Js
This paper introduces the establishment of the development environment of the melting JSP, PHP and Java in a stove, in order to suit the needs of the most beginners, many steps are to use more convenient method, and strive to be simple and clear.
Here, I introduce you to the two common Web server of the most important record files, analysis of the server after the attack, the hacker in the record file will leave what records. There are two of the most common Web servers available today:
Improve PHP security by configuring some of the server-side features of PHP
by san@xfocus.org
The front like Shaun Clowes and RFP are more detailed about the PHP, CGI program in the process of programming problems encountered, and how to pass
Over
First, preliminary preparation situation
1. An installed WIN2000 server, note: If IIS is pre-installed, please deactivate or disable the IIS service first.
2. Next software
APACHE: Version: 1.3.22--apache_1.3.22-win32-x86.msi
JDK: Version:
Front like Shaun Clowes and RFP and so on are more detailed introduction of PHP, CGI program in the programming process encountered problems, and how to use the Application vulnerability Breakthrough System, this article we have some of PHP
clearlog.sh#!/bin/shFind/usr/local/apache/logs-mtime + 30-name "*.log"-exec rm {} \;Description
Find:linux Find command, the user finds the file for the specified condition
/usr/local/apache/logs: The target directory to be cleaned
AWD sed Problemadd a blank line after each linesed G file insert a blank line after the line that matches the style "regex"sed '/regex/g ' file Count rows (simulate "wc-1")wc-l File Insert 5 Spaces at the beginning of each line (to move the full
To provide you with a little information:
Display_errors = On
PHP defaults to open error message display, we change it to:
Display_errors = Off
When the error display is turned off, the PHP function does not display the wrong information to the
What is a virtual host? That is to make your own local development of the machine into a virtual domain name, such as: you in the development of a project under the PPTV 127.0.0.1/pptv_trunk, you want to turn your own computer domain name into
Apache Log Configuration
Sometimes we need to customize the format and content of the Apache default log, such as increasing or decreasing the information logged by the log, changing the format of the default log file, and so on. This article
Secure PHP Security Configuration
Date Created: 2001-11-12 update: 2003-08-06
Article Properties: Original
Article Source: http://www.xfocus.net
Article submission: san (san_at_xfocus.org)
Finishing: San
Version: 0.02
Date Created:
Security | Front of the server like Shaun Clowes and RFP, etc. are more detailed introduction of PHP, CGI program in the programming process encountered problems, and how to use the Application vulnerability Breakthrough System, this article we have
5, File Upload
PHP's file upload mechanism is to save the user uploaded files in the php.ini Upload_tmp_dir defined temporary directory (default is the system's temporary directory, such as:/tmp) in a similar phpxxuoxg random temporary file, the
Js|mysql 1. An installed WIN2000 server, note: If IIS is pre-installed, please deactivate or disable the IIS service first.
2. Next software
APACHE: Version: 1.3.22--apache_1.3.22-win32-x86.msi
JDK: Version: 1.3--j2sdk1_3_0-win.exe
PHP: Version:
Below are 5 open-source PHP website traffic statistics applications.
Piwik
Piwik is an open source Website access statistics system based on Php + MySQL technology. Its predecessor is phpMyVisites. Piwik can provide you with detailed statistics,
In ubuntu and debian, the main functional modules of apache2 (MPM) are divided into different software packages:
Apache2-mpm-event: event-driven MPM;
Apache2-mpm-perchild: This is just a transitional "fake" software package that relies on
Wdcp configures and processes site access logsWdcp starts from Version 2.2 and supports web Log cutting, saving by day, compressing and packaging, and setting retention and daysSpecific settings are as follows:System settings are shown in figureIn
In a large number of visits to the site, some access to the log can not be recorded, Chip js,cssMethod One: Logformat "%h%l%u%t \"%r\ "%>s%b \"%{referer}i\ "\"%{user-agent}i\ "" Combinedlogformat "%h%l%u%t \"%r\ "%> ; s%b
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.