Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] Passport, example of vulnerability in passthru() function 2nd passwords hashing, with client-side scripting reminders for sniffing storing in cookies storing in database PDO library, escaping performed automatically by PEAR::DB library, escaping performed automatically by persistent logins PHP manual PHP Security Consortium 2nd PHP, features of phpinfo() function popen() function 2nd POST data, trustworthiness of POST requests, for authentication forms post_max_size directive practices for security prediction, obtaining session identifer using preg_replace() function presentation attacks principles of security privileges, allowing least necessary proc_open() function protocol-level redirects, obtaining session identifier using publications Apache Security (Ristic) Applied Cryptography (Schneier) |