I've been working on PHP applications for the last four years. PHP is really easy to write. But PHP also has some very serious flaws.
Below I will give my reasons why PHP is not suitable for larger sites than small amateur websites.
1. Bad support
Imagine how an active record handles SQL, so let's take a look at the Find method's: Conditions parameter, which is like this when called: Find (: all,:conditions=> ...), here: The conditions parameter determines which records the Find method
Research the loophole, I would like to solve the method, I summed up, there are I think of an immature idea.is for the master to see if it is a good way to solve known and unknown SQL injection vulnerabilities.This is the immature way I think, I
Mainly to prevent several areas of asp:First, the address bar parameter injection, is to use Request.QueryString to get the value of thisSecond, the form parameter injects, is uses the Request.Form to obtain the value theThird, cookiesIn fact, can
As a small programmer, in the day-to-day development can not be avoided with where in and like to deal with, in most cases we pass the parameters of simple quotes, sensitive words escape directly after the SQL, execute the query, fix. If one day you
How to better achieve the prevention of hacker attacks, I mention personal views! First, the free program does not really have to be free of charge, since you can share the original code, then the attacker can analyze the code. If you pay attention
Careful friends should find that the 2010 security patches for various applications began to become more. In particular, Adobe patches, Adobe software security vulnerabilities in 2009 a large number of exposure, Adobe Software has become a new
The first thing I want to say is that it is not the language of the written program is not safe, but to see how the person writing the code to write this program
Some days ago, I went to the client's research, found that the customer's monitoring
Attack
SQL injection attacks are exploited by means of design vulnerabilities, running SQL commands on the target server, and other attacksThe main reason for SQL injection attacks is that the data entered by the user is not validated when the SQL
Using Rational AppScan to respond to WEB application attacks
The history of Internet development can be said to be the process of continuous development of attack and protection. At present, web security has increased an unprecedented level, but
Safely write secure Transact-sqlbart Duncan
Overview of Microsoft Corporation This page to protect the security of developing SQL Server with the least privilege account for development follow the best way to protect T-SQL to learn about T-SQL
Recently, the site is frequently hacked. In the site inexplicably more than one article, there are more than a set of maps. Is wondering who can log in my backstage post and pictures, my QQ pop-up message, a stranger to me to send a message, said
Today I learned the basics about SQL injection from the Internet. The focus of SQL injection is to construct SQL statements, with the flexibility to use SQL
Statement to construct the injection string for the cow ratio. After learning to write a
System log and exception handling ②
In the last lecture we did a list of the results of the log and the exception, this section we are talking about to put in his application system.
First we create a generic class Resulthelper in the App.common
In the process of web development, when we need to pass in the URL of the Chinese character or other special characters such as HTML, it always seems to encounter a variety of small problems, because different browsers for their coding is not the
Server changes the network, network security so that people cannot but pay attention to it. Database, so we have to think of the powerful Oracle,ms SQL. Microsoft has the most vulnerabilities, using SQL injection today to make MS SQL work well for
I. Description of
The Intval function has an attribute: "Until the number or sign symbol is started to do the conversion, and then encountered Non-numeric or end of the string (/0) End Conversion", in some applications due to the Intval function
This article is translated from the Microsoft blog published in the relevant articles, the original English version of the original author of copyright, hereby
Access to | data 6. ASPECT
AOP (Aspect oriented programming) may have been unearthed in recent years
One of the most powerful technologies to come, the author does not intend to spend any time here to introduce it (online information has been a
Stored Procedures | Paging in
GoogleSearch for "Paging stored procedures" will come out many results, is commonly used in the paging stored procedures, today I would like to say that it is flawed, and the vulnerability can not modify the stored
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.