![]() |
Paysite security
We are working on security for some paysites, but are wondering what other ways there are besides the simple htaccess restrictions.
Please let me know what you think are vulnerable aspects when dealing with password security using iBill. |
The best way to counter-act security vunerabilities is to watch the people using them. Monitor their little hacking communities & learn what they know, in order to protect yourself.
It's quite simple to infiltrate their community, just make yourself a geek name like "nitr0" or "bl1ng", start posting on their message boards & chatting in their chats. Your learn more in one night in security like that, then you could in 10 years reading manuals & installing patch's. Of course you could always hire a security "pro" to handle your problems :) |
hehe, thnxx.
Now that you mention it, I did join some hacker newsgroups couple years ago to find this stuff out, totally forgot about that. Could you hit me on ICQ to tell me a board like that, that is not my game, so I do not know of any. 125586484. Or should I just visit [email protected] or something ;) |
Or a name like pr0..;) jk
He's right though, look around online, read /. , all kinds of info out there... or hire someone like me, who hardens machines for a living. Note, I don't harden code, your buffer overflows and cross site scripting issues are your own to deal with.... toddler |
Quote:
:Graucho |
All times are GMT -7. The time now is 12:38 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123