If your server is approaching 99% disk space, your users may be
aware of this before you are. At the 1% free margin, the following
error will pop up when accessing certain features in cPanel and WHM:
Change website
From Jan 16 2015,
All post content will be move to we's offical website with many content...
Can access website here: http://justox.com
Thanks for your visit!
Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts
Thursday, 19 December 2013
Upgrading OpenSSH on CentOS 5
If you’ve taken a peek at your PCI scan results lately, you may have
noticed that your scan provider is now requiring OpenSSH 4.5 or higher –
a version that is not currently available in the CentOS 5 repositories.
A Yum update isn’t going to help you much there.
PHP Security Tips – Securing PHP by hardening PHP
When it comes to security, ignorance is definitely not blissful.
There are several methods to increase the security of your PHP
environment.
In this article I will discuss how to secure PHP by hardening PHP 5 configuration.
1. allow_url_fopen ( enabled by default )
This directive allows PHP's file functions ( file_get_contents, include and require statements ) to retrieve data from remote locations, like FTP or HTTP.
If an attacker can manipulate the arguments to those functions, they can use a URL under their control as the argument and run their own remote scripts. The vulnerability is called Remote file inclusion or RFI.
In this article I will discuss how to secure PHP by hardening PHP 5 configuration.
1. allow_url_fopen ( enabled by default )
This directive allows PHP's file functions ( file_get_contents, include and require statements ) to retrieve data from remote locations, like FTP or HTTP.
If an attacker can manipulate the arguments to those functions, they can use a URL under their control as the argument and run their own remote scripts. The vulnerability is called Remote file inclusion or RFI.
Subscribe to:
Posts (Atom)