information in the cookie, or the attacker in the forum to add a malicious form, when the user submits the form, but the message to the attacker's server, rather than the user originally thought of the trust site.How to prevent XSS:First, the code in the user input places and variables need to carefully check the length and the "First, avoid disclosing user privacy directly in a cookie, such as email, password, and so on. Second, reduce the risk of cookie leaks by making cookies and system IP b
The Site Directory file permissions settings are critical to the security of the site, the following simple description of the Site Directory file permissions of the basic settings.We assume that the HTTP server is running the user and user group is WWW, the site user is CentOS, the site root directory is/home/centos/web.1, we first set the site directory and file owners and all groups for centos,www, such
As the most popular Web server, Apache server provides better security features that enable it to respond to possible security threats and information leaks.
the security features of the Apache server
1, the use of selective access control and mandatory access control securi
Article Title: Application: Unix-based Web server security guide. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Today, with the increasing popularity of computer networks, computer security not only requires the prevention o
other editors to generate Some.asp.bak file leakage problem.
Security update
Apply all the Service packs required and regularly update the patches manually.
Installing and configuring Antivirus protection
Recommended nav 8.1 virus firewall (configured to upgrade at least once a week).
Installing and Configuring firewall protection
Recommend the latest version of the BlackICE Server Protection firewall (simple configuration, more practical)
Monitoring
Web Application Security Defense 100 TechnologyHow to defend against web Application Security is a question that every web security practitioner may ask. It is very difficult to answer. It is easy to be too superficial or theoreti
Thank you for your interest and comments. I want to use URL for security control as the basis for the security of my web application Program , there must be a lot of netizens who are puzzled, so let's explain the problem first. using URL for permission control means: 1. As I mentioned in the previous article, the nature of
window| Security | Hard drive C: Partition section:
C:\
Administrators All
Everyone without
System All
of course, this to the following directory is to be changed
C:\Windows
Administrators All
Creator owner
Not an inherited
. only subfolders and files
completely
Power Users
Modify, read and run, List folder directories, read, write
System All
Users Read and run, List folder directories, read
C:\Program Files
Everyone o
established.The main drawback: slow data, but custom-made chip, can compensate for this shortcoming to some extentKey Benefits: Improved security3. Agent-based firewallsAgents are located in the application layer, exhaustive search protocol, no ACK attack problems encountered by traditional packet filters, because ACK is not part of a meaningful application request (--not understood).An agent-based firewall can comb application-level protocols. For example, a
Currently in PHP call with ws-security support of the Web service solution is relatively small, wsf/php is a good choice, the official home page for http://wso2.org/projects/wsf/php, Here is a description of the use of wsf/php when the need to pay attention to some places;
1. The wsf/php "WSO2 Web Services Framework for PHP" is an excellent framework for Wso2.org
Anti-Black 15 tricks to protect the security of Enterprise Web Servers
Here we provide 15 protection techniques to help IIS administrators protect Web servers at a very low cost.Of course, before talking about these techniques, we should first develop a set of security policies.The first step to protect
users who manage the web site content and by the Apache user group of the Apache server. The Scripalias directory can only be accessed by CGI developers and Apache users. Only the root user can access the log directory.
3. Use special users and user groups for Apache
According to the principle of least privilege (one of the most basic principles to ensure system security, it limits the minimum permissions
Scanner and Intrusion Detection for Web Security Technology
Security scanning is an important technology in network security defense. Its principle is to perform one-by-one checks on the possible known security vulnerabilities of the target in the form of simulated attacks.
Network security has become one of the hottest topics in the Internet, corresponding to the reality, the deployment of network security, implementation has become a special concern of enterprises. So, now we can easily see each enterprise in the design of their own network, when building a corporate web site, the investment in network
parameter name.If the user has just landed on the site, then his cookie is still there, and when he can't help clicking on the link, the transfer operation will be unnoticed.Note: Of course, the case here is relatively simple, bank transfer is much safer than this.In addition to allowing users to click outside, you can also use picture, as long as the user opens this page, A transfer operation will occur.So, now many mailbox mail pictures are not displayed by default. If the icbc.com transfer
( Security.APPLICATION ): This file runs in an air application and is installed with the application's package (AIR file). By default, files in the Air application sandbox can access any file in any domain across scripts (although files outside the air application sandbox are not allowed to access air files across scripts). By default, files in the AIR application sandbox can load content and data from any domain.
Usage:if "Application" ) { //air program }[ActionScript 3.0]
Tags: SQL injectionSQL Injection VulnerabilityThe SQL injection attack is a security risk caused by the imperfect invocation scheme of SQL statement. Once the application is in the presence of a SQL injection vulnerability, it can have an impact:-The contents of the database are stolen by the outside world-Database contents have been tampered with-Login authentication is bypassed-Other, such as files on the server being read or modified, programs on t
As Web databases become more and more widely used, security issues of Web databases become increasingly prominent. How to ensure and enhance database security has become a problem that must be solved.
Web databases are the combination of database technology and
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.