On 05 February 2004 13:10, Harry Sufehmi wrote:

> On 05/02/2004 at 11:48 Ford, Mike               [LSS] wrote:
> > On 05 February 2004 11:30, Harry Sufehmi wrote:
> > > As you can see, the content will be secured, but the script
> > > is now becoming the weak point since it'll store the
> > > encryption key needed to decrypt the content.
> > 
> > I hope you don't mean that literally.  If you're really being
> > security conscious, the encryption keys should be in an include
> > file that lives *outside* the Web document tree.
> 
> Of course we'll do it like that.
> And anyway I was talking about if the cracker has actually
> gained (root) access to that server itself - which makes
> putting the keys outside the web directory irrelevant.

OK, good -- I kind of assumed so, given your other precautions, but just
thought I'd clarify for any novices coming upon this thread in the
archives... ;)

Cheers!

Mike

---------------------------------------------------------------------
Mike Ford,  Electronic Information Services Adviser,
Learning Support Services, Learning & Information Services,
JG125, James Graham Building, Leeds Metropolitan University,
Beckett Park, LEEDS,  LS6 3QS,  United Kingdom
Email: [EMAIL PROTECTED]
Tel: +44 113 283 2600 extn 4730      Fax:  +44 113 283 3211 

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to