Best VPN
Best Cheap VPNs
Best Free VPNs
Best VPN For Netflix
Best VPN Routers
Best VPNs for Torrenting
Best VPNs For Kodi
Best VPNs for Mac
VPN Reviews
NordVPN
Surfshark
ExpressVPN
VyprVPN
Private Internet Access
WindScribe
CyberGhost
Avast SecureLine
Tools
Open Source Privacy Tools
Password Managers
Secure Email
Secure Browsers
How to Hide IP
Free Antivirus Software
Privacy Screens
Webcam Covers
Best Web Hosting
Best Credit Cards
Trading
Best Trading Platforms
Best Options Trading
Best Binary Options
Best Crypto Exchanges
Best Stock Trading Apps
Best Forex Brokers
Best CFD Trading Platforms
Best Micro Investing Apps
Best Crypto Apps
Best Crypto Wallets
Research Process
Mission
About Us
Research
How We Make Money
Contact
Blog
Add Your VPN Review
PHP Security Guide
1. Overview
1.1 What Is Security?
1.2 Basic Steps
1.3 Register Globals
1.4 Data Filtering
1.4.1 The Dispatch Method
1.4.2 The Include Method
1.4.3 Filtering Examples
1.4.4 Naming Conventions
1.4.5 Timing
1.5 Error Reporting
2. Form Processing
2.1 Spoofed Form Submissions
2.2 Spoofed HTTP Requests
2.3 Cross-Site Scripting
2.4 Cross-Site Request Forgeries
3. Databases and SQL
3.1 Exposed Access Credentials
3.2 SQL Injection
4. Sessions
4.1 Session Fixation
4.2 Session Hijacking
5. Shared Hosts
5.1 Exposed Session Data
5.2 Browsing the Filesystem
6. About
6.1 About This Guide
6.2 About the PHP Security Consortium
6.3 More Information