotedsite.
Theautomatedtoolsmayencompassallofthefollowingsteps,oronlypartofthem:URLharvesting:Automatictoolsusepopularsearchenginestolocaterelevantwebsitesbasedoninputkeywords.
Uponsuccess,thetoolexploresthefoundwebsites,inordertolocatesuitableURLsforcommenting.
Blogsarethemostpopularwebsitesforcommentspamposting.
Infact,sometoolsarelimitedtoharvestingonlyblogs,andspecificallyWordPressblogs.
Figure2-AutomatedTool(G-LockBlogFinder)forHarvestingshowsanexampleofanautomatedtool(G-LockBlogFinder)whichspecificallyofferstoharvestblogs.
Theuserspecifiedaninputkeyword:"music",andthetoollocatedarelevantsetoftargets.
Figure2–AutomatedTool(G-LockBlogFinder)forHarvestingBlogs5Someattackersskiptheharvestingstage,bypurchasinglistsofhighqualityURLs–URLswithhighsearchenginerankingandwhichautomaticallyapprovecomments.
Thusmany'qualityURLs'listsareavailableforpurchaseonblackhatSEOforumsandspecificsites(Figure3showsanexample).
AtypicalpriceforaURLlistis$40forapproximately13,000URLs.
Figure3–URLListsforSaleCommentgeneration:Relevantverbalcommentsareattachedtothepromotedsitelinks.
ThisservestheSEOtechniqueandprovidesamoreauthenticcomment.
Theverbalcommentsareproducedaccordingtotheinputkeywords.
Figure4showsanexampleofacommentthatwasautomaticallygeneratedbythe'CommentBlaster'toolfortheinputkeyword'music'.
Figure4–AutomaticCommentExampleThecommentinFigure4iswrittenin"Spintax"format.
Onewaytomitigatecommentspamistoblockduplicatecomments.
Spintaxisanautomaticmethodthatwasdevelopedbyspammers,inordertoavoidthispitfall.
Theideaisforthespammertocreateagenericcommentusingaspeciallyformattedsyntax.
Thisgenericcommentcanbespunintomanydifferentcommentswithasimilarmeaning.
Figure5showsanexampleforthe"Spintaxphrase"andtheresultingcomments2.
2http://umstrategies.
com/what-is-spintax/6TheSpintaxphraseinFigure5hasafewpossiblevariations.
Foreachuniquecomment,thetoolselectsaspecificcombination.
Theresultisafull(hopefullysensible)comment.
Figure6showsanexampleofaSpintaxcreatedbyScrapeBox.
Thistoolenablestheusertoinputakeyword,orinput/edittheSpintaxitself.
Figure6–ScrapeBoxSpintaxExample7Posting:ToolsoffertoautomaticallypostcommentsonmanyURLsatonce.
Sometargetsrequiredifferentformstobefilledinordertosubmitcomments,suchas:userauthentication,Captchaformsoruserdetails.
Sophisticatedtoolsincorporateservicestohandlethesechallenges.
Figure7showshowtoconfiguretheScrapeBoxtooltohandleCaptchachallenges.
Figure7–ScrapeBoxCaptchaSolving8Verification:Toolsprovidefeedbacktotheuserspecifyingwhetherornotacommentwasposted.
Figure8showsanexampleoftheScrapeBoxtoolstatusreport.
Figure8–ScrapeBoxPostingStatusReport9Therearemanyautomatedtoolsthatholdallorpartofthefunctionalitiesdiscussedinthissection.
ThepopularimplementationsaretheScrapeBoxtool,whichoffersallthementionedfeaturesandisshowninFigure9.
TheGscrapertoolisanewalternativethatofferssimilarfeatureswithsimilarpricing.
Figure9–AScrapeBoxScreenshotWeexploredonesideofthecommentspamattack–theattackerpointofview.
Inthenextsection,weexaminetheotherside–thevictim'spointofview.
Thisprovidesusabetterunderstandingoftheessenceoftheattack,andtheoptionalmitigations.
105.
TheVictim'sPointofViewWeobservedalargeamountofdatainordertothoroughlyunderstandthequantitativeaspectsofcommentspamtraffic.
Thedatawascollectedthroughthereal-timemonitoringofattackdataagainstmorethan60webapplications.
Wefocusedonaperiodoftwoweeks,fromSeptember1toSeptember14in2013anduseddifferentfilterstoleaveonlytrafficthatisclearlycommentspam.
Wethenanalyzedthebehavioroftheseattacksovertime,andacrosstargets.
Wealsoperformedcalculationsofstatisticalpropertiesofthemalicioustraffic.
Wediscoveredthatmostofthecommentspamtrafficoriginatedfromattackerswhohavebeenactiveforlongperiods,andattackedmultipletargets.
Toillustratetheexactrelationshipbetweenthenumberofattackedtargetsperattacksource,andthedurationoftheattacker'sactivity,wedesignedan"Attack-SourceReputationQuadrant"graph(SeeFigure10.
ThisgraphwasfirstintroducedinaourpreviousHII3).
Figure10–AttackSourceReputationQuadrantforCommentSpamInan"Attack-SourceReputationQuadrant"graph,theY-axisrepresentsthenumberoftargetsthatwereattacked,andtheX-axisrepresentsthedurationofanattack.
Accordingly,eachdotinthegraphrepresentsanattacksourceandcorrespondstothesource'slongevityandthenumberoftargetsithasattackedduringthecourseofouranalysis.
ToexpresstheAttack-SourceReputationQuadrantasagraph,weaddedtwomoredivisions.
ThefirstisaverticallinealongtheY-axiswhichseparatesattacksourcesofthoseactiveonlyduringasingleday,fromthoseactiveformorethanasingleday.
Thesecondisahorizontallinewhichsimilarlyisolatesattacksourcesthatattackedonlyasingletargetfromthosethatattackedmultipletargets.
Therearefourdifferentquadrants:Theupperleftquadrant(inpurple)includesallattacksourcesthatwereactiveforonlyonedayandattackedmorethanonetarget.
Theupperrightquadrant(inblue)includesallattacksourcesthatwereactiveformorethanonedayandattackedmorethanonetarget.
Thelowerleftcorner(inred)includesallattacksourcesthatwereactiveforonlyonedayandattackedonlyasingletarget.
Thelowerrightquadrant(ingreen)includesallattacksourcesthatwereactiveformorethanonedayandattackedonlyasingletarget.
3http://www.
imperva.
com/resources/hacker_intelligence.
asp11Toquantifythedata,we'veenhancedtheAttack-SourceReputationQuadrantwithtwopie-charts(color-codedtothequadrants,respectively):Thetoppiechartrepresentsthepercentageofattacksources,withineachquadrant.
Thebottompiechartrepresentsthepercentageoftraffic,withineachquadrant.
Figure10showsthatmostoftheattackers(72percent)areintheredzone,whichmeanstheywereactiveonlyforasingleday,andattackedonlyasingletarget.
Nonetheless,mostofthecommentspamtraffic(58percent)isinthebluezone,whichmeanstheywereactivemorethanoneday,andattackedmorethanonetarget.
Wefocusedontheupperrightquadrant(blue)andexploredthetraffic.
Wediscoveredthatarelativelysmallnumberofattackersareresponsibleforalargeamountofthecommentspamtraffic.
Figure11showsthecumulativepercentageofcommentspamtrafficfromtheattackersinthebluequadrant.
Theattackersaresortedbydominance:attacker#1producedthehighestnumberofattacksinthegivenperiod,etc.
Figure11–TheCumulativePercentageofCommentSpamTrafficThegraphshowsthat80percentofthecommentspamtrafficwasgeneratedby28percentoftheattackers.
126.
MitigationTechniquesWebsitescandefendthemselvesagainstcomment-spamattacksusinganumberofmitigationtechniques.
Following,aresomeofthepopularonesatusetoday.
6.
1ContentInspectionThecontentinspectiontechniqueisbasedoninspectingthecontentofthepostedcomments,accordingtoapredefinedsetofrules.
Rules,forexample,mightbe:toomanylinksinonecomment;logicalsentencesthatarerelatedtothesubjectathand;andnoduplicatecomments.
Insuchsystemsatradeoffexistsbetweenfalse-positiveandtrue-negativerates,dependingontherulesdefinitions.
Akismet4isacommentspamdetectionservicethatusesacombinationofmitigationmethods,amongthemthecontentbasedtechnique.
Whenusingit,eachcommentissenttotheAkismetservers.
Theserverscheckthereceiveddata,andreturnatrue/falseanswer.
Figure12–AkismetMotoContentbasedmitigationcanrelyonthereputationofthehyperlinkspostedwithinthecomments5.
Oncealinktoaspecificwebsiteappearsintoomanycommentsontheweb,orinrequeststhataresuspiciousenoughtobecreatedusingcommentspamtools,thepromotedwebsitemaygainabadreputation.
Thisreputationcanbeusedtoblockcommentscontainingthesehyperlinks.
"Penguin"6isarecentupdatetotheGooglesearchenginethatusesthiskindofinformation,andpenalizeswebsitesthatareknowntousecommentspamtools.
6.
2SourceReputationThismitigationtechniqueisbasedonidentifyingwhetheracommentisspamaccordingtothereputationoftheposter.
Sourcereputationisbasedonwhetherpreviouslyseentrafficfromthatsourcewasconsideredcommentspam.
Onlinerepositories,basedoncrowdsourcing,wereset-upforthesepurposes.
Therepositoriesareusedtobothreportspamandtocheckacommentsourcereputation.
Thetwomostpopularrepositoriesarewww.
projecthoneypots.
organdwww.
stopforumspam.
com.
Ourresearchfoundthemratherreliable.
4http://www.
akismet.
com5http://www.
securelist.
com/en/analysis/204792295/Redirects_in_Spam6http://en.
wikipedia.
org/wiki/Google_Penguin136.
3Anti-automationAnti-automationtechniquescanbeusefulforcommentspammitigation,asautomatictoolsarefrequentlyusedtoproducecommentspamtraffic.
Onesimpleoptionisaddingacheckboxtoindicatewhetherauserwishestopostacomment.
RegularlychangingtheHTTPfieldnameforthischeckboxisusefulagainstthemoresophisticatedtools.
AmorecomplexoptionisusingtheCaptcha7mechanism.
Whenusingit,eachcommentpostrequiresenteringanobfuscatedtextdisplayedonthepage.
Figure13–CaptchaChallengeforPostingaComment6.
4DemotivationThedemotivationtechniquestrivestomakecommentspamuseless.
Thiscanbeachievedbythefollow/nofollowvaluethatcanbeassignedtothe"rel"attributeofanHTMLanchor()elementwhichdefinesahyperlink8.
Itspecifieswhetheralinkshouldbefollowedbythesearchengine'sindexingalgorithm.
Settingthe"nofollow"valueforpostedcommentsdecreasesthecommentspammotivation.
ThisisdemonstratedinFigure14.
Frameworkscanusethisvaluetodemotivatecommentspammers.
Forexample,WordPress1.
5andaboveautomaticallyassignsthenofollowvaluetoalluser-submittedlinks9.
AnotherexamplefordemotivationisthePenguin10updatetoGooglesearchenginealgorithmthatfocusesondecreasingthesearchenginerankingofwebsitesthatareconsideredtousecommentspamtechniques.
6.
5ManualInspectionManualinspectionisveryeffectiveforidentifyingcommentsasspam.
Itsprimarydrawbackisitslossofscalability–asspamincreases,manualinspectionofitbecomesimpractical.
Thistechniqueiseffectiveagainstmanualcommentspam,duetotherelativelysmallamountofspamthatcanbemanuallyposted(andinspected).
7ttp://en.
wikipedia.
org/wiki/CAPTCHA8http://en.
wikipedia.
org/wiki/Nofollow9http://codex.
wordpress.
org/Nofollow10http://en.
wikipedia.
org/wiki/Google_Penguin147.
Casestudies7.
1AnalyzingaSingleVictimInordertobetterunderstandthecommentspamattackpattern,wetookacloserlookatthespamtrafficdirectedatasinglevictim.
Wechoseonewebsitethatwasreceivingagreatamountofcommentspamtraffic.
Itconsistsofasinglehost,withmanyURLs.
Thevictimisanon-profitorganizationthatsuppliesinformationandsupportsacommunityofusers.
Wegathereddataoveraperiodofonemonth,thatproduced384eventsfromSeptember1sttoSeptember30th2013.
Wediscoveredahighdiversityinthevolumeofcommentspamtrafficfordifferentpages.
OurtheoryassociatespopularphraseswithintheURLaddressandpagecontent,totheattackrate.
Wedocumentedattackson119URLs.
Figure15showsthenumberofeventsforeachURLindescendingorder,i.
e.
URLonereceivedthehighestnumberofevents,andsoon.
Figure15–URLPopularityGraphThegraphshowsthattargetonehadsignificantlysufferedmorecommentspamcomparedtotheothertargetsonthatsamehost.
Ithadapproximately10timesmoreeventscomparedtothenextURLinorder.
Apotentialexplanationcanbethattargetonecontainsthepopularphrase'weightgain'initsURLaddresswhichdrawscommentspamattackers.
Thisphraseappearsfrequentlywithinthepagesuchas"causesofweightgain"and"Howcanthisweightgainbeprevented".
15Wediscoveredthatasmallnumberofsourcesproducedmostofthetraffic.
Figure16showsthecumulativepercentageofcommentspamtrafficgeneratedbysourceIPs,tothetarget,athand.
Figure16–TheCumulativePercentageofCommentSpamTraffictoaSingleTargetWecanseeinFigure16,52percentofsourceIPsproduceapproximately80percentofthetraffic.
7.
2AnalyzingaSingleAttackerInordertothoroughlyunderstandthecommentspamtrafficwefocusedonahighlyactiveattacker,andexaminedbothitstrafficquantitativeandqualitativeaspects.
Wediscoveredthattheattackerwasactiveforalongperiod.
Weidentified61HTTPrequestsascommentspamduringaperiodoftwoweeks.
Figure17showsthenumberofrequeststheattackersenteachday,duringthosetwoweeks.
Figure17–RequestsperDayforaSingleAttackerTheattackerwasactivefortendaysandthenumberofrequestsperdayhadincreasedduringtheperiod.
Identifyingthisattackerasacommentspammerearly,andblockingitsrequests,wouldhavepreventedmostofitstraffic.
16Theattackerhadafewtargets,andmostofthemsufferedarelativehighamountofcommentspamattacks.
Theinvestigateddataincluded61eventstargetingfivedifferentwebsites.
Figure18showsthepercentageofthetrafficreceivedbyeachtarget.
Figure18–PercentageofTrafficperTargetAsshowninFigure18,mostofthetargetsreceivedroughly,anevenportionofthetraffic(exceptfromtargetfive).
Inaddition,oncetheattackerattackedacertaintarget,itwaslikelytoattackitagain,inthefollowingdays.
Forexample,theattacksontargettwohavespannedovereightdays,ofthetwoweekperiod.
Theautomatedtoolusesinputparameterswithnoreassurancetheyarebeingpubliclyavailableonthesite.
Figure19showsascreenshotofatargetedpage.
Theattacker'stargetwasthe"comments"field,howeverthecommentsareforanorderbeingmade,andwillnotbepublishedonthesite.
Webelievethishappensduetolackofverificationbytheautomatedtools–theyharvesttargetswitha"comment"parameter,anddonotverifythatthevalueisactuallybeingpublishedonthesite.
17Figure19–ACommentSpamTargetWeanalyzedthecontentofcommentsandlearnedthehyperlinksinasinglerequestarefordifferentsitesandconsecutiverequestshavesimilarhyperlinks.
Therequestsproducedbythetoolwillholdcommentscontainingdifferentwebsitestopromote.
Thosecommentswillberestructuredinconsecutiverequests,inordertoavoiddefensemechanisms.
Inthecaseathand,theattackersent48requestscontainingsevendifferentURLs.
Thecommentshaveabasicreoccurringstructure:18Error!
Referencesourcenotfound.
showstwocomments,forexample,thatholdeightURLs,withfiveuniquevalues.
Figure20–ExamplesofCommentsWhenfeedingthemtoabrowser,wesawthatsixofthemleadtothesamewebsiteofapharmaceuticalcompany(markedinyellow).
TheothertwoURLs(markedinblue)belongtoanotherwebsite.
UsingtheseURLsasjumpingboards,preventsthepromotedwebsitesfromgainingabadreputationfromusingcommentspamtools,andavoidshavingidenticalcomments(seeSection6:MitigationTechniques).
197.
3AttackersAbuseGoogleAppEngineforCommentSpamThe"GoogleAppEngine"11isaserviceprovidedbyGoogle,whichallowsuserstorunwebapplicationsonGoogle'sinfrastructure.
Oneespeciallyeasy-to-createapplicationisawebproxy,whichcanbeusedtogeneratecommentspamtraffic.
Figure2112showsaseriesofsimplestepsforcreatingaproxyusingtheGoogleAppEngine.
Figure21–StepstoTurnGoogleAppEngineintoaProxy11https://developers.
google.
com/appengine/docs/whatisgoogleappengine12http://www.
labnol.
org/internet/setup-proxy-server/12890/HackerIntelligenceInitiativeOverviewTheImpervaHackerIntelligenceInitiativegoesinsidethecyber-undergroundandprovidesanalysisofthetrendinghackingtechniquesandinterestingattackcampaignsfromthepastmonth.
ApartofImperva'sApplicationDefenseCenterresearcharm,theHackerIntelligenceInitiative(HII),isfocusedontrackingthelatesttrendsinattacks,Webapplicationsecurityandcyber-crimebusinessmodelswiththegoalofimprovingsecuritycontrolsandriskmanagementprocesses.
Inourresearch,wemonitoredalistofIPaddressesknowntogeneratecommentspam.
ThemostdominantIPinthegroupwasanaddressregisteredtoGoogleAppEngine.
ThistechniqueisusedbyspammerstobypassreputationcontrolsbasedonIPaddresses,sincemostoftenaddressesofGoogleAppEngine(andthoseofothercloudservices)areexplicitlywhitelisted.
Infact,inourowndataset,weareabletoidentifylegitimatetrafficfromthesameIPaddresswhichbelongstoadifferentapplication(forexamplethe"feedly"application13).
AmorecarefulinspectionoftherequeststructurerevealedthatanapplicationID(appID)isspecifiedintheHTTPuser-agentfield–probablyinsertedbyAppEngineinfrastructure.
8.
SummaryandconclusionsStudyingthecommentspamspacefrombothends,andtakingintoaccountallexistingmitigationtechniques,wehavecometothefollowingconclusions:Identifyingtheattackerasacommentspammerearlyonandblockingitsrequestspreventsmostofthemaliciousactivity.
IPreputationwillhelpinsolvingthecommentspamproblem,byblockingcommentspammersearlyonintheirattackcampaignsAsofApril2014,ImpervaoffersaCommentSpamIPreputationfeedthroughitsThreatRadarservices,tohelpcustomersmitigatethecommentspamproblem.
13http://cloud.
feedly.
com/#welcome

旅途云(¥48 / 月),雅安高防4核4G、洛阳BGP 2核2G

公司成立于2007年,是国内领先的互联网业务平台服务提供商。公司专注为用户提供低价高性能云计算产品,致力于云计算应用的易用性开发,并引导云计算在国内普及。目前,旅途云公司研发以及运营云服务基础设施服务平台(IaaS),面向全球客户提供基于云计算的IT解决方案与客户服务,拥有丰富的国内BGP、双线高防、香港等优质的IDC资源。点击进入:旅途云官方网商家LOGO优惠方案:CPU内存硬盘带宽/流量/防御...

wordpress外贸企业主题 wordpress经典外贸企业建站主题

WordPress经典外贸企业建站主题,经典配色扁平化简约设计+跨屏自适应移动端设备,特色外贸企业建站功能模块+在线Inquiry询单功能,更有利于Google等英文搜索优化和站点收录。采用标准的HTML5+CSS3语言开发,兼容当下的各种主流浏览器: IE 6+(以及类似360、遨游等基于IE内核的)、Firefox、Google Chrome、Safari、Opera等;同时支持移动终端的常用...

Puaex:香港vds,wtt套餐,G口带宽不限流量;可解流媒体,限量补货

puaex怎么样?puaex是一家去年成立的国人商家,本站也分享过几次,他家主要销售香港商宽的套餐,给的全部为G口带宽,而且是不限流量的,目前有WTT和HKBN两种线路的方面,虽然商家的价格比较贵,但是每次补一些货,就会被抢空,之前一直都是断货的状态,目前商家进行了补货,有需要这种类型机器的朋友可以入手。点击进入:puaex商家官方网站Puaex香港vds套餐:全部为KVM虚拟架构,G口的带宽,可...

nofollow为你推荐
汉语163loadedios机动车diandian水土保持ios8支持ipaddominavimasios7支持ipad联通版iphone4s怎么知道到苹果4s是联通版,还是移动版win7如何关闭445端口如何彻底永久取消win7粘滞键功能google中国地图谷歌卫星地图中文版下载在哪下??
qq域名邮箱 北京主机租用 踢楼 awardspace 香港机房 cpanel 海外服务器 php探针 css样式大全 华为网络硬盘 已备案删除域名 hostloc 1g空间 太原网通测速平台 如何注册阿里云邮箱 跟踪路由命令 帽子云排名 游戏服务器出租 万网空间 深圳域名 更多