Assess spam damage
bookmark_borderbookmark
Stay organized with collections
Save and categorize content based on your preferences.
This step is for sites hacked to host spam, often with the warning
"This site may be hacked" displayed in search results. It's one of the
longest steps in the recovery process. In this step, you'll compile a list of
the damaged files on your site. You'll use this list in a later step,
Clean and maintain your site.
Because certain hacking campaigns affect hundreds and thousands of sites in
similar ways, they can be cleaned up using a set of specific steps. If any of
these hacking campaigns describe the hack on your site, click through to read
the guide.
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2015-01-01 UTC.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2015-01-01 UTC."],[],[]]