?
Solved

Install.php

Posted on 2011-09-22
5
Medium Priority
?
389 Views
Last Modified: 2012-05-12
Hi,

I just installed a proxy on my NAS (Glype).
It shows me "do not leave it this way!" for security reasons, but what do I have to do to "secure" my glype-page, normally there is an install.php to remove ...?
Just want to make sure the php-app is safe.

J.
0
Comment
Question by:janhoedt
  • 2
  • 2
5 Comments
 
LVL 7

Accepted Solution

by:
boon86 earned 2000 total points
ID: 36578876
with the install.php leave after you installed, it will lead to hacker to reinstall your site by accessing your proxy site by typing:

http://www.yoursite.com/install.php or http://www.yoursite.com/install/install.php

it is advised to rename it to something else such as asdasd.php swdasd876.php so that hacker would able to guess it.

also

you can remove it totally from your website, its no harm to remove install.php

hope that help.
0
 

Author Comment

by:janhoedt
ID: 36578884

There is no install.php ...
0
 
LVL 7

Expert Comment

by:boon86
ID: 36578978
try refresh your browser, maybe its a cache?
0
 
LVL 27

Expert Comment

by:Lukasz Chmielewski
ID: 36579286
There is an admin.php page in the root dir. Maybe glype informs you that the directories have too much rights ? Where do you see this info ? On the main screen ?
0
 

Author Comment

by:janhoedt
ID: 36581546
Don't see it anymore. I'd have to reinstall. Never mind, it's local use only.
0

Featured Post

Take Control of Web Hosting For Your Clients

As a web developer or IT admin, successfully managing multiple client accounts can be challenging. In this webinar we will look at the tools provided by Media Temple and Plesk to make managing your clients’ hosting easier.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
There are times when I have encountered the need to decompress a response from a PHP request. This is how it's done, but you must have control of the request and you can set the Accept-Encoding header.
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
The viewer will learn how to count occurrences of each item in an array.
Suggested Courses

599 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question