...
首页> 外文期刊>PC Quest >Harden Secure Apache Web Server Security
【24h】

Harden Secure Apache Web Server Security

机译:加强安全的Apache Web服务器安全性

获取原文
获取原文并翻译 | 示例
           

摘要

In the last issue we had discussed about CGI and FastCGI, which allow the Apache daemon to run scripts such as Python or Perl on the web server. This can prove to be dangerous as somebody can access (even unintentionally) the file system of the OS on which Apache resides and make changes to it. He can delete files knowingly or unknowingly, or even corrupt them, which can increase the downtime of your web server. If we restrict Apache from accessing the whole file system, then the problem is solved. Chroot is one such option that allows you to restrict the file system and limit Apache's access. It helps in changing the directory structure of your file system; in other words in shifting the base directory from one location to another. In other words, it can fork the existing file system, similar to the Solaris container.
机译:在上一期中,我们讨论了CGI和FastCGI,它们允许Apache守护程序在Web服务器上运行诸如Python或Perl之类的脚本。由于有人可以访问(甚至是无意间)Apache所驻留的OS的文件系统并对其进行更改,因此这可能被证明是危险的。他可以有意或无意地删除文件,甚至损坏它们,这可能会增加Web服务器的停机时间。如果我们限制Apache访问整个文件系统,那么问题就解决了。 Chroot是一种这样的选项,它允许您限制文件系统和限制Apache的访问。它有助于更​​改文件系统的目录结构;换句话说,将基本目录从一个位置转移到另一个位置。换句话说,它可以派生现有文件系统,类似于Solaris容器。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号