One: Configure the anti-theft chainOpen the virtual host configuration file#vim/usr/local/apache2/conf/extra/httpd-vhosts.confAdd the following contentSetenvifnocase Referer "^http://.*\.abc\.com" Local_refSetenvifnocase Referer ". *.aminglinux.com"
11.25 Configuring the anti-theft chain
background : Sometimes we don't want to allow other websites to access documents, images, audio and other documents that are located on our website by means of Web links, which can be implemented by
In linux, The. htaccess file-Linux Enterprise Application-Linux server application information is described below. In Linux, the most common password protection method is to use the. htaccess file, that is, the directory configuration, to implement
Protect the Linux Apache website-Linux Enterprise Application-Linux server application information. The following is a detailed description. How can we protect websites from illegal user login? Generally, you can use the identity authentication
Supplemental Information This network uses the Linux server, the Web server is built by Apache, the IP address is 192.168.1.5, the background page is/admin/login.jsp. How to set the background page login.jsp only allow 192.168.1.10 access. And the
Taking over a project is written in jsp. It seems that development is too troublesome to use. As a result, the new features are written in php. jsp and php jump to each other. Suddenly, one day, it was found that the php source code was displayed on
One, Apache user authenticationThe function is that when users visit a website, they need to enter a user name and password to enter the site. Some important sites or websites are often authenticated by users to ensure security.#
11.28 restricting a directory from parsing PHPProhibit PHP parsing: To prevent the upload of harmful php files, and be executed, PHP may have dangerous functions, if the open upload permissions, will certainly be uploaded malicious Trojan files,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.