CGI security tips

Author: fallen leaves [J. L.S. T]Information Source:Http://hi.baidu.com/jluoye I have been working hard to keep up with the Internet for a long time. See todayPhpeval has an article on CGI security.I was so careful when I was studying CGI. The cgi

Replacement of php Strings

Source: phpevals BLOGAuthor: phpeval Filtering and replacement are of course good. Recently, I helped my sister buy a Korean dish. Searching for half a day. I found a station that is said to be capable of selling Korean things. I am going to buy it.

Several Methods and Applications for reading files in mysql

Source: C.R. S.TAuthor: sai52 [B. H.S. T]Blog: www.sai52.com Today, my friend asked me how to read files in mysql and asked me a few questions. I found myself still failing to solve the problem, so I checked the mysql user manual.The idea is the

Small script BUG leads to security risks (continued-Domain Name Hijacking)

Previous: http://www.bkjia.com/Article/200901/31488.html Author: Bkys   Continue with the last script BUG. The last hijacking was the Virtual Machine management platform. However, this system is not an out-Of-The-stars system, and the hijacking is

Ten tips on website security keep your website away from danger

At present, many people use mobile networks, LEADBBS, and mobile systems for websites. Due to the open source code, program vulnerabilities are exposed obviously and easily hacked. Security experts suggest you refer to the following security

Password for the ACCESS database of the website

I don't need to talk about the importance of the website database. The account and password of the website administrator are stored in it. There are many ways to protect the database from being downloaded. Below we recommend several methods to

WEB code Auditing

/* Xuanmu */Houjie I think this is not exactly a technical issue, because there are too many things to consider outside of the technology, including the code structure, naming rules, and the rigor of syntax usage, A rather free language like

Trim () vulnerability cracking and protection + beginning and end of the article

The following code is provided: Name = trim (request. form ("name ")) Password = trim (request. form ("password ")) If name = "" or password = "" then response. redirect "error. asp? Error = name & name = null" MyDSN = "DSN = test; uid = test; pwd =

Storage process injection and Solution

Because the stored procedure has a + number connection SQL statement for string connection, this causes the possibility of SQL injection. The following is an example: PR_UserManage_Users_BatchMove Create procedure [dbo].

Idea of HTML Injection

1. Currently, XSS is a cross-site scripting attack. Generally, some problems occur on the client side when there is server interaction. What if there is no server interaction?2. Many people think that html files are absolutely safe. Is that

Simple iGuard breakthrough

From: EmperorInfoGuard, or iGuard for short, is commonly known as a tamper-proofing tool for web files. It was a big topic last night. After studying it, I found a solution and recorded it.First, give the effect of this thing. If a webshell is lost

Public permission backup to startup Item

Xiaoqiang Connect an account to an SQL query AnalyzerFirst convert a sentence to hexadecimal the conversion result is0x3c2565786563757450281095717565737428226861222929253eThen Create table china (a image) -- create a china table NameBackup log

Diggcms injection vulnerability in dig_vote.wst

Xiaoqiang There is an injection vulnerability in dig_vote.wst, but this page contains Function. wst has the anti-injection code, but the anti-injection Code does not seem to be case-insensitive and can be skipped directly in upper case. Download

Xss cross-site Vulnerability

Vulnerability Author: phantom spring [B .S.N]Source code downloadHttp://www.dvbbs.net/products.asp Official WebsiteHttp://www.dvbbs.net Vulnerability level: highVulnerability description:If you register on the internet, you will be given a default

FCKeditor JSP Vulnerability

View the files in the configuration and list directories.Jsp/connector? Command = FileUpload & Type = Image & CurrentFolder = % 2F "target = _ blank>Http://www.xxx.com/fckeditor/edi .. p; CurrentFolder = % 2FHttp://www.xxx.com/fckeditor/edi .. p;

Cross-site detection from PjBlog

EcAngel ecangel.blogbus.com Look, this title is very attractive. In fact, PjBlog does not have a cross-site vulnerability and has never been tested, Even if there is one, we haven't found it yet, but there is a key point. Let's take the next step.

Security Anti-Black Asp. Net code

I remember when I heard people say that the Administrator Login check in ASP. NET is all about using the stored procedure, so it won't create a universal password or "--" so that the user can log on to the background. At that time, it was easy to

Quick injection search for intrusion detection websites

SubeihackCurrently, many anti-injection programs shield and, 1 = 1, 1 = 2, such keywords. Using such a method sometimes cannot detect injection points. is there any new method for detecting injection points? After a period of research, I found a

In-depth analysis of cross-site scripting attacks: vulnerability exploitation process

The name of a Cross-Site Script originates from the fact that a Web site (or person) they can inject their selected code across the security line into another different, vulnerable Web site. When the injected code is executed in the victim's browser

Yike video system 0day

Author: Ice sugar Official Website:Http://www.moviecms.cn/ Affected Versions:Software Version: 1.2.0 access (others have not been tried)No patch released Program introduction: Using the S/B layer-3 structure to write logic is clearer, maintenance is

Total Pages: 1330 1 .... 980 981 982 983 984 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.