Welcome To Snipplr

Everyone's Recent PHP Snippets Tagged security

« Prev 1 Next »
<p>Follow these steps to secure your Cakephp Website:</p> <p>*Before you actually start using Security Component functionality, make sure you use $components = array (‘Security’, ‘Auth’) in the array so you can extend its functionality in...
0 98 posted 5 years ago by cakephpexpert
Simple PHP Backdoor Shell // http://www.example.com/shell.php?cmd=dir
0 365 posted 6 years ago by shopsplash
**Example of use:** if (!isUniversityEmail('[email protected]')) exit('You must have a valid and .edu email address to register for an account.');
1 133 posted 6 years ago by phpdev
To keep up on important incidents on your site without having to dig through server logs the alternative can be custom logs.
0 85 posted 7 years ago by COBOLdinosaur
Nice implementation of Blowfish for storing user passwords to prevent decryption when for example the user database is compromised. Origin: Burak [email protected]
2 128 posted 8 years ago by ptodorov
Insert this in functions.php to remove WordPress version from being output in the header source code
0 83 posted 8 years ago by klagraff
Enter any suspicious IP address that you wanted to check into the form field and press the "LOOKUP" button
1 285 posted 8 years ago by DNSBL
Encode mailto links and (plain) email addresses on your site and hide them from spambots. Easy to use, plugin works directly when activated. Features * Protect all emails and mailto links * Check posts, widgets, comments and RSS feeds * Encode...
0 140 posted 9 years ago by freelancephp
0 104 posted 9 years ago by kendsnyder
Substitute new_ placeholder in the second line with your new prefix. Run it: http://www.yoursite.com/rename.php and wait until it responds with an OK, usually after a couple of seconds. Delete the rename.php script. Edit the configuration.php file...
0 92 posted 9 years ago by beneberle
If your WordPress blog is outdated even by a few days and there's a security hole in your old version you could be seriously compromised without even knowing it. Trust me. This has happened to two of my clients and the fix is not easy. Usually, once...
0 81 posted 10 years ago by josephknight
This is useful for escaping multiple values in a POST array.
0 105 posted 10 years ago by bradless
Put this at the top of your CodeIgniter models, controllers, libraries and helpers to restrict direct access to them.
1 185 posted 10 years ago by AzizLight
This little function helps to fight common security issue with SQL injections, it can sanitize any global variable like $_POST, $_GET, $_SERVER etc and escape unsafe characters.
5 147 posted 11 years ago by naz
That's not complete enough! but as useful as a knife :/
8 214 posted 11 years ago by lajevardi
This is a method of my database class which let me sift the unsafe data inputs down.
3 131 posted 11 years ago by lajevardi
[quote]$_SERVER['HTTP_REFERRER']'s problem is that can be spoofed, but it's better than nothing if you really want that.[/quote]
1 72 posted 11 years ago by luizlopes
2 85 posted 11 years ago by fruehjahr
This was taken out of a presentation by eZ systems on PHP Best Practices
0 72 posted 12 years ago by luizlopes
this is not the ultimate secure way, but it's at least not displaying the email link
3 72 posted 12 years ago by iTony
90 848 posted 13 years ago by llbbl
I got most of these tips out of a great book published by O'Reilly (my favorite web-design publisher): &quot;Programming PHP, 2nd Ed.&quot; by Lerdorf, Tatroe, and McIntyre. Another good book is &quot;Essential PHP Security,&quot; also published by O...
2 173 posted 13 years ago by pckujawa
« Prev 1 Next »