The more the news system now supports online uploads to insert pictures in order to achieve better results. But the problem also came, and some pictures passed up, found that the picture is not correct, it can only be deleted in the editor, or, in addition to the system in the process of problems, resulting in the production of garbage pictures. To prevent garbage pictures and attachments from appearing in this process, many people have studied a lot
Processing based on tokens is once and for all.
Copy Code code as follows:
Prevent web pages from receding-caching is prohibited
By controlling the browser's cache and the expiration of the page, when you click the browser Back button on a new page after redirection, the page is prompted to expire, preventing the form from being submitted when it is back. But this approach is not valid for all browsers, so consider it before y
How can I set the ability to prevent the browser from automatically saving form information, such as user name, password?
Now many browsers have automatic filling function, I used the input on the autocomplete= "off", but in some browsers or was remembered the username and password, is there any more effective and easy way to prevent the browser to remember the user name and password?
1. Remember the passw
This article summarizes the way in which PHP prevents image spoofing (hotlinking). Share to everyone for your reference, specific as follows:
What is the use of picture anti-theft chain? Prevent other websites from stealing your pictures and wasting your valuable traffic. This article introduces you to the two methods of preventing picture embezzlement/hotlinking in PHP
A, Apache image redirection method
Setting the images directory does not permit
Program
Prevent SQL injection, usually a file modification is not only troublesome but also the risk of leakage, I would say how to prevent injection from the whole system.
Do the following three steps, I believe that the program will be more secure, and the entire site will be the maintenance of a simple change.
first, data validation class
ParameterCheck.cs public class Parametercheck{public
If you get a source program, your Access database's name is in a glance. Therefore, it is recommended that you set up a data source in ODBC and then write it in the program:
Conn.Open "Shujiyuan"
(3) Use Access to encode and encrypt the database files. Select the database (such as: Employer.mdb) in the tools → security → encrypt/decrypt database, and then press OK, then the "Save as after database Encryption" window appears, which can be saved as:
"Employer1.mdb"
Note that the above actio
The three major techniques used in STRUTS2:1. Data echo2. Model-driven3. Prevent duplicate submission of forms
First, data echo:1, data echo, you must use the struts tag.
2. Code Explanation:1) Action:
Go to modify page public
String viewupdate () {
///Impersonate an object (get an ID first, and then call the service query based on the ID to save the found result to the domain)
User userInfo = new User ();
Userinfo.setuser
Program
Author: Amoy Net
Source: Amoy Net
NOTE: Reprint please indicate the source
Prevent SQL injection, usually a file modification is not only troublesome but also the risk of leakage, I would say how to prevent injection from the whole system.
Do the following three steps, I believe that the program will be more secure, and the entire site will be the maintenance of a simple change.
First, the Data vali
connected to the military computer or network, Trojan virus began to wildly replicate, download secret information, and hide it in mobile storage devices. Once the mobile memory is again connected to the Internet-linked computer, the confidential information is automatically forwarded to the hacker force via the Internet. It is said that in the previous period of the Japanese "Zeus Shield" data leakage incident, the storage "Aegis" confidential information of the hard disk link to the Internet,
Enterprise how to prevent software defects, combined with my own experience to talk about: (Below is my test for several years summary, but my personal opinion)
First of all, I think the most important thing is that according to the requirements of the development of a demo, so that testers, especially users to confirm, because many users do not ask, but when your software developers to do, users based on your current software they will put forward n
First, the correct use of the computer
Since it is to prevent computer radiation, from the computer to start naturally can reduce radiation fundamentally. The old computer than the new computer radiation is strong, computer radiation is the most strong back, followed by the left and right sides, the last is the computer screen, and computer screen brighter radiation stronger ...
In addition, the use of the computer should be as far as possible with
best to turn on the write protection switch before connecting to the computer, thus cutting off the transmission of the virus from the source.
2. Install the mobile version of antivirus software. Now most well-known antivirus manufacturers have launched a special target for MP3, flash and mobile hardware and other mobile devices used anti-virus software, such as Kaspersky, Jiangmin, rising and so on. Some MP3 manufacturers are also considering integrating their products into these anti-virus t
multiple salt combination custom algorithm to prevent the encryption algorithm from being cracked.Even after the hacker gets the data, it can't see the data and minimizes the loss through "can't understand" data encryption.
Make a local offsite backup of your data.A perfect backup strategy is the last straw to keep your data safe.Recommended: Reliable local backup + remote backup storage solution
Local backupMongoDB Backup Mode
Sometimes we need to control that a record is no longer updated after the program is read, until the transaction has finished executing the release. At this point we can add the update lock to all queries that will manipulate the current record to prevent the query from being modified by other transactions. This operation only locks a row in the table without locking the entire table, and the experience is better.Test the SQL code as follows:Execute t
Regular expressions for typical SQL injection attacks:/\w* ((\%27) | ( \ ')) ((\%6f) |o| (\%4f)) ((\%72) |r| (\%52)) /ix Regular expression for detecting SQL injection, union query Keyword:/((\%27) | ( \ ')) Union/ix (\%27) | (\’) Regular expressions for detecting MS SQL Server SQL injection attacks: /exec (\s|\+) + (s|x) P\w+/ix Wait a minute..... 3. String filtering One of the more common methods: (| | Parameters can be added according to the needs of your own program) public static Boolean
normal administrative user, you can query to the data! In fact, there are many "user names" that can be injected into SQL, such as: ' or 1 or ' 1 Select * from where admin_name="or1or" and Admin_ Pass=MD5 ('ewsdfgbnvb') Special emphasis: 1, not only when the user logged in, the SQL statement can be injected, any other user's data as long as the implementation, it is possible to inject! 2, SQL injection is very harmful, and sometimes you can even delete the entire database on the server: Lik
.(2) Modify the reserved port Ip_local_reserved_ports, even if there is no conflict can be pre-set to prevent the subsequent port is occupied.Paste the reference link inside the EnglishIp_local_reserved_ports explained as follows: Ip_local_reserved_ports-list of comma separated rangesspecify the ports which is reserved f or known third-partyapplications. These ports is not being used by automatic portassignments (e.g. when calling connect () or bind (
SQLSERVER uses a password to encrypt the backup file to prevent unauthorized restoration of the database. When backing up the database, you can specify a password for the media set, backup set, or both in the backup statement, the backup set password and media password are optional. Use a password to prevent unauthorized use of SQLSERVER tools for restoration and adding backup sets to media
SQLSERVER uses a
This article reads: Repeating the form is the Web application is the most common, a lot of trouble, the user can sometimes repeatedly click the Submit button, will lead to multiple submissions, resulting in duplicate data, then how to avoid form forms multiple submissions? Here are a few ways to prevent forms from repeating submissionsfirst, there are a lot of application scenarios will encounter duplicate submission problems, such as :1, click the Su
Php method to prevent malicious page refresh
In general, malicious refresh is constantly to refresh the submission page, resulting in a large number of invalid data, below we summarize the PHP prevent malicious Refresh page Method summary.the principle of preventing a malicious page from being brushed is:Requires a validation string to be passed between pages,Randomly generates a string when the pa
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.