1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KengaRu [80]
3 years ago
15

How do you protect the server from modification by non-root users?

Computers and Technology
1 answer:
Elis [28]3 years ago
4 0

Answer:

We can protect the server from the modification by using the non root users in many ways as follows:

  • By modifying the PHP settings in the server and by using the configured file as, the configuration of the file is basically depend upon the linux and the PHP script.
  • By disabling the URL from the function of file handling that basically accept the local file as the parameters but it also accept the URL.  It can even now get to outer destinations by utilizing fsockopen or any of the CURL capacities.
  • The safe mode  of PHP is presumably probably the best alternative to secure your server however it very well may be prohibitive. Whenever initiated, experimental mode averts access to records not claimed by Apache and access to condition factors and execution of double projects are likewise debilitated.

You might be interested in
Without any formal planning, the president of a software company remarks in a speech that new technologically advanced software
ahrayia [7]

Answer:

<em>Imposed project deadlines.</em>

Explanation:

The term of project management imposed deadline<em> refers mainly to the calendar-based dividing line used to determine a fixed time or date on which the project management team has projected and/or developed that the particular schedule of work and/or schedule of work events.</em>

6 0
4 years ago
Which scenario describes a student citing an online source in his or her work?
dimaraw [331]

Answer:

D Ling includes the name of a source’s author in her report.

Explanation: just use it lol

4 0
3 years ago
Read 2 more answers
What is one of the main problems that can occur when Implementing a large number of new systems within an organization
Mariulka [41]
I would probably say ‘A’ or ‘D’
7 0
3 years ago
ORANGE COLORED SIGNS AND FLAGS MEAN THAT YOU MUST BE ALERT FOR:
Finger [1]
The best answer is B
Orange typically signalizes road work or construction.
4 0
4 years ago
Read 2 more answers
After several configuration changes are made to a router, the copy running-configuration startup-configuration command is issued
adoni [48]

Answer: NVRAM(Non-volatile random-access memory)

Explanation:Non-volatile random-access memory(NVRAM) is the memory that has a non-volatile nature.It is used for retaining of the data even when the system gets switched off .

This memory uses the power source from the CMOS battery for executing the functions. It is designed by using the pin configurations containing 24 pin in DIP(Dual inline package). So the situation mentioned in the question of storing the changes will appear in the NVRAM.

4 0
4 years ago
Other questions:
  • Linda has written a program that works well on various operating systems, but she needs to increase the readability of the progr
    14·1 answer
  • Hardware- The ______________ equipment that makes up the computer.
    6·1 answer
  • To activate a wizard to help in creating combo boxes and command buttons, make sure the ____ button is selected
    6·1 answer
  • You've just purchased 10 new notebook systems for your users. You are concerned that users will leave the systems on for long pe
    10·1 answer
  • Why did Herman Hollerith invent the Tabulating Machine?
    10·1 answer
  • What are some personal reading task examples?
    5·1 answer
  • What are two ways you can open an application?
    11·2 answers
  • Historically, storytelling passed down the most important ideas about life, family, and society from generation to generation; t
    10·2 answers
  • Tools used to build a bridge<br>​
    15·1 answer
  • 04. Suppose a computer program needs to sort a list of student records in ascending order
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!