Google Chrome Default non-Secure port list, build a site to recommend avoiding the following ports as far as possible: 1,//Tcpmux 7,//Echo 9,//Discard,//systat,//daytime,//netstat,//QOTD 19 ,//Chargen,//FTP data,//FTP access,//SSH,//Telnet,//SMTP PNS,//Time 42, Name,//nicname,//Domain,//PRIV-RJS,//finger,//Ttylink,//Supdup 101, Hostriame 102,//ISO-TSAP 103,//GPPITNP 104,//Acr-nema 109,//POP2,//POP3 111,//SUNRPC 113, Auth,//SFTP 117,//Uucp-path 1
Linux management LinuxEncrypt before sending data, more secureOneOnline Encryption ToolAsymmetric key pair encryption installationdefault InstallationOpenSSHStartdefault boot from bootServicesshdRestartconfiguration file/etc/ssh/sshd_configTwoSSH remote secure onlineMaster ssh User name @ipThreeSCP Network replication, network File transferMaster1Download SCP User name @ip: path Local Path (SSHCP) source File Target directorySCP[Email protec
July 23 software Distribution management artifact Secure Delivery Center Free Technology Exchange application, MyEclipse original manufacturersA license is required for each software installation. SDC's licensing maintenance does not require the administrator to enter the license key on each desktop to activate the software, nor does the end user have to enter the key. Licensing and activation is done in SDC.In this tutorial, you will learn to:
This article mainly introduces the php mkdir () function to create secure permission settings for folders. in this case, the system umask affects the specified permission parameters of mkdir, which is smaller than expected, there is no such problem when using the chmod function. if you need it, refer to the following problem description:
Use the following php code to create a directory. the expected permission for the directory is 0777, and the actual
PHP generates a random password, easy and fast, can randomly generate a secure and reliable password, I hope this article will be helpful to everyone.
PHP generates a secure random password program instance code as follows:
Header ("Content-type:text/html;charset=utf-8");
function Getrandpass ($length = 6) {
$password = ";
Add the characters you want to the following string, which is the number 0-9 and
PHP Secure Programming: Session Data injection. PHP Secure Programming: Session Data injection is a problem similar to session exposure. This type of attack is based on your WEB server. in addition to having read permission on the session storage directory, there are also PHP Security programming: Session Data injection.
Session injection is a problem similar to session exposure. This type of attack is bas
permissions under the Database Directory.
Do not grant the process permission to all users. The output of mysqladmin processlist shows the current query body. if another user sends an UPDATE user SET password = PASSWORD ('not _ secure ') query, it may be viewed by any user who promised to execute that command. Mysqld reserves an additional connection for users with process permissions so that a MySQL root user can log on and check, even if all the no
: This article mainly introduces how to use PHP to implement an efficient and secure ftp server (1). If you are interested in the PHP Tutorial, refer to it. Abstract:
This article mainly describes how to use the swoole extension of PHP to implement ftp servers, while also extending the ftp server's personalized functions and security. Implement an ftp server that is fully controlled by you and customize the ftp server.
Body:
The FTP server must be fa
SSH is the abbreviation for secure Shell, developed by the IETF Network Working Group, and SSH is a security protocol based on the application layer and transport layer. SSH is currently a more reliable protocol that provides security for Telnet sessions and other network services. The use of SSH protocol can effectively prevent the information leakage in the remote management process. SSH was originally a program on a UNIX system, and later expanded
How to implement a PHP framework series article "5" Secure processing input,
All external input parameters should be checked for legitimacy.
Improper processing of input data can lead to vulnerabilities such as SQL injection.
The framework provides a series of functions to take values from $_request
Requestint
RequestString
Requestfloat
Requestbool
PS: Note that variable types in $_request may be arrays
If the request is i[]=1, then the value of $_
In addition, the current noisy and vigorous SQL injection also has a lot of use in PHP, so to ensure security, PHP code is written on the one hand, PHP configuration is very critical.
We PHP hand-installed, PHP default configuration file in/usr/local/apache2/conf/php.ini, we mostly want to configure the content in PHP.ini, let us execute PHP can be more secure. The security settings throughout PHP are primarily designed to prevent Phpshell and SQL inj
If there are only two types of codes, is this function safe? If only gbk and UTF-8 are supported, can we use the following function to determine whether the encoding format is secure? PHPcodefunctioncheckEncoding ($ str) {$ sjson_encode ($ str); $ csubstr ($ s,); if ($ c quot; ufe only supports two types of encoding, is this function safe?
If only gbk and UTF-8 are supported, can we use the following function to determine whether the encoding format
plaintext algorithm, so in fact can only say anti-gentleman may wish villain, so there is a security control, the sole purpose of the control is to use 2 code to hide the encryption algorithm, do not know the algorithm, it is difficult to crack the original text.The second dimension is the time, if the password same encryption results will be the same, then in the case of not using the original text, you can use the encrypted data to simulate the user login action is also possible, so pure pass
otherwise, there will be a prompt error, the general error message will contain the PHP script current path information or query SQL statements, etc.Information, this type of information is not secure after it is provided to the hacker, so the general server recommends that you suppress the error prompt: Display_errors = Off If you are trying to display an error message, be sure to set the level of display errors, such as displaying only the warning
PHP Secure E-mails
In the previous section of the PHP e-mail script, there is a vulnerability.
PHP e-Mail injectionFirst, take a look at the PHP code in the chapter:The problem with the above code is that an unauthorized user can insert data into the header of the message by entering the form.What happens if the user adds the following text to the e-mail message in the form's input box?[Email protected]%0acc:[email protected]%0abcc:[email
Sevlet is single-threaded or multi-threaded, how to Write a secure servlet programThe first is clear: the servlet is a single instance, that is, there is only one instance for the same business request. Different business requests can be distributed to produce multiple instances.Second: The reason of single instance I think because a single instance can handle a request, just like Ibatis's Querydao, Updatedao are single-instance.Again: Why a single in
a critical situation. Especially kindergarten or elementary school students ~Package Com.zhy.concurrency.cyclic;import Java.util.concurrent.brokenbarrierexception;import java.util.concurrent.cyclicbarrier;/** * Secure Access System * * @author Zhy * */public class cyclicbarriertest{/** * Total number of students */private Final int student_count = 10;/** * When the person is aligned. Own initiative Open Door program */final cyclicbarrier barrier = n
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.