After the php environment is deployed, some security settings are made. in addition to being familiar with various php vulnerabilities, you can also configure php. ini to reinforce the runtime environment of PHP, and PHP has been officially modified
Php security configuration records and common errors (Summary), common php errors
After the php environment is deployed, some security settings are made. In addition to being familiar with various php vulnerabilities, you can also configure php. ini
This article mainly introduces the PHP security Configuration records and common error carding detailed, interested in the friend's reference, I hope to be helpful to everyone.
Usually after the deployment of the PHP environment will be some
Mysql configuration file my. cnf configuration and configuration parameters, mysqlmy. cnf
Mysql configuration file my. cnf
Mysql is installed without the my. cnf file.
1. You can copy the mysql sample configuration file, such as the my-medium.cnf
(1) A machine is configured as follows MKDIR/APP/BOOTISO-PV cd/app/bootiso cp-r/mnt/centos6/isolinux/./mkdir KS CP/ Root/anaconda-ks.cfg ks/ks6-desktop.cfg cp/root/anaconda-ks.cfg ks/ks6-mini.cfg vim ks/ks6-desktop.cfg
Prepare the environment:1. configure the firewall and enable port 80 and port 3306Vi/etc/sysconfig/iptables-A input-m state -- state NEW-m tcp-p tcp -- dport 80-j ACCEPT (allow port 80 to pass through the firewall)-A input-m state -- state NEW-m tcp-
I. development environment considerations
When Elipse is used for development, it will not be compiled as long as Eclipse is used for import, prompting that class R is redefined because the R will be automatically generated after Elipse is
Now most sites require users to use the mailbox registration, and then send the account activation email to the user registration mailbox, the user click on the link to activate the account, let me introduce the specific method.
Functional
PHP user registration email verification activation account example. Currently, most websites require users to register using their email addresses, and then send an account activation email to the user's registered email address. the user can click
1. install the RHEL/CentOS5.3 system and select only the packages you need! I only selected the basic package and removed some packages from the basic package. after installation, there will be about 410 packages! Please do it based on your own
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.