Naming Protection

Naming protection is used to prevent the creation of directories or files with specified names, such as blocking PHP files in the uploads directory to stop hackers from uploading web shell files.

Friendly Reminder: The system will not modify or delete any existing files—it only blocks new creations.



1. Protected Directory

Enter the directory to protect (e.g., d:\wwwroot\*).

Note: Only directories can be specified!



2. Block Directorys

Specify directory names to block.

Supports full or partial names (use * for wildcards).

Entering * alone blocks all new directory creations.


Examples:

upload    Blocks creation of directories named upload.

web*   Blocks directories starting with web (e.g., webdata, web_backup).

*.php   Blocks directories ending with .php (e.g., malicious.php).

*upload*   Blocks directories containing upload (e.g., upload, myuploads).



3. Block Files

Specify file names to block.

Supports full or partial names (use * for wildcards).

Entering * alone blocks all new file creations.


Examples:

web.config    Blocks creation of files named web.config.

web*   Blocks files starting with web (e.g., web.txt, web_backup.zip).

*.php   Blocks files ending with .php (i.e., PHP files).

*.asp*   Blocks files containing .asp (e.g., 1.asp, 1.aspx, malicious.asp.txt).



4. Block Bad Files

Malformed files/directories are those that cannot be created, viewed, or deleted via normal operations, often crafted by attackers.

Note: This feature is only available on Windows.


5.png

<< Tamper Protection