hope I can customized the temporary DNS lookup in the php program for special
purpose without modifying the /etc/resolv.conf or other system configuration
files. Is it possible? How?
--
Patrick Hsieh[EMAIL PROTECTED]
--
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http
://www.example.com/cgi-bin/large_output.cgi;;
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $url);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
curl_setopt($ch, CURLOPT_TIMEOUT, 3);
$result = curl_exec($ch);
curl_close($ch);
echo $result;
?
--
Patrick Hsieh[EMAIL
server?
--
Patrick Hsieh [EMAIL PROTECTED]
GPG public key http://pahud.net/pubkeys/pahudatpahud.gpg
--
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php
trusting? Is it possible for a hacker to make an identical $HTT_REFERER
in the header? I have no idea how $HTTP_REFERER is made, is it made from
the http client and put in the http header?
If I can't trust $HTTP_REFERER, how can I deny malicious attack like
that?
--
Patrick Hsieh [EMAIL PROTECTED]
GPG
.
--
Dan Hardiker [[EMAIL PROTECTED]]
ADAM Software Systems Engineer
--
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php
--
Patrick Hsieh [EMAIL PROTECTED]
GPG public key http://pahud.net/pubkeys/pahudatpahud.gpg
--
PHP General Mailing List
it work if user just change the value in the URL directly and send
the url directly to web server?
How can we avoid the malicious attack by directly http GET/POST with
modified parameter values to make possible system error or compromise?
--
Patrick Hsieh [EMAIL PROTECTED]
GPG public key http
6 matches
Mail list logo