Take for example or a website below (click to enlarge)
The site show the IP address, the type of database and the path use for the database connection. Now, this may be good for programmer, but it is security loopholes that shall and can be easily avoided.
As an advice to programmers, if you need to log, PLEASE do log on a file which shall be truncated/replace (configured) not more than a week.
p/s: I'm also programmer with security interest :)
0 comments:
Post a Comment