5. SQL injections
What is it?
This type of attack is one of the most common attacks. SQL injections occur after two failures of the part of developers: failure to filter data as it enters the application (filter input) and failure to escape data as it is sent to the database (escape output). For example, let’s suppose we [...]
Archive for September, 2010
Securing PHP Applications Part II – Securing PHP code
September 28th, 2010
3 Comments
Design patterns Part IV – MVC
September 23rd, 2010
3 Comments
The problem:
When your php application became larger, you might find yourself in the situation where you don’t know where to change the design of a certain page, or you might have to change in multiple places to get the same results.
For example, if you want to implement a comments system in your application, you could [...]
Securing PHP applications Part I – Securing PHP code
September 13th, 2010
13 Comments
There are a lot of books treating this issue. So, why another post about this subject. Well, here a try to cover this problem in a short way so that you don’t have to read hundreds of pages or to search all over the Internet for this.
These being said, you must know that securing a [...]