Chapter 4

Considering PHP Security


check Identifying PHP attacks

check Stopping cross-site scripts

check Hiding your files

check Watching for data spoofing

check Handling data safely

Web application security is a hot topic these days, and for good reason! It seems that almost every day there’s a news story about some company being attacked and having important data stolen. These breaches are costly — both for the company and for the thousands of customers who have personal information stolen.

As a web application developer, your job is to put security first in all your design and coding work. You’re the front line in the battle of data security! This chapter helps with that job, by giving you an idea of the types of attacks you need to watch out for and then walking you through how to avoid those attacks with your PHP code.

Exploring PHP Vulnerabilities

To avoid attacks, you first need to know where they’ll come from. It doesn’t do any good to barricade the front door, if you leave the windows ...

Get PHP, MySQL, & JavaScript All-in-One For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.