473,396 Members | 2,154 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Security advice ?

Hi
I have completed a PHP+ MySQL application that uses and stores
sensitive
data (uses SSL via https). My query is a little non standard here -

What can the designer of such an application do to mitigate the effects of
hackers getting into the system run by the hosting company ? I know nothing
is safe if they get root access, but I guess one's job ought to be to
design things that can make serious damage as unlikely as possible. Is
there a FAQ that deals with this aspect ?

Thanks,

MS
Jul 16 '05 #1
1 1802
Madhusudan Singh wrote:
Hi
I have completed a PHP+ MySQL application that uses and stores
sensitive
data (uses SSL via https). My query is a little non standard here -

What can the designer of such an application do to mitigate the effects of
hackers getting into the system run by the hosting company ? I know nothing
is safe if they get root access, but I guess one's job ought to be to
design things that can make serious damage as unlikely as possible. Is
there a FAQ that deals with this aspect ?


Securityfocus published a nice paper on this subject the other day.
Check: http://www.securityfocus.com/infocus/1706
Good luck.

Regards,
Ruben.

Jul 16 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

116
by: Mike MacSween | last post by:
S**t for brains strikes again! Why did I do that? When I met the clients and at some point they vaguely asked whether eventually would it be possible to have some people who could read the data...
3
by: icb | last post by:
Hi I have a front-end/back-end setup. The front-end utilises all unbound forms populating the back-end via the code I have written. All fine so far. Prior to splitting the database I ran the...
2
by: David Ingram | last post by:
Greetings all! I am aiming to set up simple permissions for users on a database here at work, to the effect that certain users should be restricted from opening certain forms and reports. I...
2
by: TechBoy | last post by:
I am trying to learn on the fly about Access Security for an app we are developing. I realize Access security is an advanced subject with many details. I wanted to share a scenario and ask a...
2
by: Sanjay Poojari | last post by:
Hi All, Need some advice on some of the security issues in my ASP.Net application. There are certain tasks that I need to implement so need advice/guidance on them as well as safeguards that I...
4
by: tony | last post by:
I'm designing a survey form page that will be fairly complex and am becoming confident enough with PHP now to tackle most things. (Thanks to everyone here who has helped) Before I go too far...
2
by: news.demon.nl | last post by:
Hi, I hope someone can give me some advice on which form of security i can use best in this scenario: I have a free application that everbody on the internet can download. It calls a...
6
by: gfb | last post by:
This was a topic back in 2003 which has now been closed since I get the message "You cannot reply to this topic because it is more than 30 days old or has been closed by a manager." I am...
2
by: Joseph Geretz | last post by:
How do I implement security for my Web Service application? Specifically, I am concerned about protecting the data against prying eyes as it travels across the wire. Is it simply a matter of using...
18
by: Earl Anderson | last post by:
First, I feel somewhat embarrassed and apologetic that this post is lengthy, but in an effort to furnish sufficient information (as opposed to too little information) to you, I wanted to supply all...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.