<?xml version="1.0" encoding="UTF-8" ?>

<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Scuttle: rich: php security</title> 
    <link>http://scut.thrivesmedia.com/</link> 
    <description>Recent bookmarks posted to Scuttle</description>
    <ttl>60</ttl>

    <item>
        <title>PHP Security Consortium: PHPSecInfo</title>
        <link>http://phpsec.org/projects/phpsecinfo/index.html</link>
        <description></description>
        <dc:creator>rich</dc:creator>
        <pubDate>Fri, 18 Mar 2016 17:00:43 +0000</pubDate>

            <category>php security</category>
    
    </item>
    <item>
        <title>GitHub - PHPIDS/PHPIDS: PHPIDS (PHP-Intrusion Detection System) is a simple to use, well structured, fast and state-of-the-art security layer for your PHP based web application</title>
        <link>https://github.com/PHPIDS/PHPIDS</link>
        <description></description>
        <dc:creator>rich</dc:creator>
        <pubDate>Fri, 18 Mar 2016 17:00:28 +0000</pubDate>

            <category>php security</category>
    
    </item>
    <item>
        <title>Code Injection | The Honeynet Project</title>
        <link>https://www.honeynet.org/node/5</link>
        <description></description>
        <dc:creator>rich</dc:creator>
        <pubDate>Fri, 18 Mar 2016 16:46:45 +0000</pubDate>

            <category>php security</category>
    
    </item>
    <item>
        <title>Command Injection Vulnerabilities in Web applications (PHP) | Insecurety Research</title>
        <link>http://insecurety.net/?p=403</link>
        <description></description>
        <dc:creator>rich</dc:creator>
        <pubDate>Fri, 18 Mar 2016 16:45:00 +0000</pubDate>

            <category>php security</category>
    
    </item>
    <item>
        <title>Code Injection - OWASP</title>
        <link>https://www.owasp.org/index.php/Code_Injection</link>
        <description></description>
        <dc:creator>rich</dc:creator>
        <pubDate>Fri, 18 Mar 2016 16:41:29 +0000</pubDate>

            <category>php security</category>
    
    </item>
    <item>
        <title>Help! Looking for advice on a PHP exploit : sysadmin</title>
        <link>https://www.reddit.com/r/sysadmin/comments/43juil/help_looking_for_advice_on_a_php_exploit/</link>
        <description></description>
        <dc:creator>rich</dc:creator>
        <pubDate>Wed, 09 Mar 2016 02:24:38 +0000</pubDate>

            <category>php security</category>
    
    </item>
    <item>
        <title>Critical 0-day Remote Command Execution Vulnerability in Joomla - Sucuri Blog</title>
        <link>https://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.html</link>
        <description></description>
        <dc:creator>rich</dc:creator>
        <pubDate>Wed, 09 Mar 2016 01:44:23 +0000</pubDate>

            <category>php security</category>
    
    </item>
    <item>
        <title>How to Prevent Remote File Inclusion (RFI) Attacks - eSecurity Planet</title>
        <link>http://www.esecurityplanet.com/browser-security/how-to-prevent-remote-file-inclusion-rfi-attacks.html</link>
        <description></description>
        <dc:creator>rich</dc:creator>
        <pubDate>Wed, 09 Mar 2016 01:17:08 +0000</pubDate>

            <category>php security</category>
    
    </item>
    <item>
        <title>Linux: 25 PHP Security Best Practices For Sys Admins</title>
        <link>http://www.cyberciti.biz/tips/php-security-best-practices-tutorial.html</link>
        <description></description>
        <dc:creator>rich</dc:creator>
        <pubDate>Wed, 09 Mar 2016 01:16:17 +0000</pubDate>

            <category>php security</category>
    
    </item>
    <item>
        <title>Shell Injection and Command Injection Attack Vector | Golem Technologies</title>
        <link>http://www.golemtechnologies.com/articles/shell-injection</link>
        <description></description>
        <dc:creator>rich</dc:creator>
        <pubDate>Wed, 09 Mar 2016 00:56:51 +0000</pubDate>

            <category>php security</category>
    
    </item>
    <item>
        <title>security - Exploitable PHP functions - Stack Overflow</title>
        <link>http://stackoverflow.com/questions/3115559/exploitable-php-functions</link>
        <description></description>
        <dc:creator>rich</dc:creator>
        <pubDate>Wed, 09 Mar 2016 00:55:51 +0000</pubDate>

            <category>php security</category>
    
    </item>
    <item>
        <title>apache - PHP attack string in access logs - Information Security Stack Exchange</title>
        <link>http://security.stackexchange.com/questions/31916/php-attack-string-in-access-logs</link>
        <description></description>
        <dc:creator>rich</dc:creator>
        <pubDate>Wed, 09 Mar 2016 00:41:42 +0000</pubDate>

            <category>php security</category>
    
    </item>
    <item>
        <title>DDecode - PHP Decoder (eval, base64_encode, gzinglate, etc).</title>
        <link>http://ddecode.com/phpdecoder/</link>
        <description></description>
        <dc:creator>rich</dc:creator>
        <pubDate>Wed, 09 Mar 2016 00:30:29 +0000</pubDate>

            <category>php security</category>
    
    </item>
    <item>
        <title>PHP.INI settings: Disable exec, shell_exec, system, popen and Other Functions To Improve Security</title>
        <link>http://www.cyberciti.biz/faq/linux-unix-apache-lighttpd-phpini-disable-functions/</link>
        <description></description>
        <dc:creator>rich</dc:creator>
        <pubDate>Wed, 09 Mar 2016 00:29:09 +0000</pubDate>

            <category>php security</category>
    
    </item>
    <item>
        <title>security - PHP: How To Disable Dangerous Functions - Stack Overflow</title>
        <link>http://stackoverflow.com/questions/1865020/php-how-to-disable-dangerous-functions/31869925</link>
        <description></description>
        <dc:creator>rich</dc:creator>
        <pubDate>Wed, 09 Mar 2016 00:24:40 +0000</pubDate>

            <category>php security</category>
    
    </item>

</channel>
</rss>