HomebulletScriptsbulletTag: security (129 results)
  1. No Screenshot
    1650 total visits
    EasyDate provides a set of manipulation functions that can be applied to strings retrieved from a MySQL database.
  2. No Screenshot
    1952 total visits
    A password of a specified length and allowed characters can be generated.Password Generator & Checker can also check whether a password is secure by counting the number of letters and digits it contains and also the password length.Requirements: PHP 4.0 or higher
  3. No Screenshot
    1980 total visits
    securepwd can check the similarity between the username and password on different levels, such as phonetics, soundex and mataphone, check it against a file of commonly used passwords, check to see if it meets a minimum size.
  4. No Screenshot
    1658 total visits
    Time-based tokens are generated and can be used in hidden form fields.The presence of the token in the submitted form values can be verified and an eventual attack can be avoided by not processing the form if the token is not present or is not valid.Requirements: PHP 5.0 or higher
  5. No Screenshot
    2038 total visits
    A log file containing the IP addresses and whether they could be proxies, gets generated. Rex can also check if an array of POST or GET values contains HTML excerpts with Javascript that could be used to perform XSS (Cross-site scripting) attacks.Requirements: PHP 5.0 or higherWhat's New in This Release Rex:- Proxy port scan can be disabled (in some cases, ...
  6. No Screenshot
    1475 total visits
    Form Data Cleaner can be used to sanitise GET and POST values based on expected data type rules. It takes a list of GET and POST request parameters that it should analyse and the respective data types that it expects. Currently Form Data Cleaner supports the types: integer, double, string, boolean and array.String values may be escaped for use in ...
  7. No Screenshot
    2043 total visits
    Security Image displays a form with a text input to let the user enter the displayed characters to be verified.Several parameters such as the verification text length, size and color, as well as the background, can be configured.
  8. No Screenshot
    1909 total visits
    Encode Cookie is meant to store and retrieve information in cookies securely by using secret encryption key.
  9. No Screenshot
    1957 total visits
    Server Navigator presents browseable listings of the contents of a server side directory in a user friendly way.Features of Server Navigator:- Password protection to avoid anyone from seeing your server files- IP address restriction to allow only the accesses of users from a given list of IPs addresses- Can skip files with certain file name extensions- Uses image icons to ...
  10. No Screenshot
    1827 total visits
    Submit Security can check whether the referrer URL is a of a site from a trusted sites list. It can also check whether the access method is POST or GET, according what is expected.If any of the access checks fail, an error message will be displayed.Requirements: PHP 5.0 or higher
  11. No Screenshot
    1729 total visits
    secShield takes a string with a list of parameters like the query parameters of an URL. It returns a string with the parameters encrypted with a secret key that should be used as a single parameter in a link URL.The integrity of the parameters can be verified and they can be decrypted. If the encrypted parameters are not valid in ...
  12. No Screenshot
    2081 total visits
    With PHP, to pass parameters between two pages you can use something like this:http://www.monsite.net/mapage.php?parametre1=123&user=456A visitor can modify thoses parameters to see what happens or to test parameters. For instance, he may modify the user parameter to see the account of another user.PHPSecureURL hides parameters. You do not have to modify your code. You just have to add some lines and ...
  13. No Screenshot
    2156 total visits
    file system browser can be used to check the security on web servers. When files are readable by the web server, they are displayed. This script is not limited to $DOCUMENT_ROOT and below. This will browse the entire file system (again, not in safe mode).
  14. No Screenshot
    1917 total visits
    Secure URL uses encoder to encrypt URL parameters. It uses PHP output buffer capture support to automatically process the URLs of the links and forms of the current page.The URLs which are to be altered can optionally be restricted through filters. When the current page using the class is loaded, it decrypts the parameter variables and updates the respective global ...
  15. No Screenshot
    1458 total visits
    class_sql_inject is meant to search in your SQL data values for special characters that may change the meaning of your SQL data and execute actions that may compromise the security of servers.When some of these suspicious character sequences is found in HTTP POST request values ($_POST), you can:- Destroy the current session- Redirect to a new page- Log the activityTo ...
Pages 4 of 9« 1 2 3 4 5 6 7 8 »