WinXP under apache2.052-win32+php4.39-win32+mysql4.022 configuration via
Apache,php4,mysql, on the internet can be down, here is not to say,
I just did it and I wrote it out for you to share.
(i) Apache configuration
1. Installation Apache_2.0.52-
First, the rookie often make mistakes
In the forum to see a lot of posts in the Code have a common basic error, field type error.
The program and the database are tightly connected, and the database field text or time type uses single quotes
For
Trojan Horse | compression
I think we all have some 80-port chicken, if it is the security of the domestic do not look down, if you do not wish to look down, the younger brother shortcoming, in order to make a start.
The most troublesome thing on
1, prevent from jumping out of the web directory
First modify httpd.conf, if you only allow your PHP script program to operate in the Web directory, you can also modify the httpd.conf file to restrict the PHP operation path. For example, your web
Advanced | script | trojan
"Summary" describes the high-level PHP script Trojan prevention, to prevent PHP trojan execution Webshell, prevent PHP Trojan read File directory article topic1, prevent from jumping out of the web directory
First modify
JS is an accidental opportunity to browse to a
website, the page is fresh and feels very comfortable. Web site is using JSP
Development, I decided to test the security of the system for my personal interests.
telnet www.target.com 8080GET
access| Data | database | Download the first language: the original MDB to the ASP can prevent download is nonsense.
Introduction: Yesterday and animator test a bit, the Data.mdb file renamed data.asp file in the Wwwroot directory. Then in IE input
Using Servlet, JSP and JDBC to implement database manipulation--jdbc connect MySQL instance:
Put the MySQL database-driven package (my driver Mysql-connector-java-5.1.34-bin.jar, which needs to be downloaded separately) in the Web-inf->lib
This article introduces some techniques to introduce the defense of the PHP Trojan attack, through these aspects you can better guard against Trojan horse program.
1, prevent from jumping out of the web directory
First modify httpd.conf, if
Simply put, phpMyAdmin is a MySQL management tool that, when installed, can directly manage MySQL data through the web, without the need to perform system commands to manage it,
is ideal for database managers unfamiliar with database operation
Wanstrath tweet about using passenger testimonials on DreamHost, reminding me that I should write a little about my experience. I have some small rails apps on the DreamHost and I'm happy with that.
Based on this article, Git ' n Your Shared Host
1. Play your imagination modify the database file name
However, if an attacker obtains a database path through a third-party approach, the database can be downloaded. So confidentiality is the lowest.
2. Database name suffix to ASA, ASP, etc.This
1, prevent from jumping out of the web directory
First modify httpd.conf, if you only allow your PHP script to operate in a Web directory, you can also modify the httpd.conf document to restrict the operation Path of PHP. For example, if your web
Eclipse is an open source, powerful IDE development environment, plus his extended plug-in capabilities, making it widely available.Java EE has several development environments, Eclipse+lomboz or eclipse+myeclipse.MyEclipse is a commercial product
Nginx is actually just a reverse proxy server that receives the request to see if the current request is a. php file and, if so, to the php-fpm for processing, and then to the user after the result is obtained. So there are two permissions to
Used to use Apache, because the job needs, to configure the PHP environment of IIS, the Internet to find some information, a bit on the configuration, in fact, with the experience of Apache+php+mysql, this is easy to understand.
now The iron is
If the data file is larger, rely solely on the compression, transfer and other processes are also feasible, in fact, we can use the SCP command to drag between servers, this is our Linux servers in the Web site data file Drag transfer, and do not
Web servers often happen, here are three solutions to the most common scenarios
Anti-Access database downloads
Adding an MDB extension map is OK. Methods: IIS Properties, home directories, configurations, mappings, application extensions added.
Yesterday and animator test a bit, the Data.mdb file renamed data.asp file in the Wwwroot directory. Then in IE input data.asp path, found that IE shows a blank, right key-> view source file, out of Notepad, the content saved as an. mdb file, opened
Download
Introduction: Yesterday and animator test a bit, the Data.mdb file renamed data.asp file in the Wwwroot directory. Then in IE input data.asp path, found that IE shows a blank, right key-> view source file, out of Notepad, the content saved
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.