security.general.html

来自「php的帮助文档,涉及到PHP的案例和基本语法,以及实际应用内容」· HTML 代码 · 共 66 行

HTML
66
字号
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html> <head>  <title>General considerations</title>  <meta http-equiv="content-type" content="text/html; charset=UTF-8"> </head> <body><div style="text-align: center;"> <div class="prev" style="text-align: left; float: left;"><a href="security.intro.html">Introduction</a></div> <div class="next" style="text-align: right; float: right;"><a href="security.cgi-bin.html">Installed as CGI binary</a></div> <div class="up"><a href="security.html">Security</a></div> <div class="home"><a href="index.html">PHP Manual</a></div></div><hr /><div>   <h1>General considerations</h1>   <p class="simpara">    A completely secure system is a virtual impossibility, so an    approach often used in the security profession is one of balancing    risk and usability. If every variable submitted by a user required    two forms of biometric validation (such as a retinal scan and a    fingerprint), you would have an extremely high level of    accountability. It would also take half an hour to fill out a fairly    complex form, which would tend to encourage users to find ways of    bypassing the security.   </p>   <p class="simpara">    The best security is often unobtrusive enough to suit the    requirements without the user being prevented from accomplishing    their work, or over-burdening the code author with excessive    complexity. Indeed, some security attacks are merely exploits of    this kind of overly built security, which tends to erode over time.   </p>   <p class="simpara">    A phrase worth remembering: A system is only as good as the weakest    link in a chain. If all transactions are heavily logged based on    time, location, transaction type, etc. but the user is only    verified based on a single cookie, the validity of tying the users    to the transaction log is severely weakened.   </p>   <p class="simpara">    When testing, keep in mind that you will not be able to test all    possibilities for even the simplest of pages. The input you    may expect will be completely unrelated to the input given by    a disgruntled employee, a cracker with months of time on their    hands, or a housecat walking across the keyboard. This is why it&#039;s    best to look at the code from a logical perspective, to discern    where unexpected data can be introduced, and then follow how it is    modified, reduced, or amplified.   </p>   <p class="simpara">    The Internet is filled with people trying to make a name for    themselves by breaking your code, crashing your site, posting    inappropriate content, and otherwise making your day interesting.    It doesn&#039;t matter if you have a small or large site, you are    a target by simply being online, by having a server that can be    connected to. Many cracking programs do not discern by size, they    simply trawl massive IP blocks looking for victims. Try not to    become one.   </p>  </div><hr /><div style="text-align: center;"> <div class="prev" style="text-align: left; float: left;"><a href="security.intro.html">Introduction</a></div> <div class="next" style="text-align: right; float: right;"><a href="security.cgi-bin.html">Installed as CGI binary</a></div> <div class="up"><a href="security.html">Security</a></div> <div class="home"><a href="index.html">PHP Manual</a></div></div></body></html>

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?