Team LiB
Previous Section Next Section

Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X]

PAM limits
Paros web application security tool
performance increase with reverse proxy
performance measurement
Perl, working in jail
phishing scams
PHP
     Apache integration functions
     auto_prepend problem
     configuration
         allow_url_fopen
         file uploads
         file_uploads directive
         filesystem, restricting access
         functions and classes, disabling
         limits, setting
         logging options
         modules, dynamically loading
         open_basedir directive
         options, disabling
         register_globals problem
         safe mode restrictions
         session security
     doc_root directive
     environmental variable restrictions
     error logging, turning on
     external process restrictions
     file access restrictions
     forensic logging integration 2nd
     Hardened-PHP project
     hardening, advanced
         SAPI Input Hooks
     information about, disabling
     installation
         CGI script approach
         configuration file location error
         modules
     interpreter security issues
     jail, working in
     module, making secure
     posix module, disabling
     SAPI input hooks
     Security Consortium
     security resources
     source download
PKI (public-key infrastructure)
plaintext
port connection for SSL
port scanning
     netstat port-listing tool
positive security model
posix module
POST method logic flaws
private-key (symmetric) encryption 2nd
process state management logic flaws
protection security phase
protocol analyzer SSLDump
proxies
     access control
         reverse proxies do not require
    reverse [See reverse proxies]
ptrace, process hijacking with
public-key (asymmetric) encryption 2nd 3rd 4th [See also public-key cryptography]
     certificate authorities
     digital certificates
     DSA
     Elliptic curve
     infrastructure
     RSA
     web of trust
public-key cryptography 2nd 3rd [See also public-key encryption]
public-key infrastructure (PKI)

Team LiB
Previous Section Next Section