PHP Tutorial Configuration Chinese Narration
Let's see what you see, php.ini.
[PHP]
;;;;;;;;;;;; WARNING;;;;;;;;;;;;; This is the default settings file for new PHP installations.; By default, PHP installs itself with a configuration suitable for;
Secure PHP Security Configuration
Date Created: 2001-11-12 update: 2003-08-06
Article Properties: Original
Article Source: http://www.xfocus.net
Article submission: san (san_at_xfocus.org)
Finishing: San
Version: 0.02
Date Created:
PHP Common Vulnerability Attack analysis, PHP vulnerability attack
Summary: PHP program is not impregnable, with the extensive use of PHP, some hackers are also in the absence of the trouble to find PHP, through the PHP program vulnerability to
Summary: PHP program is not impregnable, with the extensive use of PHP, some hackers are also in the absence of the trouble to find PHP, through the PHP program vulnerability to attack is one of them. In the section, we will analyze the security of
Writing or reading data into a file is basically divided into three steps:
1. Open a file (if present)
2. Write/Read files
3. Close this file
L Open File
Before opening a file, we need to know the path to the file and whether or not this file exists.
[Global variables]
Variables in PHP do not need to be declared beforehand, they are created automatically the first time they are used, and their types do not need to be specified, and they are determined automatically based on the context. From the
In the development of PHP website, there are usually two ways to store data, a text file storage, such as TXT file, a database storage, such as MySQL, compared to database storage, file storage does not have any advantages, but the file read and
Create the fileutil.php file with the following content and invocation methods:
Php/** * manipulating File class * * Example: * Fileutil::createdir (' A/1/2/3 '); Test build folder Build a A/1/2/3 folder * fileutil::createfile
One, CGI mode installation security
Second, the Apache module to install security
When PHP is installed as an Apache module, it inherits the privileges of the Apache user (usually "nobody"). This has some impact on security and authentication. For
PHP Security Configuration One, Web server securityPHP is nothing but a Web server module function, so first of all to ensure the security of the Web server. Of course, the Web server to be secure and must first ensure that the system security, so
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.