Welcome to YLOAN.COM
yloan.com » Linux » Perfect Mysql And Head Of Security - To Create The Best Linux Hosting Environment.
Games Personal-Tech Data Entry registry cruise torrent mac code virus storage uninstaller systems cisco bugs wireless codes maintenance dell update communication trojan atlanta Data Backup Data Storage Data Protection Data Recovery Anti-Virus Windows Linux Software Hardware Mobil-Computing Certification-Tests Computers & Internet Internet

Perfect Mysql And Head Of Security - To Create The Best Linux Hosting Environment.

There are certain things you must be very careful of when you build your website

. Performance of the website is a major factor in its success. This guide will give you a technical overview of your server performance. In this guide I am only concentrating on Linux environment as

1. It is cheaper.

2. It supports the fastest script engine PHP.

3. It has the default MySQL database.


4. Its web server is apache, which can be configured with less effort and

5. The Linux environment is most popular.

Before I begin, I must explain what makes a website performs rock solid. As you are aware in most of the websites database is a key factor which mainly stores and fetches data. A portal with slow database execution takes long time to execute and that can take away most of the visitors. If your portal accepts payment then security is the next thing, you shall be concerned of. So, my article will mainly revolve with these two features and a bit of other key areas which you would like to give focus on.

Hardware: This is the factor you must take seriously depending upon the kind of business you are doing and the number of visitors you are drawing. The hardware peripherals which affect the performance are mainly RAM and your CPU speed. RAM is a space which stores data temporarily for CPU access. But if your CPU cannot process faster, then transferring more data into the RAM area will not solve the problem, since the data will remain unprocessed. A better system is a balanced system and increasing just one parameter will never go to improve speed.

Database design: MySQL allows you to define data type definition in wide varieties. And you must use them optimally. Declaring the data type of a field as int(11) will unnecessarily eat up space, if the field stores value between 0 and 10. Remember, a good bridge is one which is has better architecture. Mere using good materials never build a good bridge. Here are a few guidelines.

I would not discuss much on security issues rather would try to discuss it separately. But as an introduction SQL injection, Cross Side Scripting and HTTP trace are the most important security threat one website can get. SQL injection is a threat which exposes table name and data when a purposely built query is passed to the database through any web form. Basically when user input is incorrectly filtered for string literal escape characters. If we consider the below SQL statement


"Select * from employees where emp_name'=" + EmployeeName + "'"

Now if the user input EmployeeName has any ' inside it, mysql cannot escape the string literal and exposes error.

Similarly if purportedly written javascript is passed through user input, Cross Side Scripting or XSS attack happens. This client side script can take charge of the website through hole exposed by the weekly programmed website code. I would like to discuss more with security issues. Till then happy reading!!

by: MINU
Windows Or Linux Hosting: Which One To Choose? How Cheap Linux Vps Hosting Can Be Beneficial For Business How To Make Her Reach Orgasm Easily And Quickly - 5 Red Hot Sex Tips You Must Know 3 Red Lights Fix Free Download-3 Red Lights Fix Free Download Rosamund Pike Left Red Faced after BAFTA Awards Slip Up Fixing 3 Red Lights – Effective Methods THQ Inc. Announces Red Faction: Armageddon Development (NASDAQ:THQI) Tv Software Ubuntu Review on Hublot Passionate Red Big Bang Wristwatch Fundamental Information On Hard Hat Head Accessories The Importance of Using Hard Hat Stickers Describing What Full Brim Hard Hat Entails Main Roles Of A Hard Hat Liner Accessory
print
www.yloan.com guest:  register | login | search IP(3.17.156.160) / Processed in 0.008304 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 26 , 3048, 12,
Perfect Mysql And Head Of Security - To Create The Best Linux Hosting Environment.