forum share
   textsms      forum    

PHP Security Best Practices

INDEX \ Articole/intrebari \ PHP Security Best Practices

PHP Security Best Practices

text_format+  text_format-


Disabling Dangerous PHP Functions

PHP has a lot of functions which can be used to crack your server if not used properly. You can set list of functions in /etc/php.d/security.ini using disable_functions directive:

To add the PHP functions to the PHP configuration using WHM:
Log in to WHM
Go to Home->Software->MultiPHP INI Editor.
Choose the Editor Mode tab.
From the drop-down list choose the PHP version.
In the configuration window that will be opened, search for “disable_functions”.

Ex.
--
asp_tags=Off
display_errors = Off
magic_quotes_gpc=Off
max_execution_time = 30
max_input_time = 60
max_input_vars = 1000
memory_limit = 128M
post_max_size = 8M
session.gc_maxlifetime = 1440
session.save_path = "/var/cpanel/php/sessions/ea-php72"
upload_max_filesize = 2M
zlib.output_compression = On
allow_url_fopen = Off
allow_url_include = Off
disable_functions="exec,passthru,shell_exec,system,proc_open,popen,curl_exec,curl_multi_exec,show_source"
enable_dl = Off
file_uploads = On





update Ultima actualizare: 23/05/2025
done Informatiile cuprinse in aceasta sectiune sunt verificate si actualizate periodic.

list Articole recente
arrow_back Inapoi


© 2025 EVIDWEB. Toate drepturile rezervate. Design: EVIDWEB

share   forum   textsms