This site uses cookies from Google to deliver its services, to personalize ads and to analyze traffic. Information about your use of this site is shared with Google. By using this site, you agree to its use of cookies. Learn More

Php-mysql Application Security

Php-mysql Application Security Information,Tech New Php-mysql Application Security

With these two methods, there’s no longer any need to ever use GET for requests internal to an application.
You may still need it for external requests, to other applications and web sites that aren’t coded to look for their
parameters as POST data, but you can’t do anything about them.
Of course, I also should mention that there’s not much security in POST unless you’re also using SSL
Hash the passwords with Phpass.
Store the hashed passwords in the database, protected to the extent possible.
Use 2FA.Prevent SQL injection with parameterized queries.
Prevent XSS by escaping all user-originated output.
Prevent CSRF with a csrftoken.
Prevent clickjacking with an
X-Frame-Optionsheader.
Use POST rather than GET.
Use SSL.
Submitting Requests with POST
Submitting requests with POST instead of GET makes it just a bit harder
for an attacker to break in, since JavaScript has to be used and easy tricks like
coding a request in an image srcattribute won’t work. POST also prevents data like
a csrftoken from accidentally getting e-mailed or posted on a social site.
PHP-MySQL application Security

The only requests that should use GET are those that don’t do anything
other than to display a page. Indeed, RFC 2612, the official specification for HTTP,
says “the convention has been established that the GET and HEAD methods
SHOULD NOT have the significance of taking an action other than retrieval.
It’s not disallowed, just discouraged. But you should act like it’s disallowed.

0 Response to "Php-mysql Application Security"

Posting Komentar

Contact

Nama

Email *

Pesan *