PHP Security

Recommend this page to a friend!

Detection and prevention of security attacks

  All package blogs All package blogs   Blog PHP Classes blog   Blog PHP Security   Post article Post article  
  30 - 21   20 - 11   10 - 1  

1059. The Wonderful PHP 8 Features and Changes Part 2: The PHP 8 Null Safe Operator - 11 Minutes Lately in PHP Podcast Episode 88

PHP 8.0 implements many excellent features requested by the PHP community to help improve many aspects of how developers can create their PHP projects.

The Lately in PHP podcast covered several of those features to explain how they work and what are their benefits for the PHP developers that can use PHP 8.

In the second part of this podcast episode, Manuel Lemos and Samuel Adeshina comment specifically about the PHP 8 Null Safe Operator.

Listen to the podcast, watch the video with manually edited subtitles in English, read the transcript to learn more about these exciting PHP 8 topics, and find where to buy the original PHP elePHPants shown in the podcast video.


Blog More ...   Post a comment Post a comment   See comments See comments (0)   Trackbacks (0)

1054. How to Improve the Security of a Web Application Using a Nginx PHP Front Controller Design Pattern Implementation

The front controller is a popular design pattern used by many PHP applications to handle all the HTTP requests sent to a Web application.

Read this article to learn how to implement this design pattern with PHP using the Nginx Web server to prevent security attacks.


Blog More ...   Post a comment Post a comment   See comments See comments (0)   Trackbacks (0)

1049. A Guide To Internet Security: Why You Should Use A VPN

A VPN (Virtual Private Network) is a solution for accessing a network via a private channel that makes the access to computers in that network more secure. It can be useful for developers to access the computers that host their sites and applications in a way that is very secure.

Read this article to learn more about what are VPNs and how you can use them to do your developer work that requires to access the remote computers of your own site servers or the servers of your customers.


Blog More ...   Post a comment Post a comment   See comments See comments (0)   Trackbacks (0)

918. How to use Laravel Multi Auth Guard in Laravel 5.8

Laravel is a popular Web framework that provides tools that can generate code for complex tasks such as authentication users.

You can use different methods of authentication of your choice but if for some reason you want to use more than one method of authentication, you can use the Laravel Multi Auth Guard support.

Read this article to learn how you can implement Multi Auth Guard support in your Laravel Web applications.


Blog More ...   Post a comment Post a comment   See comments See comments (3)   Trackbacks (0)

896. 5 Common Laravel Request Errors Which Aunt New PHP Developers

Errors and exceptions are integral parts of software development.

Good developers should be ready to handle them in the best possible way to minimize the harm that the errors may cause to the application users and providers

Read this article to learn about the most common mistakes committed by less experienced developers and how can you fix them.


Blog More ...   Post a comment Post a comment   See comments See comments (3)   Trackbacks (0)

787. How to Build and Run PHP Unikernels using OPS

Unikernels are useful to make more efficient use of site server resources.

Read this article to learn what are Unikernels and how they can benefit site servers on which you can run PHP Web applications.


Blog More ...   Post a comment Post a comment   See comments See comments (1)   Trackbacks (0)

665. Essential PHP Security Tutorial on Monitoring in 2018: Website Security Tutorial About 3 Essential Tools for Every Website Owner

Security is one of the most delicate matters that all Web site developers should be concerned.

Implementing good security measures is not enough if Web sites are not monitored with adequate tools that can help taking fast actions to mitigate the issues.

Read this article to learn about a suite of security tools that can help owners to take better care of their sites.


Blog More ...   Post a comment Post a comment   See comments See comments (0)   Trackbacks (0)

528. Best WordPress Security Plugin 2018 and 2017 - Review and Comparison of Top Free and Premium Versions of New Plugins and Support Services from Several Companies

WordPress is the most popular Web publishing platform. Since it is used by many Web site owners, it is also a target of many security exploits.

Many WordPress site owners do not know enough about security to protect their sites from being abused. Therefore they need to use plugins and tools to help them prevent and eventually fix security issues.

Read this this article to compare the features of the most recommended WordPress security plugins so you can pick one that addresses your needs.


Blog More ...   Post a comment Post a comment   See comments See comments (2)   Trackbacks (0)

391. Detecting Malicious Users behind Anonymous Proxies using IP2Proxy

Proxy servers are used by many users to bypass Web site restrictions. Sometimes malicious users are hiding behind proxies to commit fraud because a third party anonymous server is hiding their real location.

Fortunately it is possible to detect when users are behind proxies by looking up their IP address using IP2Proxy databases of known proxies.

Read this article to learn how to use IP2Proxy database to detect when users are behind proxies, so you can take the necessary measures to avoid that those users may cause some kind of harm.


Blog More ...   Post a comment Post a comment   See comments See comments (0)   Trackbacks (0)

338. 6 Common PHP Security Issues And Their Remedies

Security is a delicate matter that all PHP developers should be aware. However, not all PHP developer know the basic security measures that should be taken to avoid the most common security flaws.

Read this article to learn about 6 common PHP security issues and what you can you do to avoid them.


Blog More ...   Post a comment Post a comment   See comments See comments (8)   Trackbacks (0)

  30 - 21   20 - 11   10 - 1  
  All package blogs All package blogs   Blog PHP Classes blog   Blog PHP Security   Post article Post article  

For more information send a message to info at phpclasses dot org.