HomebulletScriptsbulletTag: security (129 results)
  1. No Screenshot
    2041 total visits
    A bidimensional array of tokens of limited length, with letters and digits, is generated. The generated grid is seeded by a given secret salt string and a specific id that may be used to generate unique grids for different applications and users.Secure Token Grid Authentication may also verify whether a token entered by the user corresponds to a token of ...
  2. No Screenshot
    1626 total visits
    Rar for PHP uses the RAR program to build the compressed archives as it is the only way allowed by the RAR developers to build packed archives using the RAR algorithms.Individual files or entire directories can be added to the list of files to be packed.Optionally, Rar for PHP can use a password to protect the compressed archives. The class ...
  3. No Screenshot
    2974 total visits
    Social Security Number (SSN) Generator can generate random numbers for testing purposes based on the social security administration specifications. The numbers do not exist but are well-formed, so they could be valid.Specified social security numbers can also be validated by verifying whether they correspond to number ranges that have been issued by the Social Security Administration.Requirements:PHP 5.0 or higher
  4. No Screenshot
    1762 total visits
    If you are sending sensitive instructions from on page to another, Data Transmission Shield is often important to hide and protect what you are sending to prevent cross site scripting and other malicious attempts to hack your sites and applications.The shield class protects your data by using mcrypt to encrypt the information into a hashed value. This is then sent ...
  5. No Screenshot
    1808 total visits
    FTPeasy can establish one or more connections to FTP servers with optional SSL based security. If an FTP server connection was already established, it reuses that connection. It can perform several connection operations like setting the connection timeout, set the connection passive mode, login as a given user, and execute a server side program.FTPeasy can also perform operations with files ...
  6. No Screenshot
    1438 total visits
    Filter can process request data from POST, GET, REQUEST and COOKIE values and verify if it matches given type rules. If the values satisfy the rules, they are copied to array class variable.Filtering rules are supported for integers, strings, booleans, dates, times, timestamps, e-mail addresses, web addresses and phone numbers.Requirements:PHP 5 or higher
  7. No Screenshot
    1916 total visits
    Flood Blocke can be used to detect and protect a Web site from attempts to flood it with too many requests. It also allows to protect the site from automatic downloading many pages or files from the same IP address.The detection of flood is determine according to a set of parameters indicating the maximal allowed number of requests for the ...
  8. No Screenshot
    2169 total visits
    Perfect Crypt Class comes with a factory class that provides abstract methods to support different block modes. A secondary class implements the blowfish encryption algorithm.
  9. No Screenshot
    2311 total visits
    RSA can take two prime numbers and generate public and private keys.The public key should be used to encrypt the data. Only the private key can be used to decrypt the data encrypted with the public key.RSA has also digital signature functionality.Requirements:PHP 5.0 or higher
  10. No Screenshot
    1802 total visits
    PHPStopFlood is a library that can be used to detect and protect a Web site from attempts to flood it with too many requests. It also allows to protect the site from automatic downloading many pages or files from the same IP address, with the same session id or with whatever same identification token provided by you. The detection of ...
  11. No Screenshot
    1695 total visits
    A PHP class that can generate a code valid for a limited time. Based on a secret key you can generate a code that is valid only for a limited period of time or as a one time password (OTP), so this class extends the OTP to support the valability of the code in time.The password generated can be verified ...
  12. No Screenshot
    2166 total visits
    FraudLabs Credit Card Fraud Detection in PHP is PHP code that shows how FraudLabs Credit Card Fraud Detection helps the Internet merchant to avoid lost of revenue, waste of productivity, and increase of operation costs in chargeback and higher reserved funds as a result of online frauds.
  13. No Screenshot
    1895 total visits
    HackerTrap is the first step towards protecting your site. The web today is a jungle of hackers and script kiddies trying to take over any servers they can. They blast your site with multiple requests for different applications and check which get a response - and then exploit its known weaknesses. Even if you don't run the application, the error ...
  14. No Screenshot
    1836 total visits
    Defensive Attack can be used to get and set information about the current user HTTP request details to help protecting against unintended accesses.Functions of Defensive Attack:- Determine the user machine real IP address even when it is behind a proxy.- Check whether the user IP address is the same as the Web server IP address- Determine whether the user is ...
  15. No Screenshot
    1504 total visits
    Password Checker can be used to generate and test passwords to check whether they are easy to discover.Password Checker can perform several types of tests to check whether a password is easy to guess. It can also perform tests to check whether the password is easy to guess due to similarities to a given a user name.Password Checker can also ...
Pages 5 of 9« 1 2 3 4 5 6 7 8 9 »