HomebulletScriptsbulletTag: security (129 results)
  1. No Screenshot
    1822 total visits
    The Apache mod_rewrite is often used to protect images and other types of media files from hotlinking from other sites, that make them appear in their pages although they are served from the original sites.However, mod_rewrite can be used to protect the service of Flash files against hotlinking.
  2. No Screenshot
    1850 total visits
    FloPageLock can be used to restrict the access to Web pages requiring user password authentication. It provides several means to authenticate users either using fixed pairs of user names and passwords or lookup MySQL database table with a given SQL query to lookup for accepted user names and passwords.FloPageLock supports redirecting to a given page for unauthorized users. It can ...
  3. No Screenshot
    1780 total visits
    Secure Session can be used to prevent security attacks known as session hijacking and session fixation. When a session is initialized the class computes a fingerprint string that takes in account the browser user agent string, the user agent IP address or part of it and a secret word. If the fingerprint value changes, it is very likely that the ...
  4. No Screenshot
    1842 total visits
    SauSurePays is a PHP Class with functions for submitting requests and decoding responses with SurePays merchant gateway service. Current version of SauSurePays supports: Standard Credit Card and TeleCheck Requirements: - Surepay request DTD v1.0 --> pp.request, - pp.auth, - pp.address, - pp.ordertext, - pp.creditcard, - pp.telecheck, - pp.identification, - pp.lineitem, - pp.optio, - pp.telecgt.
  5. No Screenshot
    2247 total visits
    WebPen is the universal method of agreement authentication backed by centuries of tradition and jurisprudence, the handwritten signature. Now legal documents and agreements can be displayed online and signed instantly right on your website using the mouse as a pen. WebPen eliminates the traditional hassle of downloading, printing, signing, and faxing. Making the signup process quick and easy avoids lost ...
  6. No Screenshot
    2231 total visits
    Expire Class is the generated code is encrypted using MD5. Of course, the script can also decrypt the generated code and check if it has expired. Requirements: PHP 4 or higher What's New in This Release Expire Class:- Change the AzDGCrypt.class.inc.php include location.- Change the class name from expire to Expire.
  7. No Screenshot
    1809 total visits
    PHP Profuscator is a php script that encrypts and/or obfuscates php and html contents using one of four possible methods. Some methods are more secure, making it possible to lock the scripts on your server so they would not run anywhere else if copied or moved.
  8. No Screenshot
    1892 total visits
    The size of sample (N) and the observed value (r) are taken as parameters and the significance is returned with the script Pearson Significance. Requirements: PHP 5.0 or higher
  9. No Screenshot
    1793 total visits
    Database servers down alarm can check one or more database servers by connecting to them to see if they are up or down.Database servers down alarm can send an alert e-mail or SMS message to the systems administrators when a database server is down. When the database server is up, another alert message is sent.MySQL, Mini-SQL, Microsoft SQL Server, IBM ...
  10. No Screenshot
    1995 total visits
    Security Filter for Request HTTP Data can traverse the $_GET, $_POST, $_REQUEST and $_COOKIE request super-global array variables and reset the entries that match certain regular expressions that identify potential dangerous values. Values which contain SQL retrieval queries, cross-site scripting attacks, hexadecimal values, calls to base64_decode and system functions can be filtered. Requirements: PHP 4.0 or higher
  11. No Screenshot
    1570 total visits
    Connect to SSH uses the SSH2 PHP extension to establish a secure shell connection to a specified server. Connect to SSH executes a remote program and returns whether it run successfully. Requirements: PHP 5.0 or higher
  12. No Screenshot
    1632 total visits
    CSRF protector can generate a random key and store it in a database record associated to the current session. It uses PEAR MDB2 database abstraction layer to support many types of databases. When the form is submitted with a token hidden input field, the class can also check if the key is valid. If it exists, the key record is ...
  13. No Screenshot
    1688 total visits
    CSP Filter takes a DOM Document object loaded with the structure of an HTML document and process it to find violations of the Content Security Policy definition. The document structure is changed in order to filter and enforce the policy definition, meaning the class can serve a compliant HTML document. Requirements: PHP 5.0 or higher
  14. No Screenshot
    1870 total visits
    Checksum can generate a checksum from a list of parameters and values to be passed in links using a private constant key value. It can also determine if a checksum is valid for a given list of parameters and values. A time range can be defined so that the checksum is only valid if the current time is within that ...
  15. No Screenshot
    1714 total visits
    The HTML code is scanned for references to ActiveX controls, executable programs, shared library files or batch scripts. Requirements: PHP 4.0 or higher
Pages 3 of 9« 1 2 3 4 5 6 7 »