Solved

Warning to PHP Users!

Posted on 2013-10-25
9
724 Views
Last Modified: 2013-10-29
This is not a question.  I'm posting it here because it's a warning.  Read the home page.
http://php.net/
0
Comment
Question by:Ray Paseur
  • 3
  • 2
  • 2
  • +2
9 Comments
 
LVL 58

Accepted Solution

by:
Gary earned 20 total points
ID: 39601051
Another reason to make sure you have a good AV/malware system in place
0
 
LVL 15

Expert Comment

by:Ess Kay
ID: 39601103
thanks
0
 
LVL 42

Expert Comment

by:Rob Jurd, EE MVE
ID: 39601593
Thanks Ray
0
 
LVL 53

Expert Comment

by:COBOLdinosaur
ID: 39601920
Good post Ray.  The interesting part will be when they work out what kind of attack vector was used because we all might have a hole we don't yet know about.

Cd&
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 
LVL 108

Author Comment

by:Ray Paseur
ID: 39601990
@Cd& +1
0
 
LVL 58

Expert Comment

by:Gary
ID: 39601998
As long as they haven't hacked PDO then Ray will have a lot of explaining to do ;o)
0
 
LVL 53

Expert Comment

by:COBOLdinosaur
ID: 39606917
Actually I am in the middle of doing my first conversion from the mysql API to PDO, and it is a lot less work than I thought it would be.  I really like PDO; should have moved a long time ago.

Cd&
0
 
LVL 108

Author Comment

by:Ray Paseur
ID: 39607101
@Cd& one nice thing is that you can connect to all of the DB extensions at the same time ;-)

Meaning that you can convert your scripts in small steps.
0
 
LVL 53

Expert Comment

by:COBOLdinosaur
ID: 39610176
The security side is a lot less work, and it is enforced by PDO. if you do something stupid it throws and exception and let's you know you are an idiot. ;^)

Cd&
0

Featured Post

Superior storage. Superior surveillance.

WD Purple drives are built for 24/7, always-on, high-definition security systems. With support for up to 8 hard drives and 32 cameras, WD Purple drives are optimized for surveillance.

Join & Write a Comment

Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
This article discusses four methods for overlaying images in a container on a web page
The viewer will learn how to look for a specific file type in a local or remote server directory using PHP.
This tutorial will teach you the core code needed to finalize the addition of a watermark to your image. The viewer will use a small PHP class to learn and create a watermark.

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now