December 2010
Intermediate to advanced
363 pages
12h 21m
English
![]()
In this chapter, we will explore how to isolate the execution of potentially dangerous system commands and Remote Procedure Calls (RPCs). Up to this point in the book, we've been discussing your PHP applications and the users (both human and otherwise) that interact with it; for the first time we're now veering into the system and environment that your PHP application resides in. We're still talking about your application and the interfaces it makes available to system-level calls and remote procedures.
Because online applications are necessarily exposed to the relatively unfettered, ...