Tagged articles
4 articles
Page 1 of 1
php Courses
php Courses
Apr 3, 2025 · Information Security

How to Defend Against CSRF Attacks Using PHP

This article explains the fundamentals of CSRF attacks, how they exploit authenticated users' cookies, and provides practical PHP techniques—including token generation and verification, request‑origin checks, secure cookie settings, and safe login/logout handling—to effectively protect web applications.

CSRFPHPpreventive measures
0 likes · 6 min read
How to Defend Against CSRF Attacks Using PHP
Efficient Ops
Efficient Ops
Feb 20, 2025 · Information Security

How a Maintenance Staff Leak Exposed Security Gaps and How to Prevent It

A recent case where a maintenance worker exploited device‑management flaws to steal confidential files for foreign spies highlights the need for heightened vigilance, strict self‑discipline, and prompt reporting, offering practical steps to safeguard against similar security breaches.

data leakageincident responseinformation security
0 likes · 4 min read
How a Maintenance Staff Leak Exposed Security Gaps and How to Prevent It
Java Backend Technology
Java Backend Technology
Feb 6, 2022 · Information Security

How Camera Hacking Threatens Privacy and How to Protect Yourself

Recent incidents of illegal camera hacking—ranging from public surveillance footage posted on Bilibili to a livestreamed gynecological surgery—highlight severe privacy violations, prompting platform bans, police action, and expert advice on securing cameras against unauthorized access.

Bilibilicamera securityonline surveillance
0 likes · 5 min read
How Camera Hacking Threatens Privacy and How to Protect Yourself
360 Quality & Efficiency
360 Quality & Efficiency
Nov 2, 2016 · Information Security

Understanding and Preventing Malicious File Upload Vulnerabilities

This article explains common malicious file‑upload attacks, demonstrates vulnerable PHP upload code, shows how attackers can bypass simple checks, and provides practical prevention techniques such as whitelist validation, MIME‑type verification, and secure storage of uploaded files.

MIME typepreventive measureswhitelisting
0 likes · 6 min read
Understanding and Preventing Malicious File Upload Vulnerabilities