1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KengaRu [80]
3 years ago
15

How do you protect the server from modification by non-root users?

Computers and Technology
1 answer:
Elis [28]3 years ago
4 0

Answer:

We can protect the server from the modification by using the non root users in many ways as follows:

  • By modifying the PHP settings in the server and by using the configured file as, the configuration of the file is basically depend upon the linux and the PHP script.
  • By disabling the URL from the function of file handling that basically accept the local file as the parameters but it also accept the URL.  It can even now get to outer destinations by utilizing fsockopen or any of the CURL capacities.
  • The safe mode  of PHP is presumably probably the best alternative to secure your server however it very well may be prohibitive. Whenever initiated, experimental mode averts access to records not claimed by Apache and access to condition factors and execution of double projects are likewise debilitated.

You might be interested in
Change 'What do they do' into passive voice​
Ivan
What they do is the answer
7 0
3 years ago
Read 2 more answers
How many Packs of cigarettes in one carton? 6, 8, 10, 12 ?
Gnesinka [82]
There are 8packs of 25, or 10 packs of 20 depending on the brand.... both adding up to 200 cigarettes total.

6 0
3 years ago
In computer Drag and Drop“ means to select the items, hold down the mouse and
kompoz [17]

Answer:

Release the mouse in the desired location.

5 0
3 years ago
Which are types of gradients to choose from when working in photoshop
Eduardwww [97]

Answer:

can anyone help me in computer

7 0
2 years ago
Read 2 more answers
An unauthorized program typically contained within a legitimate program is known as
rewona [7]
A Trojan. It is named after the Trojan Horse.
8 0
3 years ago
Other questions:
  • What is the faster way for browsers to obtain the revocation status of a digital certificate attached to a Web site?
    8·1 answer
  • A python programmer is writing a function definition. What syntax should be used?
    6·1 answer
  • 3. What term refers to the physical locations of elements in relation to each other?
    10·2 answers
  • A __________ infrastructure is made available to the general public or a large industrygroup and is owned by an organization sel
    11·1 answer
  • Describe the steps to change an existing macro in Microsoft office 2016
    6·1 answer
  • Explain to Alana why she might not want to blast her boss on social media just yet.<br>​
    6·1 answer
  • Please respond not with answer but with comment.
    12·1 answer
  • चार फरक छुट्याउनुहोस् ।) 3. Write down any four provisions of cyber ethic साइबर नैतिकताका कुनै चार प्रावधानहरु लेख्नुहोस् ।​
    11·1 answer
  • How do we ensure that future technologies are fair to society?
    11·1 answer
  • I have a question, but it's not a math question. Can anyone give me 5 unblockers for school computers? If you answer this, you w
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!