On 05/02/2004 at 13:17 Ford, Mike               [LSS] wrote:
>On 05 February 2004 13:10, Harry Sufehmi wrote:
>> On 05/02/2004 at 11:48 Ford, Mike               [LSS] wrote:
>> > On 05 February 2004 11:30, Harry Sufehmi wrote:
>> > > As you can see, the content will be secured, but the script
>> > > is now becoming the weak point since it'll store the
>> > > encryption key needed to decrypt the content.
>> > 
>> > I hope you don't mean that literally.  If you're really being
>> > security conscious, the encryption keys should be in an include
>> > file that lives *outside* the Web document tree.
>> 
>> Of course we'll do it like that.
>> And anyway I was talking about if the cracker has actually
>> gained (root) access to that server itself - which makes
>> putting the keys outside the web directory irrelevant.
>
>OK, good -- I kind of assumed so, given your other precautions, but just
>thought I'd clarify for any novices coming upon this thread in the
>archives... ;)

It's always a good idea indeed  :)


cheers, HS
--
Kampanye open-source Indonesia - http://www.DariWindowsKeLinux.com
Solusi canggih, bebas ikatan, dan bebas biaya

v0sw6Chw5ln3ck4u6Lw5-2Tl6+8Ds5MRr5e7t2Tb8TOp2/3en5+7g5HC - hackerkey.com

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to