Organize some PHP development security issues
PHP gives developers a great deal of flexibility, but this also poses a potential risk to security issues, the recent need to summarize the past problems, here to lend a translation of an
Organize some PHP development security issues
PHP gives developers a great deal of flexibility, but this also poses a potential risk to security issues, the recent need to summarize the past problems, here to lend a translation of an article at the
I. filter input and avoid output
Sometimes the phrase "filter input and avoid output" is abbreviated as FIEO, which has become a security mantra for PHP applications.
1. Use ctype for verification
Ctype: http://php.net/ctype
2. Use PCRE
Other frameworksOther web development frameworks
Symfony cmf-Create a custom CMS Content management framework
KNP rad bundle-symfony 2 Fast Application (RAD) Pack
Framework ComponentsStandalone components from the Web development
Source: chinaaspThis article is translated because the current articles on CGI security are all examples of Perl, and there are few articles specifically about asp,php or JSP security. Shaun Clowes This article more comprehensive introduction of PHP
If you can remember early Web application development using C to develop CGI programs, it will certainly be a tedious form of processing deep experience. When the PHP register_globals configuration option is turned on, the complex original form
Over the years, PHP has been a stable and inexpensive platform for running web applications. Like most web-based platforms, PHP is vulnerable to external attacks. Developers, database architects, and system administrators should take preventive
User-submitted data
The major weakness of many PHP programs is not the problem of the PHP language, but caused by the low security awareness of programmers. Therefore, you must always pay attention to the possible problems in each piece of code to
The check item marked with (*) indicates that this item is a fundamental solution to the problem and should be done with the best effort to complete the content. If the project is not marked (*), it indicates that this item cannot completely
Source: canbeing
As one of the most widely used CMS in China, DedeCms often exposes vulnerabilities. The impact of each vulnerability is a large piece, which is easily caused by advertisements and pop-up boxes, the server becomes a bot and valuable
Rule 1: Never trust external data or input
The first thing that must be realized about Web Application Security is that external data should not be trusted. External data includes any data that is not directly input by programmers in PHP code.
The most controversial change in using Register Globals in PHP is that the default value of register_globals in the configuration file is changed from on to off from PHP & raquo; 4.2.0. The dependency on this option is so common that many people do
Phpinfo ()Function Description: Output PHP environment information and related modules, WEB environment and other information.Hazard Rating: MediumPassThru ()Function Description: Allows an external program to execute and echo output, similar to
MongoDB official explanation of Security Verification:
Http://www.mongodb.org/display/DOCS/Security+and+Authentication
In MongoDB, Service Startup does not have permission verification by default. In terms of security, this is definitely not
Recently, my company's servers have been marked for a while. I have never found a good solution. Now, I find some useful personal information for the moment. I also hope that some of my friends will offer a better solution. Solve the problem
//////
User-Submitted dataMany PHP programs have a major weakness is not the PHP language itself, but the programmer's security awareness is not high. Therefore, you must always be aware of the possible problems with each piece of code to discover the
Over the years, PHP has been a stable and inexpensive platform for running web applications. Like most web-based platforms, PHP is vulnerable to external attacks. Developers, database architects, and system administrators should take precautions
The server cannot prevent all security issues, such as program vulnerabilities, user input forms, and PHP file permissions. You can also use some means to confuse hackers or those with ulterior motives.
The server cannot prevent all security issues,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.