“Since PHP is most commonly used as an Apache
module, it derives its security model to a large degree
from Apache, which, if configured properly, is a very
secure environment. In cases where PHP is used as a
CGI, this benefit is lost.”
“Throughout this article we’ve covered how to evaluate your needs while considering
issues of security. We’ve also covered security issues specific to the use of PHP and
what you should be aware of when configuring PHP.”
Throughout this article we’ve covered how to evaluate your needs while considering
issues of security. We’ve also covered security issues specific to the use of PHP and
what you should be aware of when configuring PHP.