HomebulletScriptsbulletTag: attack (6 results)
  1. Secure Session Extended
    694 total visits
    This class can be used to prevent session hijacking and fixation attacks.It is based on the class originally written by Vagharshak Tozalakyan.This version starts the session when the object is created, allows choosing the hashing algorithm used to encrypt the users fingerprints, and set the expiry time of the session. See the class comments for full details.
  2. No Screenshot
    449 total visits
    This package can be used to analyse HTTP requests to detect security attacks.The main class analyzes the HTTP GET and POST values to determine if contains words that can be used to perform SQL injection attacks, mainly to MySQL applications.It returns the information that based on a score of the word analysis it may be a security attack, so the ...
  3. No Screenshot
    311 total visits
    This package can be used to filter or purify HTML to prevent security attacks and for compliance with standards and admin. policies. It can parse HTML documents and rewrite it to filter tags and data that could be used to perform cross-site scripting (XSS) attacks.The filtered tags and data can be controlled by black and white lists that define which ...
  4. No Screenshot
    309 total visits
    This offers protection against automated attempts to guess login passwords also known as dictionary attacks.It works by logging failed access attempts and when necessary it blocks the access to users that have failed to login too many times, as it may be an attack of a cracker using a dictionary of common passwords trying guess the correct password with an ...
  5. No Screenshot
    1938 total visits
    Request Data can retrieve request values from $_ENV, $_GET, $_POST, $_COOKIE, $_SERVER, $_REQUEST and convert the values to several data types: integer, boolean, strings, float. It can also retrieve request headers from $_SERVER variables with names that start with HTTP_ .Values are escaped to prevent cross-site scripting attacks and slashes are removed from the values when the magic quotes option ...
  6. No Screenshot
    1658 total visits
    Time-based tokens are generated and can be used in hidden form fields.The presence of the token in the submitted form values can be verified and an eventual attack can be avoided by not processing the form if the token is not present or is not valid.Requirements: PHP 5.0 or higher
Pages 1 of 1« 1 »